Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Is E2E Verifiability a Magic Bullet for Online Voting

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the limitations of End-to-End Verifiability (E2E-V) in online voting systems through this 28-minute conference talk from DEF CON 33's Voting Village. Examine how E2E-V, a cryptographic paradigm that allows voters to verify their votes were cast as intended, recorded as cast, and tallied as recorded, is being promoted as a "magic bullet" for secure internet voting to public officials at county and state levels. Discover why E2E-V fails to address certain critical vulnerabilities, particularly client-side attacks and malware that can compromise voting applications and devices outside the cryptographic protection loop. Learn about server-side vulnerabilities that exist beyond the cryptographic framework and understand how client-side systems remain the primary attack vector even in E2E-V-equipped voting systems. Compare expert perspectives on E2E-V limitations with the marketing claims of commercial internet voting system promoters, gaining insight into the gap between cryptographic theory and practical security implementation in digital voting infrastructure.

Syllabus

DEF CON 33 - Voting Village - Is E2E Verifiability a Magic Bullet for Online Voting - John Odum

Taught by

DEFCONConference

Reviews

Start your review of Is E2E Verifiability a Magic Bullet for Online Voting

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.