From: ⁨cleoabram⁩

The modern era, particularly the “ultimate election year” when countries representing half the world’s population hold elections, presents a significant test for democracy [00:00:07]. While traditional voting methods can involve long distances, queues, or taking time off work [00:00:17], the idea of online voting arises as a potential solution for convenience [00:00:31]. However, the question of “Why can’t I vote online?” reveals a highly controversial, complicated, and high-stakes answer primarily rooted in cybersecurity [00:00:39].

Early Adoptions and Context

Despite the widespread challenges, some forms of online voting have existed. The US state of Texas initiated online voting in 1997 to allow an astronaut to vote from the Mir Space Station [00:01:16]. This tradition continues, with astronauts on the ISS planning to vote this way [00:01:31]. Additionally, many US states and various countries worldwide offer online voting options for military and overseas citizens, totaling about 300,000 American online votes in 2020 [00:01:39]. These are generally for people with special circumstances, not the general public [00:01:53].

The primary aspiration for online voting is to increase voter turnout and simplify participation in democracies [00:02:58], but this is only feasible if it can be done safely [00:03:08].

The Core Challenge: Cybersecurity

The stakes for online voting are exceptionally high, involving the most powerful nations choosing their leaders and potentially influencing adversaries’ elections [00:03:16]. This elevates cybersecurity to an entirely different level [00:03:26].

Current methods used for some online voters in the US, such as emailing or faxing ballots, are explicitly deemed unsafe for a national system by cybersecurity experts [00:03:31]. Dr. Joe Kiniry and Dr. Josh Benaloh, cybersecurity experts with over two decades of experience in online voting, highlight that the problem is “difficult” and not yet fully solved [00:03:52].

Key Cybersecurity Challenges in Online Voting

Four basic challenges to voting online are identified:

  1. Credentials and Identity Verification: Online voting requires digital credentials [00:04:13].

    • Estonia provides an electronic ID card to every citizen, used for various services including online voting since the early 2000s [00:04:25].
    • In the US, there has been “extreme resistance” to a national ID system [00:04:41]. While Social Security numbers exist, adopting them as a foundation for a national ID is a “no go” from a political standpoint, demonstrating that the barriers are not solely technical [00:04:56].
  2. Coercion and Secret Ballot Integrity: This is both a technical and political challenge [00:05:13].

    • Unlike polling places, a phone logged in via facial ID could be handed to someone else to cast a vote [00:05:13].
    • The crucial aspect of voting is the secret ballot, not just voting in secret, but also ensuring no receipt can be shown to prove a vote was cast a certain way (e.g., for vote buying or selling) [00:05:28].
    • Estonia addresses this by allowing voters to recast their vote multiple times online, with only the last vote counted, providing a safeguard against coercion [00:05:42].
    • Online banking, by contrast, is not secret; all transactions are part of a public ledger shared with the bank [00:05:57]. Online voting cannot operate under this principle.
  3. Client Malware and Vote Flipping:

    • Adopting internet voting means every voter’s device becomes part of the election’s infrastructure, significantly increasing the “attack surface” for hackers [00:07:26].

    • The primary concern is “vote flipping,” where malware on a voter’s device changes their intended vote without their knowledge [00:07:49].

    • Unlike online banking or encrypted messaging, the principal difference in voting is the difficulty of confirming that actions have been done properly due to the secret ballot [00:08:16]. The very mechanism protecting voters (secrecy) makes confirmation difficult [00:08:24].

    • The Benaloh Challenge: Invented by Dr. Josh Benaloh, this cryptographic method allows voters to “check” their encrypted vote to ensure it’s recorded correctly without revealing their choice [00:08:35]. This process can be repeated, mathematically proving the system’s integrity [00:09:46].

      • In a large election, if even 1% of 100 million voters performed a check, approximately 100 flipped votes across the election would likely be caught [00:09:50].
      • At the end of an election, the voter’s specific encrypted number would be recorded, allowing them to verify their vote was submitted, but not how they voted [00:10:02].
    • Limitations of Confirmation: A significant problem arises if finding malware on a phone could call an election into question; this creates an incentive for malicious actors to intentionally introduce malware onto devices to disrupt or overturn results [00:10:18].

  4. Denial of Service (DoS) Attacks: This is potentially the highest-stakes challenge [00:10:45].

    • The goal is to overload a system with fake traffic, causing websites to crash, load improperly, or even create localized internet outages [00:10:54].
    • Even a slowdown of a few hours could be catastrophic, as voter turnout can be influenced by factors like rain [00:11:04]. DoS attacks could be used to create “online weather” in specific areas to impact voting patterns [00:11:08].
    • Adversaries, described as “extremely talented” with “unbounded amounts of hackers, computers, networks, and cash,” pose a significant threat to election integrity through such attacks [00:11:26].

Broader Implications and Public Trust

Beyond technical challenges like cybersecurity, online voting also intersects with the complex issue of public trust in elections [00:11:38]. This is not purely a technological problem [00:11:48].

While progress is being made on unsolved problems in online voting, it remains a significantly harder problem than it might appear [00:11:55]. A future where online voting works safely is possible, but it requires overcoming substantial hurdles [00:12:13].