Just wanted to share. Smartmatic has marketing documents on their site about
SAES 1800 (election machines) and RIES
http://www.smartmatic.com/company/article/article/Media%20Kit%20for%20The%20Philippines/
Not really in-depth, technical information but the information is ok for
starters..
On Wed,
Hi All,
This is an interesting topic indeed. Would anyone know if Election Markup
Language (EML) version 5.0 will be used in next year's election?
http://docs.oasis-open.org/election/eml/v5.0/cs01/EML-Schema-Descriptions-v5.0.html
--
Brian Tan Seng
Yahoo! Messenger ID: btanseng
Registered Linux
On Wed, Jul 15, 2009 at 2:19 PM, fooler mail wrote:
>
> it is a done deal now.. all we need to do is how to improve the
> system.. please join the chat session as we need everybody's valuable
> inputs...
>
>
I agree on this. What we can do now is to weed out possibly the low hanging
fruit and ob
Let us know when will the chat session be.
Mike
From: fooler mail
To: Philippine Linux Users' Group (PLUG) Technical Discussion List
Sent: Wednesday, July 15, 2009 2:08:27 PM
Subject: Re: [plug] Code Review & SysAdmin of Election 2010 Computers
On Wed, Jul
On Wed, Jul 15, 2009 at 9:58 AM, jan gestre wrote:
> The reason the Comelec is still using the old fashion way tallying the votes
> is because that is the law unless they amend the law which I think they
> can't given the time frame they have,
granted because what the law said.. but sending all ER
On Wed, Jul 15, 2009 at 12:46 AM, Kelsey Hartigan
Go wrote:
> I don't think cheating will be done on the technical level, as there
> are going to be very few who can pull that off.
it can be done.. what im thinking is that without protecting the
private key.. they can produce their own fake ERs by
On Tue, Jul 14, 2009 at 10:02 PM, Danny Ching wrote:
>
> I'm afraid however that cheating will simply be done locally by
> sabotaging, destroying or simply invalidating the machines credibility
> by destroying the seals of the voting machines before, during or after
> the elections. Therefore forci
On Tue, Jul 14, 2009 at 10:08 AM, Holden Hao wrote:
> Top of mind suggestions:
>
> - Political parties should have technical representatives and each should be
> given GPG keys. After the source code review, they should all sign the code
> and monitor the burning of the firmware.
>
> - The embedde
On Mon, Jul 13, 2009 at 10:53 PM, Miguel Paraz wrote:
>
> Even if Smartmatic and friends were honest, what's to stop other third
> parties now from breaking into these systems?
> Or even easier, causing
> a denial of service attack - and a failure of elections?
let us ask them first their network
On Mon, Jul 13, 2009 at 12:21 PM, Miguel Paraz wrote:
>
> This is probably a Java web (servlet) application. Since it is much
> easier to cheat here, we need to make sure of the integrity of this
> web app. But even if the app is good at the source level, how do we
> know that it won't be substitut
hi david,
the more "traditional" way would have been to use sed as follows:
sed -i.bak s/^/./g porndomain.cal
side-effect is to generate a backup file with the .bak extension.
xen
On Wed, Jul 15, 2009 at 12:14 PM, david t. asuncion,
jr. wrote:
> A total CLI newbie here. :)
>
> I have a file li
On Wed, Jul 15, 2009 at 12:21 PM, Zak B. Elep wrote:
> On Wed, Jul 15, 2009 at 12:14 PM, david t. asuncion,
> jr. wrote:
> > A total CLI newbie here. :)
> >
> > I have a file like this...
> >
> > cat porndomain.acl
> >
> > sex.com
> > blahblah.com
> > weak.com
> >
> >
> > What I want to happ
On Wed, Jul 15, 2009 at 12:14 PM, david t. asuncion,
jr. wrote:
> A total CLI newbie here. :)
>
> I have a file like this...
>
> cat porndomain.acl
>
> sex.com
> blahblah.com
> weak.com
>
>
> What I want to happen is to add a "." on each line to look like this...
>
> .sex.com
> .blahblah.com
>
A total CLI newbie here. :)
I have a file like this...
cat porndomain.acl
sex.com
blahblah.com
weak.com
What I want to happen is to add a "." on each line to look like this...
.sex.com
.blahblah.com
.weak.com
How can I do that with one line of command in Linux?
