An absentee ballot may be cast securely in real time from anywhere on earth, but only by the voter who requested it. When the requestor accesses the voter registration/registration confirmation page with the first QR code, they must enter their four-digit PIN to continue the transaction. The requestor creates a personalized four-digit PIN to be associated with the ballot serial number on the scratch-off ballot access card mailed to them by the state. ![]() An absentee vote is requested online with verified registration. Q: What about absentee voting? How does that work?Ī: Absentee voting can be conducted electronically and in real time. To hack into even one voter transaction encrypted with one-way SHA encryption, you would need the computing power of a modern nation state and more time than the universe has been in existence. Given enough computing power and time, theoretically, everything is hackable. The ballot is verified, secure, and irreversibly anonymous. After that, the system recognizes only legitimate transactions for the activated ballot itself. ![]() ![]() The individual voter’s identity is cryptographically disassociated from their ballot when registration is confirmed. Think of it as a universally unique value that cannot be reversed like normal encryption. SHA is a mathematical algorithm that converts an input string of an arbitrary length to an output string of a fixed length. Secondly, each individual QR code contains a unique one-way secure hash algorithm (SHA) shared only by the other three QR codes on that ballot. Trying to spoof a QR code that has never been seen would be akin to trying to accurately guess the exact weight of a rock on the first try when the size range is somewhere between a grain of sand and the sun. However, because our secure ballots are distribution-controlled from the printer to your hands, the QR codes under the scratch materials have NEVER been seen before they are used by YOU. It is, of course, possible to spoof/replace a QR code with another or to create a QR code that will redirect to malicious content. The un-hackable claim rests on two important aspects.įirst, the use of QR codes for access. Q: Un-hackable? How can you say your system is un-hackable? EVERYTHING IS HACKABLE!Ī: That is true. The only possible method for cracking a SHA family bit encryption is to assume that the hash content is a password, recover a database of online passwords belonging to a specific voter, and compare the hash to that list.īecause there are no passwords used in the Redo Voting system, the encryption cannot be hacked by any means known to man. The hash algorithms are one-way, based on a non-linear function, and specifically designed to prevent decryption. Redo Voting uses the most current secure hash technology available from the SHA family of cryptographic secure hash algorithms, compatible with a 512-bit variant. Q: Isn’t 512-bit encryption easy to hack? I read that it can be hacked in a matter of hours.Ī: There are several types of 512-bit encryption, some of which are vulnerable to hacking attacks. This might include polling places, government buildings like court houses or the Department of Motor Vehicles etc. Even then, the only vote that could be “hacked” would be their own.Ī: You visit any location that your local election officials have allowed to carry Ballots. It is possible to replace a QR code with another or to create a QR code that will redirect to malicious content, but because the individual user of the Redo Voting ballot card will be the only person to ever see the QR codes, hacking this ballot card would require the active cooperation of the voter. To change this action, one would have to change the arrangement of the modules after it was printed out. This is not possible because it is the arrangement of the small square modules by which the data is encoded that determines this action. Q: How secure is a QR code? Can a QR code be hacked?Ī: Hacking a QR code would mean that the action triggered when it was scanned would have been modified through manipulation. It does not matter which web browser your phone uses. ![]() The camera app will then present a button to follow the link to a web browser page. The Redo Voting system is the very first functional, fully scalable E2E DRE voting system in existence.Ī: You simply open the camera on your phone just like you’re taking a picture and point the phone camera at the QR Code. The EAC is addressing this by requiring the next generation of electronic voting systems to operate on open-source/publically available code providing fully transparent, end-to-end data integrity and security in a direct reporting electronic voting system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |