diff -r 9feafc9bbe9f -r a399727e1600 slides/slides02.tex --- a/slides/slides02.tex Tue Oct 01 00:13:40 2013 +0100 +++ b/slides/slides02.tex Tue Oct 01 12:59:31 2013 +0100 @@ -474,6 +474,23 @@ \end{frame}} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +\mode{ +\begin{frame}[c] + +Which security requirements do paper ballots satisfy better than voice voting?\bigskip + +\begin{itemize} +\item Integrity +\item Enfranchisement +\item Ballot secrecy +\item Voter authentication +\item Availability +\end{itemize} + +\end{frame}} + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \mode{ \begin{frame}[t] @@ -508,21 +525,6 @@ \end{frame}} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -\mode{ -\begin{frame}[c] - -Which security requirements do paper ballots satisfy better than voice voting?\bigskip - -\begin{itemize} -\item Integrity -\item Enfranchisement -\item Ballot secrecy -\item Voter authentication -\item Availability -\end{itemize} - -\end{frame}} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% @@ -610,7 +612,7 @@ \begin{itemize} \item acquired a machine from an anonymous source\medskip -\item the source code running the machine was tried to be kept secret\medskip\pause +\item they try to keep secret the source code running the machine\medskip\pause \item first reversed-engineered the machine (extremely tedious) \item could completely reboot the machine and even install a virus that infects other Diebold machines @@ -653,7 +655,7 @@ \end{center}\pause You still have to solve problems about -voter registration, voter authentification, guarding against tampering +voter registration, voter authentication, guarding against tampering \end{frame}} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% @@ -686,7 +688,8 @@ \begin{itemize} \item keep a paper trail and design your system to keep this secure\medskip \item make the software open source (avoid security-by-obscurity)\\ -{\small\mbox{}\hfill source code for Estonian vote \textcolor{blue}{\url{http://goo.gl/oRMHAI}}}\medskip +{\small\mbox{}\hfill source code for Estonian e-vote included\\ +\mbox{}\hfill\textcolor{blue}{\url{http://goo.gl/oRMHAI}}}\medskip \item have a simple design in order to minimise the attack surface \end{itemize} @@ -710,6 +713,21 @@ \end{frame}} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +\mode{ +\begin{frame}[c] +\frametitle{Online Banking vs.~E-Voting} + +\begin{itemize} +\item online banking: if fraud occurred you try to identify who did what (somebody's account got zero)\bigskip +\item e-voting: some parts can be done electronically, but not the actual voting (final year project: online voting) +\end{itemize} + + +\end{frame}} +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \mode{