TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Software used to count Australian Senate votes is a “trade secret”

341 pointsby mlandaueralmost 11 years ago

13 comments

colmmaccalmost 11 years ago
Visibility of the source code is a side-show in electronic voting systems. Even if the source code is published, there is no way to be sure that that is the code that is running on the hardware, or to be certain that the hardware itself has not been tampered with. Votes need to be printed out on paper, verified by the voter, and counted by hand.<p>Still, when we had the source code for the Irish system (now abandoned due to our efforts) analyzed by a commission, it was found it had actual counting errors.<p><a href="http://www.stdlib.net/~colmmacc/www.cev.ie/htm/report/part4_2.htm" rel="nofollow">http:&#x2F;&#x2F;www.stdlib.net&#x2F;~colmmacc&#x2F;www.cev.ie&#x2F;htm&#x2F;report&#x2F;part4_...</a><p>Amazing!
评论 #8039860 未加载
评论 #8039889 未加载
评论 #8039841 未加载
评论 #8039958 未加载
评论 #8040127 未加载
thrushalmost 11 years ago
Professor Alex Halderman from Michigan has performed a few studies on Electronic Voting and Electronic Voting Machines, and essentially has proven that it is insecure. At one point, he hacked an American EVM to play the Michigan Fight song on every submission. You can read a few of his papers here: [1][2]<p>The challenge of creating anonymous and secure voting systems is still an area of constant research, and I do not believe that the Australian gov&#x27;t has solved these problems yet.<p>Should we view the source? If we know it&#x27;s insecure because it&#x27;s basically unbelievable to think that otherwise, what good will seeing the code do? The fact that it is not being shown basically confirms the insecurity (if it was truly secure, we&#x27;d be able to see it without having a negative effect on the system). It seems the right thing to do is to fight this method of voting until EVMs are more secure, but maybe we should hedge our bets. Maybe we&#x27;re going to be stuck with these EVMs in the interim, and we should avoid leaking the source to prevent people who have difficulty viewing the source.<p>[1] <a href="https://jhalderm.com/pub/papers/evm-ccs10.pdf" rel="nofollow">https:&#x2F;&#x2F;jhalderm.com&#x2F;pub&#x2F;papers&#x2F;evm-ccs10.pdf</a> [2] <a href="https://jhalderm.com/pub/papers/voting-wecsr11.pdf" rel="nofollow">https:&#x2F;&#x2F;jhalderm.com&#x2F;pub&#x2F;papers&#x2F;voting-wecsr11.pdf</a>
评论 #8039980 未加载
评论 #8040093 未加载
sgryphonalmost 11 years ago
As suggested, releasing the raw data as input would be better than the source code anyway. The raw data should not have any &#x27;trade secret&#x27; or &#x27;hack vulnerability&#x27;.<p>Vote for it on data.gov.au <a href="https://datagovau.ideascale.com/a/dtd/AEC-Raw-voting-data/42018-26233" rel="nofollow">https:&#x2F;&#x2F;datagovau.ideascale.com&#x2F;a&#x2F;dtd&#x2F;AEC-Raw-voting-data&#x2F;42...</a>
评论 #8040553 未加载
3rg0s4malmost 11 years ago
The algorithm used is fairly complicated, being both preferential and proportional. (The lower house is preferential but not proportional).<p>Here is a nifty visualization of the senate vote flows in NSW: <a href="http://www.grwpub.info/senate/nsw.svg" rel="nofollow">http:&#x2F;&#x2F;www.grwpub.info&#x2F;senate&#x2F;nsw.svg</a>.<p>Essentially you need a certain number of votes to cross the line and win a seat. After winning the seat, those votes are subtracted from the party. Eventually when no parties have enough votes, the lowest voted party is eliminated and its votes are redistributed by preference.
评论 #8040219 未加载
josephgalmost 11 years ago
Thats appalling.<p>As an Australian citizen, who should I call about this to voice my objection?
评论 #8039859 未加载
评论 #8039822 未加载
评论 #8040086 未加载
评论 #8039915 未加载
评论 #8039823 未加载
评论 #8039811 未加载
quinkalmost 11 years ago
