1/ There's been lots of speculation about why Antrim County, MI initially reported incorrect results on Wed. The results have since been corrected, but people are naturally wondering what happened. Here's the likely technical explanation and my assessment.
2/ First, see @MichSOS's new statement about the issue:
michigan.gov/documents/sos/…
It was human error, isn't a sign of anything malicious, and couldn't impact the official results in any way. But what exactly happened?
3/ The problem relates to the "election definition"--configuration files that describe the races and candidates on the ballots across the county.

In October, Antrim noticed an error in its election definition: two local races had been omitted in certain precincts.
4/ They fixed this by recreating the election definition and installing the corrected version on the scanners for affected precincts. However, precincts where the ballot wasn't impacted by the change continued to use the original election definition.
5/ Because of this, each individual scanner tabulated ballots correctly, but there was a problem when it came time to combine the results from across precincts.
6/ Antrim uses @dominionvoting ballot scanners, which store vote totals on memory cards. Think of the data on the card like spreadsheet, with a number for each choice. But there aren't any labels--it's the election definition that says which row corresponds to which candidate.
7/ When Antrim loaded the memory cards into its reporting system, the system interpreted them using the revised election definition. The numbers from scanners that used the old definition didn't line up with the right candidates, so the initial combined totals were very wrong.
8/ Fortunately, the individual scanners counted correctly. Each scanner prints its results on a paper "poll tape" at the end of election night, so Antrim re-entered the data from those printouts to get the correct overall totals.
9/ Even if Antrim hadn't caught this problem so quickly, it would have been found and corrected during normal post-election procedures. Every Michigan jurisdiction checks the poll tapes against the reported totals before certifying results.
10/ When the dust settles, we can investigate further and learn from these events. Defensive software engineering should help prevent such reporting glitches even if operators make a mistake. Still, Antrim responded well, and MI's failsafes worked as designed to ensure integrity.
11/ In conclusion, it appears that Antrim's problem:
* Isn't a sign of anything nefarious.
* Was corrected quickly.
* Has nothing to do with the version of the Dominion software in use.
* Is not a security vulnerability.
* Isn't likely to impact results in other jurisdictions.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with J. Alex Halderman

J. Alex Halderman Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jhalderm

8 Jun
1/ In a new research paper today, @MSpecter and I perform the first public, independent analysis of the security and privacy risks of Democracy Live's OmniBallot online voting platform.

Full paper:
internetpolicy.mit.edu/omniballot

Advice for voters:
internetpolicy.mit.edu/omniballot-adv…
2/ OmniBallot is a web-based platform that can be used in three ways:
1) Voters can download blank ballots to print, hand mark, and mail in.
2) Voters can mark ballots online and return them by mail, email, or fax.
3) In some states, voters can cast votes entirely online.
3/ Many jurisdictions use it for ballot delivery and accessible ballot marking, but a few states are now using it for online voting (“electronic ballot return”).
Read 23 tweets
13 Mar
1/ Remember Voatz, the “blockchain”-based Internet voting app that doesn’t really use blockchain to send votes? There's an excellent new security analysis by @trailofbits that confirms the issues recently reported by MIT researchers and finds *way* more problems.
2/ Notably, this time @Voatz commissioned the analysis itself, as @rachelegoodman1 and I recently advocated slate.com/technology/202….

It's the first public system-wide security assessment. Election officials should demand this kind of testing before considering such a system.
3/ What did it find? "Our security review resulted in seventy-nine (79) findings. A third of the findings are high severity ..."
Read 12 tweets
13 Feb
Today, @mspecter, @jimmykoppel, and @djweitzner released a detailed security analysis of Voatz, a blockchain-based Internet voting app that's used in West Virginia and other states. Their findings are devastating, bit.ly/VoatzPaper. But Voatz has even more problems! 1/
@mspecter @jimmykoppel @djweitzner The paper finds that the Voatz API server, if hacked, can change votes entirely. The authors say the app doesn't actually use a blockchain or an E2E-V protocol to secure app-server vote transmission, but essentially just a regular HTTPS connection to voatzapi.nimsim.com. 2/
@mspecter @jimmykoppel @djweitzner To protect the connection, Voatz uses certificate pinning. That means the app will only trust a specific HTTPS certificate to authenticate the server. For maximal security, the app should pin to a cert that is used only on a specific well hardened server. 3/
Read 11 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!