Difference between revisions of "Voting"
Jump to navigation Jump to search
clean up (AWB), typos fixed: gaurd → guard, anonimity → anonymity, etc) → etc.)
m (clean up (AWB), typos fixed: gaurd → guard, anonimity → anonymity, etc) → etc.))
==Certifying the ballot box==
For the nonce we will assume that there are paper ballots because that is what most people are comfortable with. I assure you that you will not be comfortable with them when we see how easily they can be corrupted. But that comes later. So the immediate problems with the "everyone counts the votes" meachanism are: "How do we know that the ballot database is a true represntation of the paper ballots?" and "What is to prevent hackers and private interests from manipulating the data?". Sucinctly: There must be multiple scanners and multiple databases controlled by totally different administrators. And every official ballot (after it is cast and separated from the voter(
There must be multiple types of scanners and multiple databases in any event such that no central authority/vendor can be corrupted. As a matter of fact, when you look at the ballot box over the internet you will be looking at one of many different ballot databases all of which contain all the ballots and all of which are identical with regard to the ballots themselves. The voting "authorities" (who have no more authority than you or I) insure that the contents of all the databases are identical. Most likely the database you are looking at will be the one nearest you. It doesn't matter because they all contain the same data. Each database system is administered by a completely different database administrator organization. The different organizations will use one of several different types of computer hardware (e.g.Apple, McKintosh, Amd, Intel, and others) these systems will run various operating systems (Linux, MS Dos, Windows Xp, Sun OS, Free BSD, etc.), and various types of database software (Oracle, Sybase, PostgresSQL, MySQL, mSQL, dbm, Informix, and of course ye ole "roll your own"). They will present the information using the various types of "web" servers (Apache, Sun Java Web Server, Abyss, Xserve, etc) with applications coded in python, php, perl, apt, or whatever. It is virtually impossible to "break in" to the database and "mess with" the ballots or the deleivery system because there are many of them and they are all different. The attacking party would need to compromise many different computer systems all being administered by different organizations/people. The cost of one complete system to perform the database function is less than $500. It is not a major investment and anyone with a decent desktop computer system (and that is a lot of people) has sufficient computer hardware to do this data storage task.