, 18 tweets, 3 min read
My Authors
Read all threads
1/ In light of the voting question that will never die -- "if I can do X online, why can't I vote online" -- I'm reminded that most people don't have a good intuition for what makes things secure. So let's explore.

Security online depends predominantly on logging and auditing.
2/ This probably sounds weird and surprising, but hear me out. And there are exceptions that I'll get to. But truly, security depends predominantly on logging and auditing.
3/ Consider the Twitter hack from earlier this week. We found out about it because the attackers tweeted a Bitcoin scam visible to everyone. Twitter is, by definition, a public audit log. Those messages looked odd. We all saw them. That's why we all knew: Twitter was hacked.
3.5/ What would have happened if Twitter attackers had only used their access to read DMs and then possibly switched credentials back to the original user? Would victims have detected it?

Twitter has extensive logs of user actions, so maybe, but it would have been much harder.
4/ How is online banking secured? If you get phished and someone takes your money, you'll figure it out the next time you log in, because your money will be gone. There's an audit log of all transactions. It never goes away. That's how the bank can make you whole.
5/ Consider the advanced security measures that Google takes to secure high-value accounts. A lot comes down to extensive logging & analysis of user behavior: do you usually log in from Russia at 3am Eastern and search your email for "bank accounts"? Seems fishy, lock it down.
6/ Don't get me wrong, there are important security measures like encrypted connections, two-factor authentication, hardware tokens, and more that are critical.

But all of these, given enough attacker motivation, can be subverted. For most users, it's sadly not that hard.
7/ At the end of the day, the final safety net of security is extensive logging and detection of badness, either proactive or reactive. The devious acts leave a trace. That trace can be detected and, oftentimes, reverted to make users whole, sometimes even prevented altogether.
8/ (OK, exception: end-to-end encryption & other advanced crypto. In those cases, say Signal messaging, the final security safety net is crazy math running on end-user devices. Super cool, but only useful in very specific use cases. Particularly useful for private messaging.)
9/ So when you want a mental model for online security in everyday activities, it's extensive logging and analysis of those logs that provide the real security.

Stop thinking of locked down Fort Knox and unbreakable encryption. Start thinking of tedious accounting & logging.
10/ OK, still with me?

So now, voting. Why is voting online so impossibly hard?
11/ Because, in voting, by definition, we have to throw away a lot of logs. We can't record who votes for whom. We need a secret ballot. You can't log back in later to check that your vote was recorded properly, or you might be able to sell your vote.
12/ So that means if an attacker *does* break in and change your vote, it's going to very difficult to detect this, because, by design, you shouldn't be able to come back later and check how you voted, and no one else should ever know how you voted.
13/ The safety net of online security is *gone* in the case of voting. Because of the secret ballot. So you end up having to trust some third parties, notably the servers, and hope they never got hacked. That's a no-go for public office (it's probably fine for student council.)
14/ Now, you might ask: ok, so if we can't log & analyze, can we sprinkle some of that crypto magic as an alternative safety net?

And yes, in fact, you can. See @heliosvoting, Microsoft ElectionVault, and all of the prior work on e2e-verifiable voting.
15/ Unfortunately, where Signal messaging has been able to reduce end user work to a very small amount, no one has yet figured out the equivalent for voting. A lot of end users would need to do a lot of complex work to secure the cryptography and the vote. Not practical.
16/ And that's why Internet voting is the equivalent of landing on the Sun when all we've done is land on the Moon.

Because security depends on logging. And voting, by design, throws away the logs.
Correction: ummm, Microsoft Election*Guard*, not Vault.
Missing some Tweet in this thread? You can try to force a refresh.

Keep Current with Ben Adida

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!