iVote, Electronic Voting, and Security: Controlling Access

One of the most important parts of securing any electronic data is making sure that only authorized parties have access to it. This can often be quite a challenge in larger organizations, especially if the user base grows. Assuming voter registration is about the same as it was in 2012, you have to figure out how to secure a system that handles 1.5M total users. Successfully authenticating that many users is quite a challenge, and almost any method used to do so has its pros and cons. Let’s take a…

iVote, Electronic Voting, and Security: An Introduction

I’m very honored and privileged to be part of the iVote Advisory Committee to Lt. Gov. Spencer Cox. This committee has a lot of smart people putting their minds towards considering all of the implications of expanding voting to be as convenient as pulling out a smartphone. I know several of the members personally, several by reputation, and several not at all, but from our first discussion, I feel confident that we’ll end up providing some very smart feedback that considers the full implications of turning personal connected devices into…