It has been well understood for more than 15 years that computerized voting machines can be hacked to make them cheat (or might be misconfigured by accident), and therefore it is essential to have random audits of the ballots. That is: Human inspection of paper ballots that the voters marked, of a random sample of […]
Voting by mail in NJ 2020
For hundreds of years, New Jersey voters have voted in their local precinct polling places (800 registered voters per precinct), with only a tiny percentage voting absentee. This year, for reasons of public health in the pandemic, all voters will receive a mail-in ballot; a few polling places will be open on November 3rd for […]
GPT-3 Raises Complex Questions for Philosophy and Policy
GPT-3, a powerful, 175 billion parameter language model developed recently by OpenAI, has been galvanizing public debate and controversy. As the MIT Technology Review puts it: “OpenAI’s new language generator GPT-3 is shockingly good—and completely mindless”. Parts of the technology community hope (and fear) that GPT-3 could brings us one step closer to the hypothetical […]
Can the exfiltration of personal data by web trackers be stopped?
by Günes Acar, Steven Englehardt, and Arvind Narayanan. In a series of posts on this blog in 2017/18, we revealed how web trackers exfiltrate personal information from web pages, browser password managers, form inputs, and the Facebook Login API. Our findings resulted in many fixes and privacy improvements to browsers, websites, third parties, and privacy […]
Safely opening PDFs received by e-mail (or fax?!)
Many election administrators in U.S. states and counties need to receive and open PDF files from voters. Some of these administrators receive these PDFs as e-mail attachments. These may be filled-out voter registration forms, or even voted ballots from UOCAVA (overseas and military) voters. We all know that malware can lurk in e-mail attachments; how […]