SlideShare a Scribd company logo
E-voting
Bozhidar Bozhanov
Vanity slide
• Still a developer
• http://blog.bozho.net
• http://techblog.bozho.net
• http://twitter.com/bozhobg
• E-government adviser to the deputy prime
minister of Bulgaria
E-voting
• e-voting / i-voting / machine voting / remote
e-voting
• a.k.a. “let’s vote from home”
• sounds tempting
• ...and risky
Complicated task
• uncontrolled environment
• single vote AND vote secrecy
• coercion prevention
• verifiability
• independent observers
• results should not be replaceable
• defence against attacks and viruses
Before technology
A fundamental question:
• Is it required that every voter understands
the whole voting process?
• Does every voter understand fully the
current process?
Identification
• necessary precondition
• e-id (“chip in the ID card”)
• other practices
• preliminary registration
• scratch-cards
• TAN
Who would develop it?
• companies with e-voting expertise
• Cybernetica AS (Estonia)
• Scytle (Switzerland, France, Norway)
• ...
• it’s “how” that’s important
How
• open source from day 1
• peer-reviewed
• audited
• with pilots
• in-person at first
• 7 days before paper election day
Wait, wait...
There are unanswered questions.
There are problems to be solved.
There is a lot of noise...
Invalid arguments “for”
• if e-banking works, then e-voting should
also work
• breaches and fraud
• different task
• if anyone can hack voting, why doesn’t he
hack banks instead?
• why not both?
Invalid arguments “for”
• “what can happen”
• everything
• we have many good software specialists
• the task is complicated and niche
• it will solve the problems of our democracy
• no, it won’t (bit it can help)
Invalid arguments “against”
• someone will buy your IP
• it’s a devil’s creation
• it must be 100% secure
• paper voting is not 100% secure
• someone can change something
• there is no guarnatee for ballot secrecy
• there is no guarantee for one voter-one vote
Invalid arguments “against”
• “It’s not being used in big countries”
• “Germany banned it”
• “The Estonian system doesn’t work”
• mainly OpSec problems
• client malware
• Press-conference a week prior to the elections
saying “it doesn’t work”?
• “It will be developed by incompetent people”
Questions
• vote secrecy and one voter = one vote
• verifiability of the validity of the result
• access for observers
• coercion prevention
• usability
Vote secrecy
• double-envelope method
• identity is separated from the vote before counting
• votes are encrypted with the public key of the
counting server
• anonymized votes are sent to the counting server
on a CD
• the private key is activated by multiple owners
Vote secrect
• blind signature
• e.g. carbon paper envelope with your name used
for blind stamping
• confirms the vote without knowledge of it
• requires trust in the client software
Vote secrecy
• Mixnets
• layers of decryption
• receiver doesn’t know who the sender is
• Tor-like
Revoting
• е-voting before the paper voting
• manual removal of the e-vote
• automatically guarantees 1 man = 1 vote
• with double envelope
• the unanonymized (encrypted) ballot is replaced
• with blind signature and mixnet
• using a receipt code?
Verifiability
• E2E verifiable
• “stored as cast”, “counted as stored”
• receipt, incl. a mobile phone
• checking the vote for a limited period of time (risks
the secrecy)
• checking if receipt codes are matching
Validity of the result
• individual checks
• independent counting
• public bulletin board
• public ledger (blockchain, votecoin?)
• push to registered observers?
Observers
• monitoring public logs (or blockchain
transactions)
• on-site in the server room
• live streaming
Coercion prevention
• panic/tamper PIN
• PIN written backwards :)
• hard to implement
• webcam with face recognition
• partial guarantee that nobody else is in front of the
monitor
• cooldown period
• against multiple voting from a single machine
Usability
• if paper voting is removed from polling
stations as well
• touch-screen is very intuitive
