Technology can realize greatly intensified forms of continuous democratic participation, but such applications must be openly developed and publicly owned.
Every time someone confidently claims that we can cryptographically verify voting, they are deliberately or ignorantly keeping the complexity and necessity of verifying the verifier runtime, the data source, and the communication channels out of the picture.
Cryptography doesn’t solve voting verification problem, it obscures and shifts it.
Every time someone confidently claims that we can cryptographically verify voting, they are deliberately or ignorantly keeping the complexity and necessity of verifying the verifier runtime, the data source, and the communication channels out of the picture.
Cryptography doesn’t solve voting verification problem, it obscures and shifts it.