nitter
This post is unavailable.
Daniel Silverstone ๐๐๐๐ยฒ ๐ณ๏ธโ๐๐ฌ๐ง
@dsilverstone
15 Dec 2016
Replying to
@pwaring
There are likely cryptographic ways to protect identity, combined with ways to prevent aggregated data analysis.
Dec 15, 2016 ยท 5:45 PM UTC
1
Marek Isalski has stopped using this hellsite
@maznu
15 Dec 2016
Replying to
@dsilverstone
@pwaring
similar challenges in e-voting: anonymity of voter, secrecy of vote, but verification required โ hard crypto problem
2
Daniel Silverstone ๐๐๐๐ยฒ ๐ณ๏ธโ๐๐ฌ๐ง
@dsilverstone
15 Dec 2016
In this context, you want to be able to verify that the service authorised the user; but not for what or why. Voting harder.
2
more replies