Power BI Fundamentals - Create visualizations and dashboards from scratch
Save 40% on 3 months of Coursera Plus
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the limitations of End-to-End Verifiability (E2E-V) in online voting systems through this 28-minute conference talk from DEF CON 33's Voting Village. Examine how E2E-V, a cryptographic paradigm that allows voters to verify their votes were cast as intended, recorded as cast, and tallied as recorded, is being promoted as a "magic bullet" for secure internet voting to public officials at county and state levels. Discover why E2E-V fails to address certain critical vulnerabilities, particularly client-side attacks and malware that can compromise voting applications and devices outside the cryptographic protection loop. Learn about server-side vulnerabilities that exist beyond the cryptographic framework and understand how client-side systems remain the primary attack vector even in E2E-V-equipped voting systems. Compare expert perspectives on E2E-V limitations with the marketing claims of commercial internet voting system promoters, gaining insight into the gap between cryptographic theory and practical security implementation in digital voting infrastructure.
Syllabus
DEF CON 33 - Voting Village - Is E2E Verifiability a Magic Bullet for Online Voting - John Odum
Taught by
DEFCONConference