• everyone can use it, even uneducated voters
• UX-tests
Problems
• client-side malware
• DDoS attacks
• network attacks (dropping packets)
• remote penetration attacks
• OpSec
• insider attacks
• 0-day vulnerabilities
Client-side malware
• desktop client vs browser
• vote changing, not sending votes,
compromising secrecy before encryption
• solutions:
• 2 factor (sms, app)
• biometric confirmation
• card reader with hardware keypad and display
• voting from a virtualized environment
DDoS attacks
DDoS attacks
• DDoS prevention:
• preparedness and adequate procedures
• tier 1 providers, telecoms
• blocking of command & control servers
• scrubbing centers
• cutting external traffic
Network attacks
• packet analysis => dropping the vote
• solutions:
• retry
• detectable (no receipt/confirmation sent)
• Tor / mixnets
• paper voting if e-voting doesn’t work for you
OpSec
• operational security
• passwords
• DMZ
• HSM
• intrusion detection, netflow anaylsis
• audit trail
• main criticism against Estonia
• verifiability of results exposes intrusions
Insider attacks
• OpSec, audit trail
• verifiable using “virtual paper trail” (e.g.
blockchain)
• Security agencies should catch it 
0-day vulnerabilities
• ...well, crap
• general procedures for cancelling or postponing
elections
• if intrusions are detectable => patch
General procedures
• annulling online results
• notification of online voters
• postponing the eleciton
(not as hard and expensive as they are in
paper voting)
Paper voting?
• some of the problems above are valid for
paper voting as well
• results of paper voting are ultimately
aggregated on a computer
• with checks and paper trail
• …but what if it doesn’t match?
We must be paranoid
• everything can go wrong
• viruses are real
• state-level attacks are real
• manipulation attempts are real
• “it just works” doesn’t work
• “election security is national security”
The way forward?
• not all problems are addressed 100%
• there is no 100% secure solution
• we are looking for a solution that doesn’t
allow large-scale manipulations
• looks like such a solution is possible
• need for more R&D
• dynamic/direct democracy
• we are obligated to do it, sooner or later
Sources
https://eprint.iacr.org/2015/809.pdf
https://www.usvotefoundation.org/sites/default/files/E2EVIV_full_report.pdf
http://static.usenix.org/legacy/events/evtwote11/tech/slides/haenni.pdf
http://www.e-voting.cc/wp-content/uploads/Proceedings%202010/8.1.Spycher_2010.pdf
http://www.chaum.com/publications/Remotegrity-Design-and-Use-of-an-End-to-End-Verifiable-Remote-Voting-System.pdf
http://www.scytl.com/wp-content/uploads/2014/11/IDC-report_Implementing-End-to-End-Verifiable-Online-Voting_Enabling-Secure-Transparent-and-Tamper-Proof-Elections.pdf
https://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_SECUSO/Papers/GI_Workshop_2014.pdf
http://download.springer.com/static/pdf/730/chp%253A10.1007%252F3-540-45961-8_15.pdf?originUrl=http%3A%2F%2Flink.springer.com%2Fchapter%2F10.1007%2F3-540-
45961-8_15&token2=exp=1446764746~acl=%2Fstatic%2Fpdf%2F730%2Fchp%25253A10.1007%25252F3-540-45961-
8_15.pdf%3ForiginUrl%3Dhttp%253A%252F%252Flink.springer.com%252Fchapter%252F10.1007%252F3-540-45961-
8_15*~hmac=a7540fc29317746377a541091e07619a274e2048dbbfeb46f2abf76a58bf9918
https://vote.heliosvoting.org/
http://e-collection.library.ethz.ch/eserv/eth:3046/eth-3046-01.pdf
http://followmyvote.com
http://www.scytl.com/wp-content/uploads/2014/11/IDC-report_Implementing-End-to-End-Verifiable-Online-Voting_Enabling-Secure-Transparent-and-Tamper-Proof-Elections.pdf
http://www.bitcongress.org
https://bitcoinmagazine.com/21031/blockchain-technology-key-secure-online-voting/
https://people.csail.mit.edu/rivest/voting/papers/JakobssonJuelsRivest-MakingMixNetsRobustForElectronicVotingByRandomizedPartialChecking.pdf
http://arxiv.org/abs/1401.4151
https://www.regjeringen.no/globalassets/upload/krd/kampanjer/valgportal/valgobservatorer/2013/rapport_cartersenteret2013.pdf
http://techblog.bozho.net/why-all-the-fear-in-electronic-voting/
Thank you

