--- a/hws/hw02.tex Fri Oct 10 15:49:23 2014 +0100
+++ b/hws/hw02.tex Fri Oct 10 16:14:55 2014 +0100
@@ -21,19 +21,21 @@
\item[$\Box$] Availability
\end{itemize}
+\item Explain how an attacker can use chain voting in order to
+ influence the outcome of a poll using paper ballots.
-\item Explain how an attacker can use chain voting in order to influence the outcome of a
-poll using paper ballots.
-
-\item Which of the following mechanisms help with defending against chain voting? Check all
-that apply. Give a brief reason for each defence that mitigates chain voting attacks.
+\item Which of the following mechanisms help with defending against
+ chain voting? Check all that apply. Give a brief reason for each
+ defence that mitigates chain voting attacks.
\begin{itemize}
\item[$\Box$] Using a glass ballot box to make it clear there are no
ballots in the box before the start of the election.
\item[$\Box$] Distributing ballots publicly before the election.
\item[$\Box$] Checking that a voter's ID (drivers license, passport) matches the voter.
-\item[$\Box$] Each ballot has a unique ID. When a voter is given a ballot, the ID is recorded. When the voter submits his or her ballot, this ID is checked against the record.
+\item[$\Box$] Each ballot has a unique ID. When a voter is given a
+ ballot, the ID is recorded. When the voter submits his or her
+ ballot, this ID is checked against the record.
\end{itemize}
\item In the Estonian general election, votes can be cast via Internet