handouts/ho02.tex
changeset 195 78309f29a58f
parent 194 5e7976fa8577
child 199 20af800ce736
--- a/handouts/ho02.tex	Fri Oct 03 16:04:49 2014 +0100
+++ b/handouts/ho02.tex	Fri Oct 03 16:10:50 2014 +0100
@@ -33,7 +33,7 @@
 scale of Turing's halting problem, which is proved that it can
 never be solved in general, but more in the category of being
 unsolvable with current technology. This is not just my
-opinion, but also shared by many security researchers amogst
+opinion, but also shared by many security researchers amongst
 them Alex Halderman, who is the world-expert on this subject
 and from whose course on Securing Digital Democracy I have
 most of my information and inspiration. It is also a
@@ -95,7 +95,7 @@
         defended against. The problem with this is that if
         the incentives are great and enough resources are
         available, then maybe it is feasible to mount a DoS
-        attack agains voting server and by bringing the
+        attack against voting server and by bringing the
         system to its knees, change the outcome of an
         election. Not to mention to hack the complete
         system with malware and change votes undetectably.                
@@ -139,7 +139,7 @@
   \begin{itemize}
   \item The voting system should accept all authorised votes
         and produce results in a timely manner. If you move
-        an election online, you have to guard agains DoS 
+        an election online, you have to guard against DoS 
         attacks for example.
    \end{itemize}
 \end{itemize}
@@ -176,13 +176,13 @@
 were mainly based on voting by show of hands. While this
 method of voting satisfies many of the requirements stipulated
 above, the main problem with hand voting is that it does not
-guaranty ballot secrecy. As far as I know the old greeks and
-romans did not perceive this as a problem, but the result was
+guaranty ballot secrecy. As far as I know the old Greeks and
+Romans did not perceive this as a problem, but the result was
 that their elections favoured rich, famous people who had
 enough resources to swing votes. Even using small coloured
 stones did not really mitigate the problem with ballot
 secrecy. The problem of authorisation was solved by friends or
-neighbours vouching for you to prove you are elegible to vote
+neighbours vouching for you to prove you are eligible to vote
 (there were no ID cards in ancient Greece and Rome).
 
 Starting with the French Revolution and the US constitution,
@@ -265,7 +265,7 @@
 incompetency and inferiority of their products, by requiring
 that election counties must not give the machines up for
 independent review. They also kept their source secret. 
-This meant Halderman and his group had to obatain a machine
+This meant Halderman and his group had to obtain a machine
 not in the official channels. Then they had to reverse 
 engineer the source code in order to design their attack. 
 What this all showed is that a shady security design is no 
@@ -307,7 +307,7 @@
 India. Essentially they designed a bespoke voting device,
 which could not be used for anything else. Having a bespoke
 device is a good security engineering decision because it
-makes the attack surface smaller. If you have a fullfledged
+makes the attack surface smaller. If you have a full-fledged
 computer behind your system, then you can do everything a
 computer can do\ldots{}that is a lot, including a lot of
 abuse. What was bad that these machines did not have the
@@ -353,7 +353,7 @@
 able to covertly manipulate results by inserting malware on
 the voters' computers. Overall, their recommendation is 
 to abandon Internet voting and to go back to an entirely
-paper-based voting process. In face of state-sponsered
+paper-based voting process. In face of state-sponsored
 cyber-crime (for example NSA), Internet voting cannot be made
 secure with current technology. They have a small video
 clip with their findings at
@@ -401,7 +401,7 @@
 sophisticated process called \emph{zero-knowledge-proofs}.
 They essentially allow one to convince somebody else to know
 a secret without revealing what the secret is. This is a kind
-of cryptographiv ``magic'', like the Hellman-Diffie protocol
+of cryptographic ``magic'', like the Hellman-Diffie protocol
 which can be used to establish a secret even if you can only
 exchange postcards with your communication partner. We will
 look at zero-knowledge-proofs in a later lecture in more