{"id":80,"date":"2008-01-11T20:17:19","date_gmt":"2008-01-12T00:17:19","guid":{"rendered":"http:\/\/blog.payne.org\/2008\/01\/11\/maybe-voting-should-be-low-tech\/"},"modified":"2008-01-11T20:17:19","modified_gmt":"2008-01-12T00:17:19","slug":"maybe-voting-should-be-low-tech","status":"publish","type":"post","link":"https:\/\/payne.org\/blog\/maybe-voting-should-be-low-tech\/","title":{"rendered":"Maybe voting should be low-tech?"},"content":{"rendered":"<p>Why do we need electronic voting machines, really?<\/p>\n<p>When we started Open Market in 1994 and built one of the first eCommerce systems, we realized we might be opening pandora&#8217;s box for fraud.\u00a0 At that time, you could steal all of the off-line credit card numbers you wanted, with <span class=\"shw\">surreptitious<\/span> swipes, receipts (before XXX7307 was printed), etc.<\/p>\n<p>The problem is the Internet enables anonymous, scalable, and transferable fraud.\u00a0 Attacks are effectively anonymous because they&#8217;re impossible to trace.\u00a0 Automation makes stealing 10,000 cards as easy as 1.\u00a0 And transferability lets one attacker develop an attack, and give it to 1,000 others (often with less skill, like <a href=\"http:\/\/en.wikipedia.org\/wiki\/Script_kiddie\">script kiddies<\/a>).\u00a0 (Compare this to lock-picking:\u00a0 difficult to do without being physically present, difficult to pick extra locks, and hard to teach someone else to do.)<\/p>\n<p>Pure electronic voting introduces these same problems, without the corresponding benefits.\u00a0 Elections are infrequently occurring events, with high stakes and incentives to tamper.<\/p>\n<p>What&#8217;s wrong with optically scanned paper ballots?\u00a0 Machines can help with counting, but there&#8217;s <strong>always<\/strong> a way to verify.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why do we need electronic voting machines, really? When we started Open Market in 1994 and built one of the first eCommerce systems, we realized we might be opening pandora&#8217;s box for fraud.\u00a0 At that time, you could steal all &hellip; <a href=\"https:\/\/payne.org\/blog\/maybe-voting-should-be-low-tech\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-80","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/payne.org\/blog\/wp-json\/wp\/v2\/posts\/80","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/payne.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/payne.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/payne.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/payne.org\/blog\/wp-json\/wp\/v2\/comments?post=80"}],"version-history":[{"count":0,"href":"https:\/\/payne.org\/blog\/wp-json\/wp\/v2\/posts\/80\/revisions"}],"wp:attachment":[{"href":"https:\/\/payne.org\/blog\/wp-json\/wp\/v2\/media?parent=80"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/payne.org\/blog\/wp-json\/wp\/v2\/categories?post=80"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/payne.org\/blog\/wp-json\/wp\/v2\/tags?post=80"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}