WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

214

Funny.

Funny.

(post is archived)

[–] 0 pt

a) 1 vote, 1 person, 1 identity ALWAYS means that you can tie an individuals identity to their vote.

Fundamentally wrong. You do not understand secure electronic voting, at all.

If what you said was correct, then every single system that made it to the 3rd party audit step would get failed and they could not implement their system. The target of the votes from that 1 person is decoupled but the identity itself gets an assigned value for that particular voting object (the session) making it impossible for that voter to make another entry, again. Two separate object values that are in no way coupled, at all, in the entire black chain. If what you said was correct, then no password would ever work because every system everywhere would know the password and that is absolutely absurd to think something like that.

b) The only method that we know of that allows for reasonable guarantee of a secret ballot is the paper vote.

False. The 2020 election proved that paper ballots are among the least secure voting methods possible.

The most secure method, as proven by multiple cybersecurity audits, is secure electronic voting that meets basic elements.

If you are actually interested in secure electronic voting, how it works, and how security works with it, please read this:

https://www.attejuvonen.fi/thesis-voting-security-2019-10-01.pdf

If you are not and just want to screech into the wind, please ignore everything I said and continue to reply with ignorant talking points that were addressed in the 1980s and 1990s.

[–] 0 pt

>If what you said was correct, then no password would ever work because every system everywhere would know the password and that is absolutely absurd to think something like that.

LOL.

Up intil recently Intel literally has an entire OS running on their CPUs based on Minix, link: https://www.zdnet.com/article/minix-intels-hidden-in-chip-operating-system/

Hey, you wrote that for the whole world to read, not me. I agree, we can just disregard everything you wrote.

[–] 0 pt

You didn't refute anything I said at all.

And, instead, doubled down, and are now saying that all systems send plain text passwords for all authentications for every system, ever. Unless you'd like to retract your pretend rebuttal and admit you don't know what you're talking about?

Hur dur, Minx, therefore, everyone will know who you voted for!

Check your shoes: they are probably untied. Ensure you put your pants on, too.

[–] 0 pt (edited )

I provided an explanation that the entire ecosystem below the os is a set of virtualized, paravirtualized and customized operating systems that are NOT under the control of the operating system or the user but the vendor of the hardware or any other third parties that have access to those layers. This is an ABSOLUTE fact.

Feel free to disprove that if you like.

You know what else is also a fact? Anything NOT under your control is / can be UNDER SOMEONE ELSES CONTROL. So, for example, whomever controls the TPM chip controls the credentials to your wholy encrypted disk. Whomever controls the firmware on your hard drive controls access to the data on your hard drive.

You live under the illusion that you, the guest of an operating system has any control over anything. You don't. You and your silly os are mere guests in someone elses playground.