<a href="http://www.zdnet.com/au/senate-calls-for-release-of-aec-vote-count-source-code-7000031437/" rel="nofollow">http:&#x2F;&#x2F;www.zdnet.com&#x2F;au&#x2F;senate-calls-for-release-of-aec-vote...</a><p><a href="http://www.brisbanetimes.com.au/it-pro/government-it/vexatious-digital-activist-forces-australian-electoral-commission-to-release-secret-computer-code-20140710-zt27i.html" rel="nofollow">http:&#x2F;&#x2F;www.brisbanetimes.com.au&#x2F;it-pro&#x2F;government-it&#x2F;vexatio...</a>
评论 #8039771 未加载
DigitalSeaalmost 11 years ago
If releasing the code is an issue, how about a compromise instead? How about releasing the code to a handful of independent third party firms and academics to determine for themselves if the code is safe. Does the AEC have an audit process in place where the code is checked and is there a testing environment of which the code is strongly tested for issues?<p>Given the undeniable complexity of such an algorithm, it would take more than a single audit to verify that it is secure. I don&#x27;t doubt there is something up in the process somewhere, when it comes to vote redistribution I believe if not done correctly and properly tested, there could be some issues in that part alone.<p>Or better yet, release the data and allow academics from multiple institutions to independently run their own counts and then see if the results match up with that of the AEC&#x27;s. I think that could be another way without releasing the code and verifying the results are accurate.
评论 #8040732 未加载
josephschmoealmost 11 years ago
Honestly, the only way to prevent election rigging is to associate each vote with a key, make the key-vote-district database public and give each voter a copy of their vote keys.<p>If each vote is verifiable to the voter and the whole database is public, then we can have independent analysis done on the votes and no vote rigging is possible, except for creating additional fake keys.<p>And we can fix that problem simply by making the keys associated with a voter registration, which requires an ID. Same way we do now. Granted, that&#x27;s still limited by the issues with paper ballots.
EGregalmost 11 years ago
I propose someone sponsors a bill whereby any voting software used to count votes by the public must be open sourced and have several signatures (md5, sha1, etc.) which each voting center must verify before deploying it.<p>The voting centers would just have generic computers (perhaps with special peripherals for voting) which would load the software from a file and they could verify the signature of the file. There could be software that does this automatically. Such as the Apple app store.<p>That way, if any data centers detect an anomalous signature, they&#x27;d report it and it would raise a stink.<p>This is similar to the Apple App store except instead of Apple owning the ecosystem it would be their government. There are even better ways without all this crap -- either use an existing App Store from Google or Apple (or all) or have a browser extension and distributed app store from a distributed social app platform ;-)
sergiotapiaalmost 11 years ago
A counting algorithm is a trade secret? How did this even come to be?
评论 #8039851 未加载
mlandaueralmost 11 years ago
If you want to help solve this please contribute to @mjec&#x27;s campaign to raise money for representation by a barrister at the AAT appeal <a href="http://www.pozible.com/project/183015" rel="nofollow">http:&#x2F;&#x2F;www.pozible.com&#x2F;project&#x2F;183015</a>
Tloewaldalmost 11 years ago
I&#x27;ve always though the Hare Clark system is intrinsically I democratic (even though it produces reasonable results) because no one seems to understand it (certainly the people who claim to can&#x27;t explain it). It&#x27;s also non deterministic -- the outcome can change hassle on the order in which votes are counted (although the impact will be very small in all probability)
评论 #8040240 未加载
评论 #8040120 未加载
评论 #8040002 未加载
评论 #8041238 未加载
doctorKriegeralmost 11 years ago
how hard is to add numbers?
评论 #8043214 未加载