I'm fine with primitive digital tabulators on the level of a scantron machine, they can be made low-complexity enough to 100% audit. I'm talking a 8-bit microcontroller with a few K of program memory stored in an immutable ROM on the chip, basically early 80s level of tech.
This shit with interactive GUIs, networking, a full OS...FUCK NO.
Yeah an election machine has no place even having internet built in. So updating is hard? How fucking often do you need to change the software on a voting machine? Should be almost never.
Voter ID, paper ballots with blockchain traceability, ink pad, fingerprint on the chosen candidate, military supervision roaming around the place.
Maximum capacity for every voting station no more than 5000 ballots. If it's a big city, do more voting stations.
Workers selected and distributed across counties at random.
Results communicated by phone to central command, on loudspeaker, with witnesses, without knowing how the other stations are doing.
Cameras all over like in a casino + every official with a body cam. All footage remains stored for 24 months
Total cost: probably 5% of what was spent on Dominion
Blockchain needs to be done in a way that the vote cannot be traced to the voter. It must remain anonymous. If the voter can confirm how he voted, he can sell his vote with his receipt. This will immediately ruin any election. If the government can track it, a hostile government can track down dissenters and supporters of the "evil" candidate and add them to the naughty list.
I've got another red pill for you then. In the 1970's as we got new technology, we began recording and publishing congressional votes for the public. So the public could now see democracy in action and hold leaders accountable! Great right?
Nope, that was the day we sold our country to the highest bidding lobbyist. Before that point lobbyists had less influence. A congressman could accept the lobbyists money, and simply vote his conscience, and lie to the lobbyist that he really tried to push the bill through. Since you couldn't guarantee a vote even with a payment, people were not willing to spend as much in lobbying.
Nowadays? Lobbyists hand congressman their bills and tell them that if they don't vote for it, they're not getting money. They can now confirm their vote and buy it! There is a really good video on the subject, but youtube algorithms seem to be hiding it.
Absolutely, vote anonimity must be preserved and I think it's possible.
Traceability for example should kick in ONLY if votes get contested in a way that requires an audit.
All the workers would see while counting is a fingerprint in the candidate box and random encryption dots.
Impossible to match it to a voter with the naked eye. The use of any scanner or electronic device other than cameras during the counting process should be banned
The blockchain traceability should be for chain of custody purposes only, within an internal offline system, with a complex encryption key to protect it from any unwarranted intrusion. Once decoded, ballot traceability could look something like a serial number. Example
IL C 28 - 0001 to 5000
Illinois (IL) gave custody to Chicago (C) Voting Station (28) 5000 individually numbered ballots
Again, this is all encrypted. Workers don't knows what number is the ballot they're handing out, the stacks come pre shuffled, not in order.
Voting night should be a very simple process that can't be fucked up.
Voter ID gets scanned upon entrance
Voter proceeds to ballot desk where individual ballot is matched with voter ID
System gives green light to access voting booth
Voter puts fingerprint on chosen candidate
Voter puts folded ballot in a box guarded by the military, who will also observe all the counting process until certification and results call to central command, a process that shouldn't take more than 5/6 hours
Only the decentralized, offline local system has the voter ID and ballot matched and accessing that info would require official audit.
I'm not a tech expert but I imagine this would make cheating very, very hard. And if the fingerprint doesn't match voter ID or ballot number, the vote is invalid. Period.
Responsibilities can be traced back because of chain of custody, diversified system made of many small stations avoid giant fuck ups like invalidanting millions of votes
Traceability for example should kick in ONLY if votes get contested in a way that requires an audit.
It would be great if we could trust the government to do the right thing, but I think we've recently learned the lesson that we shouldn't. It's better to simply not give them the opportunity to do otherwise.
All they need to do is scan the ballot through a machine that can read the blockchain, and everyone's anonymity is compromised, as that blockchain is already associated with an ID. This could be done quickly and in secret without the public's knowledge or consent. As we already know, this government of ours takes every opportunity, even illegally, to collect all known information on it's citizens in a pursuit of power.
Obama already weaponized the IRS against political opponents. These lists that can be made from this data will only lead to worse outcomes in the end. Even the knowledge alone that your vote is not anonymous to the government will affect votes and be unhealthy for a republic.