More Related Content

What's hot

Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
iosrjce
 
E voting app
E voting appE voting app
E voting app
Amitabha Das
 
Ppt of e voting
Ppt of e votingPpt of e voting
Ppt of e voting
Smriti Rai
 
E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technology
tangytangling
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometry
IAEME Publication
 
An Overview of E-Voting Systems and Vote Verification Techniques
An Overview of E-Voting Systems and Vote Verification TechniquesAn Overview of E-Voting Systems and Vote Verification Techniques
An Overview of E-Voting Systems and Vote Verification Techniques
Ali Al-Shammari
 
Votechain
VotechainVotechain
Votechain
PAWAN KUMAR
 
Computerised voting system
Computerised voting systemComputerised voting system
Computerised voting system
Sushrut Bhosale
 
Features of blockchain voting
Features of blockchain votingFeatures of blockchain voting
Features of blockchain voting
SatyamAnand32
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technology
ijsrd.com
 
Online e voting
Online e votingOnline e voting
Online e voting
MerbinJose
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
eSAT Publishing House
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
Aniruddha Banerjee
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
Shubham Jadhav
 
Biometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded securityBiometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded security
Remya R
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
IOSR Journals
 
Secure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint techniqueSecure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint technique
Ashutha K
 
IRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger PrintIRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger Print
IRJET Journal
 
Town of Collingwood Election Voting Method Slideshow
Town of Collingwood Election Voting Method SlideshowTown of Collingwood Election Voting Method Slideshow
Town of Collingwood Election Voting Method Slideshow
ChristopherSargent8
 

What's hot (20)

Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
 
E voting app
E voting appE voting app
E voting app
 
Ppt of e voting
Ppt of e votingPpt of e voting
Ppt of e voting
 
E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technology
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometry
 
An Overview of E-Voting Systems and Vote Verification Techniques
An Overview of E-Voting Systems and Vote Verification TechniquesAn Overview of E-Voting Systems and Vote Verification Techniques
An Overview of E-Voting Systems and Vote Verification Techniques
 
Votechain
VotechainVotechain
Votechain
 
Computerised voting system
Computerised voting systemComputerised voting system
Computerised voting system
 
Features of blockchain voting
Features of blockchain votingFeatures of blockchain voting
Features of blockchain voting
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technology
 
Online e voting
Online e votingOnline e voting
Online e voting
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
 
Biometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded securityBiometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded security
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
 
Secure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint techniqueSecure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint technique
 
IRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger PrintIRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger Print
 
Town of Collingwood Election Voting Method Slideshow
Town of Collingwood Election Voting Method SlideshowTown of Collingwood Election Voting Method Slideshow
Town of Collingwood Election Voting Method Slideshow
 

Viewers also liked

E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
Gautam Kumar
 
E voting
E voting E voting
E voting
Mohamed Shalash
 
PROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMPROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEM
Nandasaba Wilson
 
Biometric identification
Biometric identificationBiometric identification
Biometric identification
Bozhidar Bozhanov
 
E-government architecture
E-government architectureE-government architecture
E-government architecture
Bozhidar Bozhanov
 
Online E-Voting System
Online E-Voting SystemOnline E-Voting System
Online E-Voting System
Prashant Upadhyay
 
Common Sense Driven Development
Common Sense Driven DevelopmentCommon Sense Driven Development
Common Sense Driven Development
Bozhidar Bozhanov
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project File
Nitin Bhasin
 
Blockchain for the people: Implementing blockchain technology for a secure an...
Blockchain for the people: Implementing blockchain technology for a secure an...Blockchain for the people: Implementing blockchain technology for a secure an...
Blockchain for the people: Implementing blockchain technology for a secure an...
Marko Kovic
 
Bio Metric-E-Voting
Bio Metric-E-VotingBio Metric-E-Voting
Bio Metric-E-Voting
meeravisu1116
 
Electronic Voting System
Electronic Voting SystemElectronic Voting System
Electronic Voting System
Afolabi B. OluwaGbenga
 
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
The federation of lazy jobless people (FLJP)
 
Electronic governance steps in the right direction?
Electronic governance   steps in the right direction?Electronic governance   steps in the right direction?
Electronic governance steps in the right direction?
Bozhidar Bozhanov
 
A comparison of blockchain technologies for distributed voting
A comparison of blockchain technologies for distributed votingA comparison of blockchain technologies for distributed voting
A comparison of blockchain technologies for distributed voting
Roderik van der Veer
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
Abhishek Abhi
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoop
Anoop Kumar
 
Online voting system
Online voting systemOnline voting system
Online voting system
Pooja Jain
 
Ppt on online voting
Ppt on online votingPpt on online voting
Ppt on online voting
Debapriyo Dasgupta
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
snauriyal1994
 
Protection Profile for E-Voting Systems
Protection Profile for E-Voting SystemsProtection Profile for E-Voting Systems
Protection Profile for E-Voting Systems
Seungjoo Kim
 

Viewers also liked (20)

E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
E voting
E voting E voting
E voting
 
PROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMPROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEM
 
Biometric identification
Biometric identificationBiometric identification
Biometric identification
 
E-government architecture
E-government architectureE-government architecture
E-government architecture
 
Online E-Voting System
Online E-Voting SystemOnline E-Voting System
Online E-Voting System
 
Common Sense Driven Development
Common Sense Driven DevelopmentCommon Sense Driven Development
Common Sense Driven Development
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project File
 
Blockchain for the people: Implementing blockchain technology for a secure an...
Blockchain for the people: Implementing blockchain technology for a secure an...Blockchain for the people: Implementing blockchain technology for a secure an...
Blockchain for the people: Implementing blockchain technology for a secure an...
 
