view the rest of the comments
politics
Welcome to the discussion of US Politics!
Rules:
- Post only links to articles, Title must fairly describe link contents. If your title differs from the site’s, it should only be to add context or be more descriptive. Do not post entire articles in the body or in the comments.
Links must be to the original source, not an aggregator like Google Amp, MSN, or Yahoo.
Example:
- Articles must be relevant to politics. Links must be to quality and original content. Articles should be worth reading. Clickbait, stub articles, and rehosted or stolen content are not allowed. Check your source for Reliability and Bias here.
- Be civil, No violations of TOS. It’s OK to say the subject of an article is behaving like a (pejorative, pejorative). It’s NOT OK to say another USER is (pejorative). Strong language is fine, just not directed at other members. Engage in good-faith and with respect! This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban.
- No memes, trolling, or low-effort comments. Reposts, misinformation, off-topic, trolling, or offensive. Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.
- Vote based on comment quality, not agreement. This community aims to foster discussion; please reward people for putting effort into articulating their viewpoint, even if you disagree with it.
- No hate speech, slurs, celebrating death, advocating violence, or abusive language. This will result in a ban. Usernames containing racist, or inappropriate slurs will be banned without warning
We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.
All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.
That's all the rules!
Civic Links
• Congressional Awards Program
• Library of Congress Legislative Resources
• U.S. House of Representatives
Partnered Communities:
• News
Which is the subposition posed by techie folks a long time. Like where I'm from it's still a paper ballot. But the idea that a paper ballot is that much safer because it's in paper form, but in the end it's the process and the framework around it that does the heavy lifting.
Voting machines can work... just not on an x86 running Windows enterprise lol abort, abort, the milk has soured, I repeat; the milk has soured...
But let's say a well designed RISC-V processor, no accelerators or things that make CPU go vroom vroom but that also introduces the threat of speculative execution and a solid, LTS Linux system with no WiFi, Bluetooth or anything, just a NFC or USB key pair that allows for anonymous voting, whilst also ensuring the integrity of the ballot using identifying measures like cameras in the voting locales and signing in at the entrance before voting.
Again, the process and the framework is the thing here. Even the hardware. Can the current industry handle it? Nope. Will open hardware and open firmware create a new revolution within the use and implementation of computers? I do believe so, and even within voting.
But some Oracle/Microsoft type job? No. Just no. There when you return to the paper ballot.
Did you watch the video? Because he pretty much covered all that. Electronic voting will never, ever be viable for one simple reason: there is no added cost to scaling an attack on an election.
Which part of "not with the current hardware" didn't you understand? How did those hackers gain access?! WiFi and Bluetooth, as well as some enterprise system shellacked on top of it.
I respect Tom Scott, but that kind of absolutism isn't anything else than a dismissal. But yes, don't trust these IT companies. They are trash, their licenses are trash and their code is trash.
If that's the basis he's going off, he is right, but that doesn't dismiss the point I was trying to make - which completely escaped you.