Ben Adida Profile picture
22 Nov, 13 tweets, 3 min read
1/ Why is Georgia counting votes for a third time? Let's talk about it.

npr.org/sections/biden…
2/ most states have recount procedures that trigger below a certain margin of victory. Sometimes automatic, sometimes has to be requested by a candidate. In Georgia, threshold is 0.5% & recount needs to be requested by a candidate after certification. Wait, what's certification?
3/ certification is the real result. When TV networks call an election, that carries no legal weight, it's just the media predicting the outcome. They're usually right, with some notable exceptions. Certification is when the state, having triple checked, declares their winner.
4/ Georgia certified on Friday. Trump just requested a recount. So that's happening now.

But, you're thinking, wasn't there just a recount last week?
5/ it wasn't exactly a recount, rather it was an audit, specifically a risk-limiting audit. It's the audit the @voting_works helped with.

6/ a risk-limiting audit is a way to check that the tabulators declared the right winner. It's not designed to verify the exact vote count, only to check that the vote counts aren't so far off as to have declared the wrong winner.

risklimitingaudits.org
7/ typically, a risk-limiting audit can achieve its goal just by reviewing a small sample of the ballots. But when the margin is very tight, like it was in Georgia, the audit requires looking at so many ballots that it's essentially a full manual count.
8/ it differs from a recount in two critical ways:

- the vote tallies are not changed by the audit, the goal is just to confirm (or reverse) the winner.

- the process of counting each vote is very methodical and free of excessive legal wrangling over every ballot.
9/ also, because risk-limiting audits are typically performed on small samples, they can be done quickly, as part of the normal hygiene of running an election. That means they can be done as routine checks *before* certification.
10/ Georgia is one of a few states that has mandated risk-limiting audits before certification. But their margin was very tight. That's why they counted ballots last week, and why they confirmed Biden as the winner, and then certified on Friday.
11/ so now we're past the count and the audit, and we're at the recount stage. And the interesting wrinkle is that, in Georgia, recounts are only doable as machine rescans.

So that's what's about to happen, and that's why Georgia is counting ballots for a third time this year.
12/ in terms of what to expect, it's pretty clear: unless something incredibly unusual is discovered, this machine recount is likely to give an almost identical count as the first time around. Some differences in how borderline ballots will be adjudicated, probably not much.
13/ in summary:

- first georgia counted ballots with scanners.

- then they counted ballots by hand as part of a risk-limiting audit, confirming the winner but not altering vote counts.

- now they're recounting with scanners, which *could* alter the counts but likely not much.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Ben Adida

Ben Adida Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @benadida

20 Nov
1/ The @voting_works team has been working around the clock for the last week to support the State of Georgia in running their first state-wide risk-limiting audit, which turned into a full hand-count.
2/ Here's the Secretary of State's press release:

sos.ga.gov/index.php/elec…
3/ and coverage from AJC:

ajc.com/politics/break…
Read 8 tweets
14 Aug
1/ I spent a bit of time looking at the Canada COVID Alert app this evening. Bottom line: this app is pretty much the model for how to do this kind of tech.
2/ It's super clear about what data it collects and doesn't, and about how it works. This is not easy stuff to convey.
3/ It's such a caring and lovely flow. Here it is letting you know it's about to ask for that single permission it needs – to access the Google/Apple API.
Read 8 tweets
19 Jul
1/ In light of the voting question that will never die -- "if I can do X online, why can't I vote online" -- I'm reminded that most people don't have a good intuition for what makes things secure. So let's explore.

Security online depends predominantly on logging and auditing.
2/ This probably sounds weird and surprising, but hear me out. And there are exceptions that I'll get to. But truly, security depends predominantly on logging and auditing.
3/ Consider the Twitter hack from earlier this week. We found out about it because the attackers tweeted a Bitcoin scam visible to everyone. Twitter is, by definition, a public audit log. Those messages looked odd. We all saw them. That's why we all knew: Twitter was hacked.
Read 18 tweets
25 Jun
1/ a little story. When I was 18yo, summer 1995, I had the immense luck of working as an intern at Hearst Publishing in NYC. I was a rising sophomore, the web was just taking off, and that internship taught me so much, it dramatically kickstarted my career.
2/ the group VP was a guy who dressed like a banker and led the effort to create the first dynamic web site for Hearst. His office was on the 5th floor, top most floor of the Hearst building at the time, 57th and 8th (there's now a huge tower at that address.)
3/ About every other day, he wanted a demo, so he would call me up to his office from the dungeon basement where the small engineering team worked.
Read 13 tweets
27 Apr
1/ Who's ready for another Apple/Google contact tracing thread? I know I am!

To me, the most interesting piece of the puzzle is how much trust we place in the phone operating system vs. the app, and the role of the phone's operating system in protecting your privacy *from apps*.
2/ Let's start with the most recent news: Germany has relented and is adopting the Apple/Google approach, the so-called "decentralized" approach, vs. the one Germany wanted (along with France).

reuters.com/article/us-hea…
3/ Both approaches have in common:

- phones broadcast identifiers over Bluetooth, rotated every 15 min, not linkable to one another.

- phones read broadcasts from others, recording which identifiers they've come in contact with.

- there's a server, run by a health department.
Read 17 tweets
23 Apr
A few days ago, I delved into the Google/Apple contact tracing -->

Today's news: "France is asking Google+Apple to weaken privacy protections around digital contact tracing" --> theguardian.com/world/2020/apr…

The news is misleading, the issues are complex.

🧵
2/ The key issue: G+A and the French+German govs are making different privacy tradeoffs.

The French+German protocol, known as ROBERT github.com/ROBERT-proximi…, seems more closely aligned with classic contact tracing privacy, but with one large risk.
3/ In classic contact tracing, as best as I can tell, you get a call from the health department saying "you've been in contact with an infected individual." They don't tell you who, and they don't tell you when & where, because then you might figure out who it is.
Read 14 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!