[148974] in cryptography@c2.net mail archive
Re: [Cryptography] What is an attack, and what is not an attack?
daemon@ATHENA.MIT.EDU (James A. Donald)
Wed Jan 8 19:06:13 2014
X-Original-To: cryptography@metzdowd.com
Date: Thu, 09 Jan 2014 08:00:04 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com
In-Reply-To: <339B155E-251A-485E-AB37-DC3BDF049A76@gmail.com>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On 2014-01-09 01:18, John Kelsey wrote:
> I think you're headed toward a lower bound estimate of what the
> real-world attacks look like, but we also need to consider likely
> and possible attacks. For example, we have years of results on
> all-electronic voting machines that show that they generally have
> Swiss cheese like security, but I am not aware of any documented
> election fraud in the US
There is obvious massive election fraud in the US, for example the
highly improbable turnout in presidential elections in certain areas
of swing states, but there is no "documented" fraud because the fraud
is always done in areas where the police, judges, and elected
officials are of the benefiting party.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography