Results 11 to 20 of 37
-
Verified Tsikot Member
- Join Date
- Oct 2008
- Posts
- 267
May 21st, 2010 07:20 PM #11Kaya next time, mas maganda kung may parallel manual counting para talagang ma-verify ang electronic counting. Ngayong tapos na election, I don't think may mahahabol pa. Nakakatawa na naman tayo sa ibang bansa. Ang mga bansang nag-aacquire ng electronic voting system for the first time, ay nag-uunahan ang mga sindikato para bumenta sila at magkapera. Yan ang takbo mg mercado ng mundo.
-
May 21st, 2010 09:00 PM #12
Haaay...Bakit di na lang tanggapin ang pagkatalo at magserbisyo na lang ng totoo para sa susunod na halalan maalala ng taong bayan.
-
May 22nd, 2010 01:41 PM #13
Credit cards can only be hacked after being scanned in-person. The love bug? It's easy to create a virus that does nothing but destroy data... but to manipulate encrypted data? That's a feat of a different magnitude.
To systematically change the data coming from all the stations would require the cheaters to either control the PCOS machines themselves or control the servers.
Otherwise, they'd have to control all the personnel at all the stations, which they can't.
Ang pagbalik ng comeback...
-
May 22nd, 2010 02:56 PM #14
Remember Computer virus is different from hacking
Definition(virus)
A computer virus is a computer program that can copy itself[1] and infect a computer.
(hack)
Computer hacking is illegally using the computer resources for malicious intent
(glitches or bugs)
A software bug is the common term used to describe an error, flaw, mistake, failure, or fault in a computer program or system that produces an incorrect or unexpected result
rules of engagement
to able to break the security one must have a deep well understanding on 128 encryption / what kind of 128 encryption method use : eg. Math formulas (but could be also 256 or 512 encryption)
how about firewall ? firewall configured on the side of server. which filter incoming and outgoing. it gives protection and rights to the data
part of network? each machine has its own unique IP and has its own MAC address. this IP or Mac identified by the network group assign. so there is already filtering . Aside from that , dont forget the "HELO" message when broadcasting
to have a valid data pass to the sytem. it must meet the requirement above stated
-
-
Verified Tsikot Member
- Join Date
- Oct 2008
- Posts
- 35
May 23rd, 2010 06:58 PM #16I think koala's cheating will easily detected by Comelec or PPCRV even their "player modem" had successfully transmitted to their server. How many registered voter we have now in 2010 election? Then add around 8 million vote for their "winner candidate" that " player modem" transmiited. So there's a discrepancy of additional 8 million voters. No way "koalas cheating" will work.
-
-
May 24th, 2010 10:29 AM #18
good input, digitalron.
the "hacking" process has been oversimplified (maybe due to the influence of "hacker" movies). it takes geeks + insiders + resources to pull it off so it's no easy feat.
i loved it when i first heard that they're getting a third party, outside pinas, to service the automations. the company would have to do everything in their power to keep their integrity or lose their entire clientele.
secondly, how ever fullproof a system is, an audit system is a must. nope, you don't have to do parallel counting (which i think means manually counting all ballots). you just need statistical random sampling.
-
May 24th, 2010 04:03 PM #19
Well... though my wife sometimes calls me her Grizzly Bear (hehe), I am definitely NOT the notorious Koala Bear.
*rael: thanks! I myself take part in regular security audits which include various forms of attacks... both to penetrate a system and to prevent a system from dispensing its services (called a denial of service or DOS attack). In my experience, system security is almost always weakest where human intervention or a manual process is involved.
What I find reprehensible with Koala's claims is that he's taking advantage of people's unfamiliarity with the PCOS system and using it to sow intrigue and mistrust on the recent election.
If he were really serious with his allegations, he should prepare a detailed treatise on how the point shavings are done. For all we know, he and his handlers are just rehashing the stuff they gleaned from the Youtube video shared by first_light.
In fairness to the PCOS system as well, I'm sure that the manufacturer has learned some lessons in the past (including the US elections) to be able to prepare for various attack scenarios. If they didn't, shame on them... and shame on the Comelec for not calling on our local IT experts (who are really very good!) to help in the planning.
======
I hope the Comelec would be more transparent with the PCOS and the protocols they follow. Contrary to what some people think, publishing the protocols and source code WILL NOT increase the likelihood of an attack. In fact, doing so could help reduce the likelihood of attack because loopholes can be seen by experts and ways to remedy the shortcomings could thus be recommended.
In computer security, the integrity of a system should never rely on "hiding" how it was implemented. This is called "security through obfuscation" and is never good because someone will always discover how a system is implemented. A really secure system will be able to anticipate the various attack vectors and protect the system even if the implementation is known.
-
May 24th, 2010 06:33 PM #20
Nako nagsisilabasan na mga talunan saying they were offered the ability to cheat (as usual without names)... Question to them is WHY expose this NOW when the elections is done? Why not before the elections? Pustahan tayo kung nanalo sila these expose would not come to life. Our election process is now automated but our political system is still very old school. Basta natalo, NADAYA! or may anomalies... As usual the winners are silent!
Are there plans to make a new app? Sent from my iPhone using Tapatalk
Removal of Tapatalk Support