Fox having to pay a substantial damages settlement to Dominion is a just outcome; their amplification of lies about malicious backdoors and rigged elections was contemptible and dangerous.

But we shouldn't conclude from this that US voting systems are perfectly or even adequately protected against attack. While great progress has been made, there's still a great deal of work left to do to make our elections truly secure and robust.

The best thing that Dominion could do with their infusion of cash from Fox - for both their reputation and for the good of democracy - would be to invest it into developing more robust, auditable election technology, such as optical scan systems with features to facilitate Risk-Limiting Audits.

@mattblaze hand marked scantron is the only realistic solution. Allows quick results and a verifiable paper ballot for recounts.

Any *private* non-public source code counting our votes is absolutely undemocratic.

@pixelpusher220 @mattblaze
how does that differ from the Dominion ICX (ImageCast Evolution) already in use which literally tabulates paper ballots electronically for near-term tabulation while the verifiable paper ballot is retained in the event an audit or recount?

@apenguininspace @mattblaze that's the problem. We don't know.

A paper trail is better than nothing but there's just precious little benefit to having a software program do the voting part.

If they open source their code so it's reviewable, that would be ok...but still overkill for what's needed, simple scan n read.

Next up is the blatant security failure of these *private* machines. Sure they've been improved, but why incorporate the risk if you don't have to?

https://m.slashdot.org/story/298229

Slashdot

@pixelpusher220 @apenguininspace Here’s the problem: today’s elections in the US are incredibly complex compared with the rest of the world. We vote on a ton of different races, and it’s simply not feasible in most of the US to tally ballots without automation. But automation is inherently unreliable and insecure.

Risk limiting audits are an efficient way to get the benefits of automation while also assuring against errors or compromises of the tally system.

@mattblaze @apenguininspace yes, scantron is automation.

My issue is unaudited, untested machines running unaudited code. The examples of bad (or basically no) security are legion as any private actor will only do the minimum.

I still posit that the software voting machines provide no significant benefit, let alone when weighed against the increased risks.

Edit: *publicly audited

@apenguininspace @pixelpusher220 You can’t audit software sufficiently well to provide assurance, whether open source or not. What you can do is audit the tally. This is why election security experts are focused on things like RLAs rather than the impossible task of making software and hardware perfect and impenetrably secure.
@mattblaze @apenguininspace @pixelpusher220 I'm fond of this anecdote from Nicole Perlroth's recent book "This is How They Tell Me the World Ends”. (Aside: I was on a committee with Gosler and knew Morris Sr. pretty well—he's one of the people I learned security from. Both are wicked smart.)

@SteveBellovin @mattblaze @apenguininspace @pixelpusher220

I’ve seen it. Clever code. He did a second version that was even shorter. It led to some interesting and positive changes in thinking at both NSA and DOE.

A major takeaway is that if you know something about your adversary’s assumptions you can get away with lots of things. Of course, that is also true in stage illusion and confidence games.

And no audit of code of any reasonable size is likely to be 100% certain.

@spaf @mattblaze @apenguininspace @pixelpusher220 Interesting. Gosler mentioned it at a (closed but unclassified) committee meeting I was at, but did not show the code. Now I’m *very* curious…

@SteveBellovin @mattblaze @apenguininspace @pixelpusher220

It is not available for public viewing.