According
cheap glyburide to the United Kingdom's National Health Service (NHS), females with
celexa generic PCOS who have overweight are at increased risk of developing
viagra buy drug additional PCOS symptoms and long-term health complications. The mortality rate
price of viagra of NEC is high, but infants may recover without complications
flovent alternative if they receive timely treatment. Individuals should consult a doctor
fda approved cephalexin before taking calcitonin to ensure that it does not interact
buy cheap arcoxia side effects liquid with any other medications they are taking or affect any
get cheap azor best price tablet other health conditions they have. Nicotine exposure during pregnancy can
viagra from india have several harmful effects on the pregnant person and the
cialis canada fetus. These negatively skewed thoughts are likely to increase a
synthroid without prescription person's likelihood of depression and lead to negative behavioral responses.
order discount cialis online A person cannot self-diagnose atrial tachycardia — even benign arrhythmias may.
As we discussed recently, electronic voting is an extremely tough problem, because it requires voters to have confidence that their votes are being recorded correctly, and to be unable to prove to anyone else how they voted. The two conditions can be achieved with the aid of cryptography — in theory. But it’s also essential that the system be simple to use and works in such a way that the general public will have confidence that there are no scams embedded in the software somehow.
There is a nice article in Salon on a couple of fairly realistic voter-verifiable election systems, including one by Ben Adida, who worked with Hal at MIT and is associated with Harvard’s Center for Research on Computation and Society. There’s progress and reason for hope, but it’s also possible that a bad experience in the upcoming election with some completely unrelated kind of electronic voting machines could increase resistance for any kind of continued deployment of better-designed systems.
This entry was posted
on Monday, October 27th, 2008 at 10:35 am and is filed under Secrecy and encryption, Security.
You can follow any responses to this entry through the RSS 2.0 feed.
Both comments and pings are currently closed.