--
David Tacasa Asuncion
On Wed, Jul 15, 2009 at 10:03 AM, John Peter Loh wrote:
> I tried it again with random filenames. 3 tests in 500 consecutive
> copying of a 76578 byte file, averaged 50.7 failed. Is it possible
> that this is caused by faulty memory too?
you could memtest to rule out memory, mprime to rule out CPU
On Wed, Jul 15, 2009 at 12:08 AM, Pablo
Manalastas wrote:
>
> Let's schedule the chat session at a convenient time for most people in PLUG.
> Which day/time do you suggest?
Hi,
If we could have it this weekend, we could have a F2F for the people
in Metro Manila.
__
2009/7/13 Pablo Manalastas :
> We can suggest to Comelec to compute SHA1 or MD5 checksums of the approved
> programs, and at election time, the checksums can be recomputed (manually)
> and if the original checksum and new checksum agree, then there is no
> substitution.
AFAIR, SHA1 and MD5SUM
I tried it again with random filenames. 3 tests in 500 consecutive
copying of a 76578 byte file, averaged 50.7 failed. Is it possible
that this is caused by faulty memory too?
Thanks Mike!
-JP
On Tue, Jul 14, 2009 at 09:04, Michael Tinsay wrote:
> Possibly HD or controller failure even if S.M.A.
The reason the Comelec is still using the old fashion way tallying the votes
is because that is the law unless they amend the law which I think they
can't given the time frame they have, also you are right in saying that
manipulation are done from the municipal level and so on.
The cheating that is
Silly me, I meant to write SHA-256 (I was reading the AES-attack
article that time).
Thanks for pointing that out!
On Mon, Jul 13, 2009 at 11:13 PM, Pablo
Manalastas wrote:
>
> My GPG 1.4.9 supports the following algorithms:
>
> Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
> Cipher: 3DES (S2), CAST5 (S
I use ip route and it seems to work ok for me. To check you can use
iptraf (written by a fellow filipino gerald java)..
On 7/6/09, Alec Joseph Rivera wrote:
> Winelfred G. Pasamba wrote:
>> i'm been trying this "ip route add ... equalize..." thing. sometimes
>> it works, sometimes it doesn't.
>
I don't think cheating will be done on the technical level, as there
are going to be very few who can pull that off. If there's any
cheating to be done, it will be through ghost precincts and ghost
votes. Therefore, someone needs to monitor the voter's count vs.
Voter's list, monitor against stat
Let's schedule the chat session at a convenient time for most people in PLUG.
Which day/time do you suggest?
//PManalastas
--- On Tue, 7/14/09, fooler mail wrote:
> From: fooler mail
> Subject: Re: [plug] Code Review & SysAdmin of Election 2010 Computers
> To: "Philippine Linux Users' Group
My two cents worth.
Considering the technical difficulties in cheating nationally. We
might finally realize the dream of clean and fair elections on the
national level. Specially with PLUG on the job. Ehem ehem (plugging
PLUG)
I'm afraid however that cheating will simply be done locally by
2009/7/13 Pablo Manalastas :
>
> I volunteered as IT consultant for CenPEG, the Center for People Empowerment
> in Governance. This is a NGO, and it is engaged in a project to document and
> analyze the computerized 2010 elections. CenPEG is not against
> computerization. It is in favor of com
My GPG 1.4.9 supports the following algorithms:
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
Cipher: 3DES (S2), CAST5 (S3), BLOWFISH (S4), AES (S7), AES192 (S8),
AES256 (S9), TWOFISH (S10)
Hash: MD5 (H1), SHA1 (H2), RIPEMD160 (H3), SHA256 (H8), SHA384 (H9),
SHA512 (H10), SHA224 (H11)
Com
Thank you for volunteering. The AES 2010 project (of the UP College of Law and
CenPEG) meets at the project office on the 3rd floor of the UP Law Library in
Diliman. I will email you at a later date to inform you of our next meeting.
Thank you for stepping forward and volunteering. We would
These are the ideas that we need to tell Comelec!
Thank you Holden (from Davao?)
//PManalastas
--- On Tue, 7/14/09, Holden Hao wrote:
> From: Holden Hao
>
> - Political parties should have technical representatives
> and each should be given GPG keys. After the source code
> review, they s
The reason that I posted two very long messages to this list
is so that I can give detailed descriptions of the two classes
of computers that will be used for election 2010.
The precinct count optical scan machines are digital scanners
that read pencil/felt-tip marks (shading in ovals next to
c
29 matches
Mail list logo