Blockchain basically prints a unique code for every ballot, it becomes impossible for anyone to print extra ballots because it's impossible for them too add new ballots to the chain, so it's easy to detect the fakes and the ones sent across county lines
And that’s our fault for letting that happen. The riggers at my polling place have never looked trustworthy especially when I use the R line in primary season. One had an Obummer hat on right next the voting machine.
There's easy ways around that even on a very small, very simple system - output a log of all ballot serial numbers scanned in the batch along with the batch tally.
For extra assurance, sign all the output data with a machine-unique private key to ensure it can't be tampered with upstream in the processing chain. Signature bad on a batch -> reject all ballots from that machine and send it off for forensic analysis. Validated crypto engines are available even on very simple platforms now, so this doesn't conflict with low-complexity hardware.
They don't even need to do that. They can just insert a thumb drive and upload a fake database of ballots as if they were scanned, without ever scanning a single ballot, or scan real ballots as normal then upload from a thumb drive to replace the ballot database with a fake one made months ago. Then after the election is over, they erase everything and go into the physical ballot storage and switch hand made fraud ballots in for the next week after the election, so even a recount wouldn't show anything.
Like those note counting machines at the bank. You physically count the stack first, then toss it in the counting machine to verify. No other information.
Isn't it great to realize that the shittiest truckstop Injun casino in Nevada almost certainly has a more secure count process than our national election?
Almost like Big Chief Counting Cash cares more about getting his money right than Uncle Sam cares about getting the election right.
Given how much money is involved in the outcome of an election, you'd think they'd have more vested interest in getting it right (or at least definitely wrong), but it just seems to be a cast of keystone klutzes.
That's one reason Trump was such a threat to the establishment - he came in knowing how to manage his own money (even if people thought he did it badly).
So correct me since I’m not IT goon. Wouldn’t her computer(s) be connected to the Internet if she’s using what looked like a Windows desktop setup and furthermore anything connected to the Internet is hackable (especially Windows)?
Not necessarily connected to the internet at large (private net is entirely possible), but almost certainly so. There should be an airgap (logical if not physical isolation of this network from any other lower security network) but I have no reason whatsoever to believe there was one given the general incompetence or malice on display here.
The workstation could be compromised, but as far as remote exploitation, honestly I'd be more concerned with the tabulator itself. Unless explicitly designed with security in mind, embedded systems are usually really good targets because they often run core software (networking/parsing/whatever) libraries that are out of date and have not just security flaws, but security flaws that have been in the wild for years. Embedded systems can be a yuge pain in the ass for corporate infosec, printers have led to major compromises.
What most concerns me about this system is not so much external actors attacking, but that nothing about any of it indicates security was in mind when it was either designed or configured/deployed. Even trivial UI stuff like it doesn't even ask for a password (or better, a user AND supervisor password), when changing a vote is deebly goncerning.
There's not even anything in the voting machine software stopping the office janitor from sitting down at the workstation and changing votes while the election manager was taking a shit, and if the election manager herself is the bad actor, she can just do anything she wants.
There might be an audit trail, but without confirming and logging the identity of the operator when the change is made there's no way to prove who made a change or why. Just the fact that it lets the user change a vote at all is insane - that should be a formal process where the questionable ballot is shunted into an entirely different queue for manual review, or just rejected outright. It's not an election staffer's place to be interpreting who some idiot that marked both boxes intended to vote for.
This system, or at least this system as configured, is shockingly permissive.
(My background is information security, held multiple senior titles in that field, and I do embedded systems for fun.)
The more I think about this the more I could add to it, but it's already a wall of text. As a security guy this is absolutely horrifying on so many levels.
Without reviewing the system architecture I can't say that for sure, but we can say we know at least some were, given Dominion techs were mentioned remoting in to fix some "issue" (perhaps DJT winning...) in at least one state.
I'm fine with primitive digital tabulators on the level of a scantron machine, they can be made low-complexity enough to 100% audit. I'm talking a 8-bit microcontroller with a few K of program memory stored in an immutable ROM on the chip, basically early 80s level of tech.
This shit with interactive GUIs, networking, a full OS...FUCK NO.
Yeah an election machine has no place even having internet built in. So updating is hard? How fucking often do you need to change the software on a voting machine? Should be almost never.
