{"id":20012,"date":"2020-01-10T12:49:05","date_gmt":"2020-01-10T17:49:05","guid":{"rendered":"https:\/\/blog.carlrobitaille.org\/?p=20012"},"modified":"2020-01-10T12:49:07","modified_gmt":"2020-01-10T17:49:07","slug":"can-voters-detect-malicious-manipulation-of-ballot-marking-devices","status":"publish","type":"post","link":"https:\/\/blog.carlrobitaille.org\/?p=20012","title":{"rendered":"Can Voters Detect Malicious Manipulation of Ballot Marking Devices?"},"content":{"rendered":"\n<p><a href=\"https:\/\/jhalderm.com\/pub\/papers\/bmd-verifiability-sp20.pdf\">Can Voters Detect Malicious Manipulation of Ballot Marking Devices?<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Can voters detect malicious manipulation of ballot marking devices?<br><br>To find out, @UMBernhard and our <a href=\"https:\/\/twitter.com\/UMich?ref_src=twsrc%5Etfw\">@UMich<\/a> team had 241 people vote on BMDs we secretly hacked to change every printout. Voters missed &gt;93% of errors!<br><br>Full study published today at <a href=\"https:\/\/twitter.com\/ieeesp?ref_src=twsrc%5Etfw\">@IEEESP<\/a>:<a href=\"https:\/\/t.co\/5FrygIGtZL\">https:\/\/t.co\/5FrygIGtZL<\/a><\/p>&mdash; J. Alex Halderman (@jhalderm) <a href=\"https:\/\/twitter.com\/jhalderm\/status\/1214890044835549185?ref_src=twsrc%5Etfw\">January 8, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Can Voters Detect Malicious Manipulation of Ballot Marking Devices?<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,20],"tags":[],"class_list":["post-20012","post","type-post","status-publish","format-standard","hentry","category-politique","category-securite"],"_links":{"self":[{"href":"https:\/\/blog.carlrobitaille.org\/index.php?rest_route=\/wp\/v2\/posts\/20012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.carlrobitaille.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.carlrobitaille.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.carlrobitaille.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.carlrobitaille.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=20012"}],"version-history":[{"count":1,"href":"https:\/\/blog.carlrobitaille.org\/index.php?rest_route=\/wp\/v2\/posts\/20012\/revisions"}],"predecessor-version":[{"id":20013,"href":"https:\/\/blog.carlrobitaille.org\/index.php?rest_route=\/wp\/v2\/posts\/20012\/revisions\/20013"}],"wp:attachment":[{"href":"https:\/\/blog.carlrobitaille.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=20012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.carlrobitaille.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=20012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.carlrobitaille.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=20012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}