Bio Metric-E-Voting
Bio Metric-E-VotingBio Metric-E-Voting
Bio Metric-E-Voting
 
Electronic Voting System
Electronic Voting SystemElectronic Voting System
Electronic Voting System
 
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
 
Electronic governance steps in the right direction?
Electronic governance   steps in the right direction?Electronic governance   steps in the right direction?
Electronic governance steps in the right direction?
 
A comparison of blockchain technologies for distributed voting
A comparison of blockchain technologies for distributed votingA comparison of blockchain technologies for distributed voting
A comparison of blockchain technologies for distributed voting
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoop
 
Online voting system
Online voting systemOnline voting system
Online voting system
 
Ppt on online voting
Ppt on online votingPpt on online voting
Ppt on online voting
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
 
Protection Profile for E-Voting Systems
Protection Profile for E-Voting SystemsProtection Profile for E-Voting Systems
Protection Profile for E-Voting Systems
 

Similar to E-voting

Polys | Online voting system
Polys | Online voting systemPolys | Online voting system
Polys | Online voting system
Timur Kildigulov
 
Forensics intro
Forensics introForensics intro
Forensics intro
test tt
 
igloovote
igloovoteigloovote
igloovote
Juanjo Bermudez
 
Codebits 2011
Codebits 2011Codebits 2011
Codebits 2011
Martin Paljak
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos De Pedro
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
dhirujapla
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
Felipe Prado
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
Nicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
Nicholas Davis
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
Jeroen Baert
 
Internet security
Internet securityInternet security
Internet security
Antony Mathew
 
Christian bull eVoting
Christian bull eVoting Christian bull eVoting
Christian bull eVoting
Christian Wernberg-Tougaard
 
How you could hack the Dutch elections for the last 26 years
How you could hack the Dutch elections for the last 26 yearsHow you could hack the Dutch elections for the last 26 years
How you could hack the Dutch elections for the last 26 years
Sijmen Ruwhof
 
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
Ahmed Mekkawy
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - Project
Subhashis Das
 
TEDxIasi. Bogdan Alecu
TEDxIasi. Bogdan AlecuTEDxIasi. Bogdan Alecu
TEDxIasi. Bogdan Alecu
Alina Moisoiu
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
👀 Joe Gray
 

Similar to E-voting (20)

Polys | Online voting system
Polys | Online voting systemPolys | Online voting system
Polys | Online voting system
 
Forensics intro
Forensics introForensics intro
Forensics intro
 
igloovote
igloovoteigloovote
igloovote
 
Codebits 2011
Codebits 2011Codebits 2011
Codebits 2011
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Internet security
Internet securityInternet security
Internet security
 
Christian bull eVoting
Christian bull eVoting Christian bull eVoting
Christian bull eVoting
 
How you could hack the Dutch elections for the last 26 years
How you could hack the Dutch elections for the last 26 yearsHow you could hack the Dutch elections for the last 26 years
How you could hack the Dutch elections for the last 26 years
 
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - Project
 
TEDxIasi. Bogdan Alecu
TEDxIasi. Bogdan AlecuTEDxIasi. Bogdan Alecu
TEDxIasi. Bogdan Alecu
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 

More from Bozhidar Bozhanov

Антикорупционен софтуер
Антикорупционен софтуерАнтикорупционен софтуер
Антикорупционен софтуер
Bozhidar Bozhanov
 
Nothing is secure.pdf
Nothing is secure.pdfNothing is secure.pdf
Nothing is secure.pdf
Bozhidar Bozhanov
 
Elasticsearch - Scalability and Multitenancy
Elasticsearch - Scalability and MultitenancyElasticsearch - Scalability and Multitenancy
Elasticsearch - Scalability and Multitenancy
Bozhidar Bozhanov
 
Encryption in the enterprise
Encryption in the enterpriseEncryption in the enterprise
Encryption in the enterprise
Bozhidar Bozhanov
 
Blockchain overview - types, use-cases, security and usabilty
Blockchain overview - types, use-cases, security and usabiltyBlockchain overview - types, use-cases, security and usabilty
Blockchain overview - types, use-cases, security and usabilty
Bozhidar Bozhanov
 