It's like buying a calculator that needs firmware updates for addition or subtraction lol
Right. It's a tabulator, not much going on there. Math doesn't change.
It does if it's racist /s
Sorry, you can't inspect our source code, we use proprietary addition technology.
Let me introduce you to common core.
Never if it's never online. If it breaks you just replace the machine.
but the internet of things, the touch screen, the sci fi aesthetics...
Voter ID, paper ballots with blockchain traceability, ink pad, fingerprint on the chosen candidate, military supervision roaming around the place.
Maximum capacity for every voting station no more than 5000 ballots. If it's a big city, do more voting stations. Workers selected and distributed across counties at random.
Results communicated by phone to central command, on loudspeaker, with witnesses, without knowing how the other stations are doing.
Cameras all over like in a casino + every official with a body cam. All footage remains stored for 24 months
Total cost: probably 5% of what was spent on Dominion
Blockchain needs to be done in a way that the vote cannot be traced to the voter. It must remain anonymous. If the voter can confirm how he voted, he can sell his vote with his receipt. This will immediately ruin any election. If the government can track it, a hostile government can track down dissenters and supporters of the "evil" candidate and add them to the naughty list.
I've got another red pill for you then. In the 1970's as we got new technology, we began recording and publishing congressional votes for the public. So the public could now see democracy in action and hold leaders accountable! Great right?
Nope, that was the day we sold our country to the highest bidding lobbyist. Before that point lobbyists had less influence. A congressman could accept the lobbyists money, and simply vote his conscience, and lie to the lobbyist that he really tried to push the bill through. Since you couldn't guarantee a vote even with a payment, people were not willing to spend as much in lobbying.
Nowadays? Lobbyists hand congressman their bills and tell them that if they don't vote for it, they're not getting money. They can now confirm their vote and buy it! There is a really good video on the subject, but youtube algorithms seem to be hiding it.
This explains the Gilens flat line.
"The rich ruleth over the poor, and the borrower is servant to the lender."
Edit: found the video, but it's a long one. The cardboard box reform
Absolutely, vote anonimity must be preserved and I think it's possible.
Traceability for example should kick in ONLY if votes get contested in a way that requires an audit.
All the workers would see while counting is a fingerprint in the candidate box and random encryption dots.
Impossible to match it to a voter with the naked eye. The use of any scanner or electronic device other than cameras during the counting process should be banned
The blockchain traceability should be for chain of custody purposes only, within an internal offline system, with a complex encryption key to protect it from any unwarranted intrusion. Once decoded, ballot traceability could look something like a serial number. Example
IL C 28 - 0001 to 5000
Illinois (IL) gave custody to Chicago (C) Voting Station (28) 5000 individually numbered ballots
Again, this is all encrypted. Workers don't knows what number is the ballot they're handing out, the stacks come pre shuffled, not in order.
Voting night should be a very simple process that can't be fucked up.
Voter ID gets scanned upon entrance
Voter proceeds to ballot desk where individual ballot is matched with voter ID
System gives green light to access voting booth
Voter puts fingerprint on chosen candidate
Voter puts folded ballot in a box guarded by the military, who will also observe all the counting process until certification and results call to central command, a process that shouldn't take more than 5/6 hours
Only the decentralized, offline local system has the voter ID and ballot matched and accessing that info would require official audit.
I'm not a tech expert but I imagine this would make cheating very, very hard. And if the fingerprint doesn't match voter ID or ballot number, the vote is invalid. Period.
Responsibilities can be traced back because of chain of custody, diversified system made of many small stations avoid giant fuck ups like invalidanting millions of votes
It would be great if we could trust the government to do the right thing, but I think we've recently learned the lesson that we shouldn't. It's better to simply not give them the opportunity to do otherwise.
All they need to do is scan the ballot through a machine that can read the blockchain, and everyone's anonymity is compromised, as that blockchain is already associated with an ID. This could be done quickly and in secret without the public's knowledge or consent. As we already know, this government of ours takes every opportunity, even illegally, to collect all known information on it's citizens in a pursuit of power.
Obama already weaponized the IRS against political opponents. These lists that can be made from this data will only lead to worse outcomes in the end. Even the knowledge alone that your vote is not anonymous to the government will affect votes and be unhealthy for a republic.
