want to help?

it appears some people some people are trying to bypass the encryption on some files and it requires a beowolf cluster, now, it seems to me that this is particularly problematic because it does not really matter what they find, it could have all been constructed to be found by someone else. In short there is no way of ensuring the authenticity of this request at all even if it was personal acquaintence. It surely looks like it is a huge problem. However, the point should be clear to all that read it, there are huge questions around voter fraud with these systems and there is reason to believe that if it is a possibility then someone might perpetrate it, and that should be known, so…. well, i don't suggest anyone do anything other than their own will because i could go either way on this type of request. I do think we need external vote auditors and paper trails though.

This entry was posted in General.