• Risks Digest 33.97 (2/2)

    From RISKS List Owner@21:1/5 to All on Mon Dec 18 00:35:20 2023
    [continued from previous message]

    system security by enabling public scrutiny of the software code,
    surfacing bugs more quickly and thoroughly, and by increasing
    transparency into the systems that count votes. This is not what has
    occurred with the voting system breaches. We should still pursue
    open-sourced voting systems, but that shouldn't preclude calling for a
    vigorous and immediate investigation into the voting system breaches
    and misappropriation of software by Trump allies and election
    deniers. We can do both. We must do both. Susan Greenhalgh is the
    senior advisor for election security at Free Speech For People

    [I removed a slew of hot links for RISKS. If you would like to see a
    clickable version, contact Susan. PGN]

    [Thank you, Susan for staying with us on this issue. (NB: Her father
    was a hightly respected long-standing voice in the earlier days of the
    quest for greater integrity in elections). PGN]

    ------------------------------

    Date: Mon, 11 Dec 2023 16:39:34 -0000 (UTC)
    From: Thomas Koenig <tkoenig@netcologne.de>
    Subject: Re: Experts Warn of 'Serious Threats' from Election Equipment
    (Greenhalgh, RISKS-33.96))

    Sounds reasonable so far, but here...

    saying software breaches have "urgent implications for
    the 2024 election and beyond."

    I see a strong argument for security through obscurity, which
    (as comp.risks readers are assumed to know) is the weakest of all
    forms of security.

    The basic premise seems to be that the software is buggy, and that
    the bugs can be exploited by somebody who wants to falsify the
    election results. In other words, that it contains backdoors,
    intentional or unintentional.

    This begs the questions:

    - Why is this assumed to be the case? Was the software not written
    to a standard that would make this unlikely/impossible?
    [Yes. PGN. The standards are weak. PGN]

    - Who has access to the software now?
    [Apparently quite a few people. PGN]

    - What safeguards are in place so make sure that people with
    that access do not misuse these potential backdoors?
    [Almost none. PGN]

    - What would be the public/political reaction if such an assumed
    backdoor was indeed found (as the authors of the letter seem to
    assume can happen)? Would this actually put the integrity of
    the last election into doubt, as well as that of the upcoming
    election?
    [Perhaps not. There was more oversight than ever before. PGN]

    Following this discussion in the U.S. leaves me somewhat bewildered.
    Germany has always had paper ballots, which are kept and which can be re-counted if necessary.

    This does not preclude attempts to falsify the election by
    presumably intentional miscounting (which has happened) or by pure
    chaos, including more ballots cast than voters exist (like in the
    last election), but at least it leaves a clear trail if anybody
    wants to examine it.

    [Unfortunately, the U.S. has a long history of proprietary commercial
    systems with no incisive audit trails that defy scrutiny of the software --
    and the hardware! Germany, The Netherlands, and other countries have been
    much more proactive. PGN]

    ------------------------------

    Date: Mon, 11 Dec 2023 12:41:44 -0500
    From: Cliff Kilby <cliffjkilby@gmail.com>
    Subject: Re: WeWork has failed, leaving damage in its wake
    (Kruk and Baker, RISKS-33.96)

    Mr Baker, Noting you've found capitalism to be akin to optimistic
    concurrency, I would like to point to the known risks of that system. Once
    it reaches a state where it should start deadlocking due to rule violations,
    it starts a retry cascade. Retry cascades should eventually terminate in a well ordered system. I have not observed capitalism to follow the model of a well ordered system. Furthermore, mother nature's evolutional algorithm is most closely modeled by bogosort. In both, the cost of failure is total destruction, and there are many more failures than successes. Given this,
    are you advocating for more severe punishments for companies which gamble
    with other people's assets?

    ------------------------------

    Date: Sat, 28 Oct 2023 11:11:11 -0800
    From: RISKS-request@csl.sri.com
    Subject: Abridged info on RISKS (comp.risks)

    The ACM RISKS Forum is a MODERATED digest. Its Usenet manifestation is
    comp.risks, the feed for which is donated by panix.com as of June 2011.
    SUBSCRIPTIONS: The mailman Web interface can be used directly to
    subscribe and unsubscribe:
    http://mls.csl.sri.com/mailman/listinfo/risks

    SUBMISSIONS: to risks@CSL.sri.com with meaningful SUBJECT: line that
    includes the string `notsp'. Otherwise your message may not be read.
    *** This attention-string has never changed, but might if spammers use it.
    SPAM challenge-responses will not be honored. Instead, use an alternative
    address from which you never send mail where the address becomes public!
    The complete INFO file (submissions, default disclaimers, archive sites,
    copyright policy, etc.) has moved to the ftp.sri.com site:
    <risksinfo.html>.
    *** Contributors are assumed to have read the full info file for guidelines!

    OFFICIAL ARCHIVES: http://www.risks.org takes you to Lindsay Marshall's
    delightfully searchable html archive at newcastle:
    http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue.
    Also, ftp://ftp.sri.com/risks for the current volume/previous directories
    or ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume
    If none of those work for you, the most recent issue is always at
    http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-33.00
    ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001)
    *** NOTE: If a cited URL fails, we do not try to update them. Try
    browsing on the keywords in the subject line or cited article leads.
    Apologies for what Office365 and SafeLinks may have done to URLs.
    Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

    ------------------------------

    End of RISKS-FORUM Digest 33.97
    ************************

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)