Blockchain basically prints a unique code for every ballot, it becomes impossible for anyone to print extra ballots because it's impossible for them too add new ballots to the chain, so it's easy to detect the fakes and the ones sent across county lines
Based on what happened in the key cities of key swing states, it's almost like you need a poly and a background check to be a ballot counter.
The Shaniquas they had counting ballots looked like they were pulled straight out of a Section 8 housing project
And that’s our fault for letting that happen. The riggers at my polling place have never looked trustworthy especially when I use the R line in primary season. One had an Obummer hat on right next the voting machine.
Dominion was paying people off
Source?
Those are the easiest to scam. Just run the same ballot through 10 times.
Simple analog fix. Prior to leaving the machine a row of holes is punched at the bottom of the ballot.
There's easy ways around that even on a very small, very simple system - output a log of all ballot serial numbers scanned in the batch along with the batch tally.
For extra assurance, sign all the output data with a machine-unique private key to ensure it can't be tampered with upstream in the processing chain. Signature bad on a batch -> reject all ballots from that machine and send it off for forensic analysis. Validated crypto engines are available even on very simple platforms now, so this doesn't conflict with low-complexity hardware.
They don't even need to do that. They can just insert a thumb drive and upload a fake database of ballots as if they were scanned, without ever scanning a single ballot, or scan real ballots as normal then upload from a thumb drive to replace the ballot database with a fake one made months ago. Then after the election is over, they erase everything and go into the physical ballot storage and switch hand made fraud ballots in for the next week after the election, so even a recount wouldn't show anything.
Like those note counting machines at the bank. You physically count the stack first, then toss it in the counting machine to verify. No other information.
Isn't it great to realize that the shittiest truckstop Injun casino in Nevada almost certainly has a more secure count process than our national election?
Almost like Big Chief Counting Cash cares more about getting his money right than Uncle Sam cares about getting the election right.
The fraud proves that Uncle Sam cares about the election results, but not the will of the people.
Given how much money is involved in the outcome of an election, you'd think they'd have more vested interest in getting it right (or at least definitely wrong), but it just seems to be a cast of keystone klutzes.
That's one reason Trump was such a threat to the establishment - he came in knowing how to manage his own money (even if people thought he did it badly).
So correct me since I’m not IT goon. Wouldn’t her computer(s) be connected to the Internet if she’s using what looked like a Windows desktop setup and furthermore anything connected to the Internet is hackable (especially Windows)?
Not necessarily connected to the internet at large (private net is entirely possible), but almost certainly so. There should be an airgap (logical if not physical isolation of this network from any other lower security network) but I have no reason whatsoever to believe there was one given the general incompetence or malice on display here.
The workstation could be compromised, but as far as remote exploitation, honestly I'd be more concerned with the tabulator itself. Unless explicitly designed with security in mind, embedded systems are usually really good targets because they often run core software (networking/parsing/whatever) libraries that are out of date and have not just security flaws, but security flaws that have been in the wild for years. Embedded systems can be a yuge pain in the ass for corporate infosec, printers have led to major compromises.
What most concerns me about this system is not so much external actors attacking, but that nothing about any of it indicates security was in mind when it was either designed or configured/deployed. Even trivial UI stuff like it doesn't even ask for a password (or better, a user AND supervisor password), when changing a vote is deebly goncerning. There's not even anything in the voting machine software stopping the office janitor from sitting down at the workstation and changing votes while the election manager was taking a shit, and if the election manager herself is the bad actor, she can just do anything she wants. There might be an audit trail, but without confirming and logging the identity of the operator when the change is made there's no way to prove who made a change or why. Just the fact that it lets the user change a vote at all is insane - that should be a formal process where the questionable ballot is shunted into an entirely different queue for manual review, or just rejected outright. It's not an election staffer's place to be interpreting who some idiot that marked both boxes intended to vote for.
This system, or at least this system as configured, is shockingly permissive.
(My background is information security, held multiple senior titles in that field, and I do embedded systems for fun.)
The more I think about this the more I could add to it, but it's already a wall of text. As a security guy this is absolutely horrifying on so many levels.
It has to be connected to the internet
Without reviewing the system architecture I can't say that for sure, but we can say we know at least some were, given Dominion techs were mentioned remoting in to fix some "issue" (perhaps DJT winning...) in at least one state.