Readit News logoReadit News
mspecter commented on Ok Google: please publish your DKIM secret keys   blog.cryptographyengineer... · Posted by u/Reventlov
tomc1985 · 5 years ago
What's stopping someone from recording each public key as it is entered into service and providing a DKIM authentication service with it? There are already such things for domain data.
mspecter · 5 years ago
Hi! Check out our Usenix 2021 paper on exactly this topic. The key insight is to release private keys over time:

http://www.mit.edu/~specter/blog/2020/dkim/

mspecter commented on Detailed audit of Voatz' voting app confirms security flaws   govtech.com/biz/Detailed-... · Posted by u/rbanffy
the_snooze · 5 years ago
Is there any technical/security benefit at all to private blockchains? Or even more generously, lightly-mined public blockchains? It seems that in either of those scenarios, you lose the decentralized validation and consensus brought about by a bunch of people incentivized to compete with one another to burn electricity.
mspecter · 5 years ago
To push this further, I was working on a research paper with Ron Rivest, Neha Narula (head of MIT's decentralized currency initiative), and Sunoo Park (a wonderful applied cryptographer) on whether blockchains in general could be helpful in casting and tallying.

We're skeptical.

See: http://people.csail.mit.edu/rivest/pubs/PSNR20.pdf

mspecter commented on Detailed audit of Voatz' voting app confirms security flaws   govtech.com/biz/Detailed-... · Posted by u/rbanffy
munk-a · 5 years ago
Within the article this statement was made

> Trail of Bits engineers said Voatz' code was written intelligibly and free of many common security foibles, but added “it is clear that the Voatz codebase is the product of years of fast-paced development.” The summary goes on to list several technical flaws, such as a lack of test coverage and documentation, infrastructure provisioned manually without the aid of infrastructure-as-code tools, vestigial features that have yet to be deleted, and nonstandard cryptographic protocols.

That honestly sounds pretty good in terms of software quality, adding additional tests for proofs and ramping up ops are both addressable problems - especially if handled by a government sponsored team. But...

How confident are you that we could reach a well engineered and proofed electronic voting platform that also adheres to theoretical rules around vote security?

And which component of that, adherence to theoretical requirements and perfected development practices, do you see as a larger hurdle to overcome going forward?

mspecter · 5 years ago
> How confident are you that we could reach a well engineered and proofed electronic voting platform that also adheres to theoretical rules around vote security?

I don't think we can with the current commodity devices / ecosystem, even assuming that voting system software is well-written. Keeping electronic-only systems secure from nation-state level adversaries is hard.

mspecter commented on Detailed audit of Voatz' voting app confirms security flaws   govtech.com/biz/Detailed-... · Posted by u/rbanffy
micimize · 5 years ago
I understand that current solutions to electronic voting are unsatisfactory, but I am fairly baffled by:

> It remains unclear if any electronic-only mobile or Internet voting system can practically overcome the stringent security requirements on election systems

Like, we can adequately secure banking software. With proper considerations and processes for the problem domain (i.e. user follow up / validation, alerts on suspicious vote changes) I don't see why securely implementing electronic voting is considered near-impossible, and has so few advocates.

mspecter · 5 years ago
To put this in short-hand: "We bank online, we buy all sorts of stuff online, why not vote?"

The biggest reason is that banking and other financial transactions have a very different threat model from voting.

In particular, voting requires a secret ballot. In addition to preventing an adversary from learning how you voted, a secret ballot requires you to be unable to prove how you voted, to prevent vote selling and coercion.

So, unlike financial transactions, how you do validation / remediation of failures is very unclear. Ben Adida has a blog post with further thoughts here (https://benlog.com/2007/03/02/on-voting-banking-and-bad-anal...).

mspecter commented on Detailed audit of Voatz' voting app confirms security flaws   govtech.com/biz/Detailed-... · Posted by u/rbanffy
dmix · 5 years ago
The article mentions:

> The clients do not interact with the blockchain directly, so there is no blockchain verification code in the client.

So if all client requests are routed through the same centralized API endpoint before hitting the blockchain, nor validated after the fact, whats the point of the blockchain? Just some public "ledger" of what the server ultimately sends out?

Ideally, at a minimum, you would be given a token for your vote which you can then follow up and see it on the ledger. Even if you don't get to wait for 'confirmation', it's still a public signal that something is not right.

mspecter · 5 years ago
That's a wonderful question.

The honest answer is that I have no idea. In the version we reverse engineered, there's no proof of inclusion of any of the data in the blockchain in the client, and the receipt system was via a PDF. The vote selections (ballot?) are also never signed by the client.

It's also worth noting that, according to the ToB article, the backend blockchain is a permissioned hyperledger instance, which runs PBFT[1] rather than proof of work. PBFT is controllable with roughly 1/3 of the network, 100% of which has been controlled by the company.

[1]http://pmg.csail.mit.edu/papers/osdi99.pdf

mspecter commented on Detailed audit of Voatz' voting app confirms security flaws   govtech.com/biz/Detailed-... · Posted by u/rbanffy
mspecter · 5 years ago
Oh, hi.

I'm Mike Specter, lead author on the MIT report [1], and have been involved in other voting-related research projects [2,3].

LMK if you all have any questions!

1. https://internetpolicy.mit.edu/wp-content/uploads/2020/02/Se...

2. http://people.csail.mit.edu/rivest/pubs/PSNR20.pdf

3. https://www.belfercenter.org/sites/default/files/files/publi...

u/mspecter

KarmaCake day282January 17, 2013
About
EECS Grad Student at MIT

http://www.mit.edu/~specter/

View Original