hws/hw02.tex
changeset 239 0db764174afb
parent 193 a97b828bf87f
child 372 486153025d71
--- a/hws/hw02.tex	Fri Oct 10 15:49:23 2014 +0100
+++ b/hws/hw02.tex	Fri Oct 10 16:14:55 2014 +0100
@@ -21,19 +21,21 @@
 \item[$\Box$] Availability
 \end{itemize}
 
+\item Explain how an attacker can use chain voting in order to
+  influence the outcome of a poll using paper ballots.
 
-\item Explain how an attacker can use chain voting in order to influence the outcome of a 
-poll using paper ballots. 
-
-\item Which of the following mechanisms help with defending against chain voting? Check all 
-that apply. Give a brief reason for each defence that mitigates chain voting attacks.
+\item Which of the following mechanisms help with defending against
+  chain voting? Check all that apply. Give a brief reason for each
+  defence that mitigates chain voting attacks.
 
 \begin{itemize}
 \item[$\Box$] Using a glass ballot box to make it clear there are no
   ballots in the box before the start of the election.
 \item[$\Box$] Distributing ballots publicly before the election.
 \item[$\Box$] Checking that a voter's ID (drivers license, passport) matches the voter.
-\item[$\Box$] Each ballot has a unique ID. When a voter is given a ballot, the ID is recorded. When the voter submits his or her ballot, this ID is checked against the record.
+\item[$\Box$] Each ballot has a unique ID. When a voter is given a
+  ballot, the ID is recorded. When the voter submits his or her
+  ballot, this ID is checked against the record.
 \end{itemize}
 
 \item In the Estonian general election, votes can be cast via Internet