TELECOM Digest OnLine - Sorted: Re: Diebold Source Code Leaked Once Again

Re: Diebold Source Code Leaked Once Again

mc (
Sat, 28 Oct 2006 11:04:46 -0400

<> wrote in message

> In article <>, Scott Dorsey
> <> wrote:

>> How can I be sure that my vote is being counted if I am casting it
>> into a black box whose internal software is a complete unknown? As
>> long as the voting machine is a closed mystery, how can we be sure
>> elections are free and fair?


> They could take a lesson from the gambling industry. Manufacturers of
> gambling devices used in Nevada (and elsewhere) have to meet strict
> requirements and pass thorough inspections before they can be used.
> Among other things the manufacturer has to submit both the source code
> (and all required build tools) and the executable image (which is
> retained for later verification) for analysis and testing. ...

> Believe me, the gambling industry takes "trust" seriously.

But with a voting machine, I don't want to have to "trust" a small
group of experts far away. I want a machine where there are mechanics
in every small town who can verify that it's working as intended, and
complex rigging is physically impossible in the first place.

Part of the problem with microprocessor voting machines is that they could
be rigged in very complex ways (e.g., throw the election only if the 2nd
candidate is winning after 3000 votes) so that any reasonably brief test
would not show the tampering.

Post Followup Article Use your browser's quoting feature to quote article into reply
Go to Next message: Dave Garland: "Re: Diebold Source Code Leaked Once Again"
Go to Previous message: Monty Solomon: "Researchers See Privacy Pitfalls in No-Swipe Credit Cards"
May be in reply to: Robert McMillan, IDG: "Diebold Source Code Leaked Once Again"
Next in thread: Dave Garland: "Re: Diebold Source Code Leaked Once Again"
TELECOM Digest: Home Page