[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

The Secret Version of the Bible You’re Never Taught - Secret History

Rocker defames Charlie Kirk threatens free speech

Paramount Has a $1.5 Billion South Park Problem

European Warmongers Angry That Trump Did Not Buy Into the ‘Drone Attack in Poland’

Grassley Unveils Declassified Documents From FBI's Alleged 'Political Hit Job' On Trump

2 In 5 Young Adults Are Taking On Debt For Social Image, To Impress Peers, Study Finds

Visualizing Global Gold Production By Region

RFK Jr. About to DROP the Tylenol–Autism BOMBSHELL & Trump tweets cryptic vaccine message

Elon Musk Delivers Stunning Remarks At Historic UK March

Something BIG is happening (One Assassination Changed Everything)

The Truth About This Piece Of Sh*t

Breaking: 18,000 Epstein emails just dropped.

Memphis: FOUR CHILDREN shot inside a home (National Guard Inbound)

Elon Musk gives CHILLING WARNING after Charlie Kirk's DEATH...

ActBlue Lawyers Subpoenaed As House GOP Investigation Into Donor Fraud Intensifies

Cash Jordan: Gangs EMPTY Chicago Plaza... as Mayor's "LET THEM LOOT" Plan IMPLODES

Trump to send troops to Memphis

Who really commands China’s military? (Xi Jinping on his way out)

Ghee: Is It Better Than Butter?

What Is Butyric Acid? 6 Benefits (Dr Horse says eat butter, not margarine!)

Illegal Alien Released by Biden Admin Beheads Motel Manager In Dallas,

Israel Wants to Unite Itself by Breaking the World -

Leavitt Castigates Journalists To Their Faces Over Lack Of Iryna Zarutska Killing Coverage

Aussie Students Spend The Most Time In School, Polish Kids The Least

Tyler Robinson, 22, Named As Suspect In Charlie Kirk Assassination

How They Control the World and Their Secret Weapon

Newmont Pulls Out of Canada, Delists TSX

Eva Vlaardingerbroek's Warning: Elites Plan to Make Humans Immortal in the Cloud

The $7.9 Trillion Company You've Never Heard Of

CCP's motivation for (the Korean) war was to grow its military: US-China-Russia relations


(s)Elections
See other (s)Elections Articles

Title: [Video] David Bismark: E-voting without fraud
Source: ted.com
URL Source: http://www.ted.com/talks/david_bismark_e_voting_without_fraud.html
Published: Nov 1, 2010
Author: David Bismark
Post Date: 2012-01-24 17:38:24 by GreyLmist
Keywords: Vote Fraud, E-voting, Prêt à Voter, voter-verifiable voting system
Views: 64
Comments: 1

7 minute video


Poster Comment:

Haven't read thoroughly through all of the many comments at the site yet but here is a random sampling:

David Bismark, Nov 11 2010: So a good place to start is to put the term Prêt à Voter into Google Scholar to find many papers published over the last few years. The paper "Prêt à voter: a voter-verifiable voting system" is the currently most authoritative paper and you will find this if you google for the title. As our research is conducted at various universities in the UK and elsewhere in Europe, we have published our results and they are free for you to look at,

David Bismark, Nov 11 2010: The votes are decrypted using a key which is held by a group of people. The key is split into many key shares, each of which is held by different trusted parties. Unless all (or a threshold set) of those keyholders come together to decrypt the votes they cannot. Therefore, the likelihood that enough trusted parties want to cheat that they can break the election should be very low. If we select the trusted parties such that they all WANT to be honest and DO NOT WANT to work together (it could be all the political parties + the current government + the opposition + the UN + the EU + the AU + governments of other countries in the region + Richard Dawson and associates) then all of these trusted parties will safeguard the election together.

David Bismark, Nov 11 2010: Furthermore, it is not possible to "decrypt the ballot papers in a particular manner, favouring a particular candidate" because the cryptography provides mathematical proof of correct decryption. Remember, we know the public key under which the data has been encrypted and using this key, we can verify that each step of the decryption is done correctly (without providing a link between an encrypted receipt and a decrypted, plaintext vote).

system operator, Nov 11 2010: Blah Blah Blah, all the layers of obfuscation merely obfuscate the FACT that no matter what pattern of bits you present as PROOF, it can always be CONTRIVED AFTER the FACT & presented to you as PROOF !! HELLO ????

system operator, Nov 11 2010: Besides, we cannot create a new priest class in the name of technology,

Roberto Casati, Nov 11 2010: David, of course we are studying those academic papers. It is part of the public verifiability issue!

But TED is neither Youtube nor an academic forum, it's about "ideas worth spreading" so Richard and others are faithful to TED's mission in trying to check whether this particular idea is worth spreading.

Public debate requires that we steer a middle course between deference to academic journals and airing one's opionion.

Thus, the claim that the system is to be trusted does require a lot more of explaining, not just reference to journals.

William J. Kelleher, Ph.D., Oct 31 2011: Not a good idea! Why should voters in the 21st Century have to trek to the polling place every time there is an election? In my book, Internet Voting Now!, I show that Internet voting can be done securely. Its green, convenient, and displaces 18th Century practices w/ 21st C technology. All elections in the USA, and around the world, should be online.

Stanislav Ivanov, Nov 19 2011: As you may know in Bulgaria is very popular the vote purchasing - buying the votes of mostly pour and illiterate people in favor of bad apple politicians! I think that the vote will be private if the voter wants it to be! What happens when the voter wants to prove how he/she voted? Just gives the paper with the 2d bar-code to the buyer?

system operator, Nov 13 2010: Along your excellent observation [Sir Richard] that it always ends up an "appeal to authority" as you so diplomatically put it, please consider that a crypto system like the one being suggested and ALL others are so weak in reality that in order to implement them an entire Military Command & Control Grid overlay is REQUIRED, i.e. a POLICE STATE, and thus there is even more reason to doubt its results since no one can say anything under such conditions, thus the only way again is this way: http://goo.gl/mq3zh

My note: that path goes to http://teaminfinity.com/COMMUNICAE-FAIL-SAFE-VOTING-SYSTEM.shtml which says: SDF Public Access UNIX System .. Est. 1987. It has various links and a logo pic of a computer. Never heard of it before and don't know what it's about.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 1.

#1. To: All (#0)

That video was found in the comments section at dailypaul.com here: South Carolina Vote Results Will Be Invalid. Some highlights from the discussion:

SOFTWARE design to totally eliminate electronic voter fraud. [My note: referencing the David Bismark video above, I think]

The blind ID numbers would be published on the net. Anyone would be able to audit, authenticate and tabulate the votes by taken random samples from volunteers who submit thier receipts

I believe people should sign the ballot so not more than one vote can count and it can be traced back and verified.

watch the documentary "UNCOUNTED"

Also posted was a link to the Hacking Democracy - Full Length video, 1:21:58

GreyLmist  posted on  2012-01-24   17:58:19 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 1.

        There are no replies to Comment # 1.


End Trace Mode for Comment # 1.

TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]