Is E2E Verifiability a Magic Bullet for Online Voting
Stuck in Tutorial Hell? Learn Backend Dev the Right Way
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the limitations of End-to-End Verifiability (E2E-V) in online voting systems through this 28-minute conference talk from DEF CON 33's Voting Village. Examine how E2E-V, a cryptographic paradigm that allows voters to verify their votes were cast as intended, recorded as cast, and tallied as recorded, is being promoted as a "magic bullet" for secure internet voting to public officials at county and state levels. Discover why E2E-V fails to address certain critical vulnerabilities, particularly client-side attacks and malware that can compromise voting applications and devices outside the cryptographic protection loop. Learn about server-side vulnerabilities that exist beyond the cryptographic framework and understand how client-side systems remain the primary attack vector even in E2E-V-equipped voting systems. Compare expert perspectives on E2E-V limitations with the marketing claims of commercial internet voting system promoters, gaining insight into the gap between cryptographic theory and practical security implementation in digital voting infrastructure.
Syllabus
DEF CON 33 - Voting Village - Is E2E Verifiability a Magic Bullet for Online Voting - John Odum
Taught by
DEFCONConference