Government Computer News
If we are to heed the call for online elections, to move voting applications to mobile devices, we must acknowledge there’s no definite way to secure those applications. Even sole-sourced app development can be compromised by one insider who puts a back door in the software. How can a vote be secured from the check box all the way to where it’s tallied and stored?