Електронна държава
Електронна държаваЕлектронна държава
Електронна държава
Bozhidar Bozhanov
 
Blockchain - what is it good for?
Blockchain - what is it good for?Blockchain - what is it good for?
Blockchain - what is it good for?
Bozhidar Bozhanov
 
Algorithmic and technological transparency
Algorithmic and technological transparencyAlgorithmic and technological transparency
Algorithmic and technological transparency
Bozhidar Bozhanov
 
Scaling horizontally on AWS
Scaling horizontally on AWSScaling horizontally on AWS
Scaling horizontally on AWS
Bozhidar Bozhanov
 
Alternatives for copyright protection online
Alternatives for copyright protection onlineAlternatives for copyright protection online
Alternatives for copyright protection online
Bozhidar Bozhanov
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developers
Bozhidar Bozhanov
 
Политики, основани на данни
Политики, основани на данниПолитики, основани на данни
Политики, основани на данни
Bozhidar Bozhanov
 
Отворено законодателство
Отворено законодателствоОтворено законодателство
Отворено законодателство
Bozhidar Bozhanov
 
Overview of Message Queues
Overview of Message QueuesOverview of Message Queues
Overview of Message Queues
Bozhidar Bozhanov
 
Сигурност на електронното управление
Сигурност на електронното управлениеСигурност на електронното управление
Сигурност на електронното управление
Bozhidar Bozhanov
 
Opensource government
Opensource governmentOpensource government
Opensource government
Bozhidar Bozhanov
 
Биометрична идентификация
Биометрична идентификацияБиометрична идентификация
Биометрична идентификация
Bozhidar Bozhanov
 
Регулации и технологии
Регулации и технологииРегулации и технологии
Регулации и технологии
Bozhidar Bozhanov
 
Regulations and technology
Regulations and technologyRegulations and technology
Regulations and technology
Bozhidar Bozhanov
 
Архитектура на електронното управление
Архитектура на електронното управлениеАрхитектура на електронното управление
Архитектура на електронното управление
Bozhidar Bozhanov
 

More from Bozhidar Bozhanov (20)

Антикорупционен софтуер
Антикорупционен софтуерАнтикорупционен софтуер
Антикорупционен софтуер
 
Nothing is secure.pdf
Nothing is secure.pdfNothing is secure.pdf
Nothing is secure.pdf
 
Elasticsearch - Scalability and Multitenancy
Elasticsearch - Scalability and MultitenancyElasticsearch - Scalability and Multitenancy
Elasticsearch - Scalability and Multitenancy
 
Encryption in the enterprise
Encryption in the enterpriseEncryption in the enterprise
Encryption in the enterprise
 
Blockchain overview - types, use-cases, security and usabilty
Blockchain overview - types, use-cases, security and usabiltyBlockchain overview - types, use-cases, security and usabilty
Blockchain overview - types, use-cases, security and usabilty
 
Електронна държава
Електронна държаваЕлектронна държава
Електронна държава
 
Blockchain - what is it good for?
Blockchain - what is it good for?Blockchain - what is it good for?
Blockchain - what is it good for?
 
Algorithmic and technological transparency
Algorithmic and technological transparencyAlgorithmic and technological transparency
Algorithmic and technological transparency
 
Scaling horizontally on AWS
Scaling horizontally on AWSScaling horizontally on AWS
Scaling horizontally on AWS
 
Alternatives for copyright protection online
Alternatives for copyright protection onlineAlternatives for copyright protection online
Alternatives for copyright protection online
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developers
 
Политики, основани на данни
Политики, основани на данниПолитики, основани на данни
Политики, основани на данни
 
Отворено законодателство
Отворено законодателствоОтворено законодателство
Отворено законодателство
 
Overview of Message Queues
Overview of Message QueuesOverview of Message Queues
Overview of Message Queues
 
Сигурност на електронното управление
Сигурност на електронното управлениеСигурност на електронното управление
Сигурност на електронното управление
 
Opensource government
Opensource governmentOpensource government
Opensource government
 
Биометрична идентификация
Биометрична идентификацияБиометрична идентификация
Биометрична идентификация
 
Регулации и технологии
Регулации и технологииРегулации и технологии
Регулации и технологии
 
Regulations and technology
Regulations and technologyRegulations and technology
Regulations and technology
 
Архитектура на електронното управление
Архитектура на електронното управлениеАрхитектура на електронното управление
Архитектура на електронното управление
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 

E-voting