Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vote for this vulnerability, and I will send you 1$. #181

Open
mspecter opened this issue Aug 8, 2024 · 3 comments
Open

Vote for this vulnerability, and I will send you 1$. #181

mspecter opened this issue Aug 8, 2024 · 3 comments

Comments

@mspecter
Copy link

mspecter commented Aug 8, 2024

What’s the exploit?

Just as the title says, if you vote for this issue, I will send you 1$. That’s it, that’s the exploit.

When will I get the money?

After the election closes (at the time of writing, in 3 days), and this bug wins.
I would rush though, it’s first-come-first-serve, up to the 5k offered by the competition.

How do I claim my 1$?

Drop me an email, text, or whatever with your authkey, encrypted ballot, verification number, and anything else that’s required to perform verification. I’ll verify that it’s on the public log, and, if this wins, I’ll send you your money in whatever way is good for you (cryptocurrency, venmo, whatever).

Easiest contact is [email protected], but other contact methods are available via my profile if that’s better.

How do I know that you’ll send me the money?

You’ll be able to publicly call me a liar after the event. My identity is verified on keybase. And you'll be able to prove how you voted.

I’m a professor at Georgia Tech, where I study elections, systems security, and applied cryptography for a living. Some of my prior work on the subject is here and here.

SIV’s documentation argues for 30$, why is the reward only 1$?

What will you do with the rest of the cash?

After I recoup expenses, assuming I actually get the cash, I’ll donate the rest to the EFF, and publicly post receipts. If you don’t want your dollar, you can send me proof and I’ll donate that dollar to the EFF in your name.

But, doesn’t this violate the rules of the game?

Well, yes, and no. The organizers appear to not believe that this is a real attack. The point is to prove that it’s within the bounds of an election, and a very, very real threat.

Why won’t you report me to SIV? Won't I have to pay them money?

Because I don’t buy their threat model, and have no interest in giving them more money. I want to win!

Also, you don’t have to sign their contract — and even if you did, I wish them luck in trying to enforce it.

Why are you doing this?

The goal is to demonstrate that vote selling is a real problem, not one that can be shirked off as outside of the threat model.

It's commonly accepted that vote selling is a real world issue that electronic voting systems should be designed to overcome. Indeed, there are cryptographic voting systems that do provide some protections against this sort of attack (see, e.g., Helios). They’re still buggy, and this is an active research area (a really great place to start is Bernhard et al's SOK).

It is therefore unclear why this is out of scope for this system, or that the informally proposed approach actually works. I would encourage SIV to formalize their model, attempt to publish this in a peer-reviewed conference, and get more feedback there.

OK, but, in the real world, wouldn’t this just be illegal? What about the whole "honeypot" argument?

I doubt that Russia or other nation-states care much about US law, and they can easily verify themselves as being real, as I have above.

Further, we're both incentivized to keep this secret -- the attacker's goal is to rig the election, and the seller's goal is to get their vote sold. If I invalidated your vote, I'd only be hurting my own goals!

More advanced techniques would likely provide some anonymity to the seller; e.g. deliver rewards via a shielded transaction, and use some sort of SNARK/ZKP to verify the ballot and its contents without revealing much about the seller.

But, then why is mail in balloting not affected?

Remoteness, verifiability, and scalability are differentiating factors here.

Remoteness: In SIV's protocol, an attacker can easily verify that the ballot was valid, while being in a completely different location than the election. Case-in-point, I'm writing this from my office in Atlanta, whereas the in-person event is currently happening in Vegas.

Verifiability: I can cryptographically verify how you voted, if you provide me adequate information.

Scalability: I can do this verification operation really quickly, and without much effort.

Conversely, mail-in balloting attacks that are described by SIV are not scalable, not as verifiable, and not easily performed remotely. I would have to get the ballot, which might require physical access to the voter (to retrieve a blank ballot). I wouldn’t be able to verify that the voter didn’t later vote in-person at a polling station (which would supersede and “spoil” the mail-in ballot), or that they didn’t scribble a signature that wouldn’t be verifiable to the elections officials. And, finally, it would require me interacting with a ton of people to impact the election, putting myself at risk in the process.

What if SIV closes this issue?

Well, that would indicate that the attack is very, very real, wouldn’t it?
In any case, the deal is still on, even if SIV decides to close this issue.

Edited slightly for clarity

@dsernst
Copy link
Member

dsernst commented Aug 8, 2024

Thanks for the detailed write up. Zero interest from our end in closing or attempting to censor or anything. On the contrary, love to see the thoughtfulness and engagement. (you may or may not recall we have a few emails from years back hoping to pursue more rigorous analysis on this issue <3)

Just posting this as an initial quick reply but will still come back to dig deeper into everything you wrote. Thanks!

@mspecter

This comment was marked as off-topic.

@arianabuilds
Copy link
Member

arianabuilds commented Aug 28, 2024

Thanks again for participating!

HACK SIV Competition Submission

DEF CON 2024, August 6-11
hack.siv.org

SIV Evaluation

Type: Protocol

In Favor:

  • Vote selling is bad
  • The brazenness was surprising
  • Clearly lots of creative energy went into it
  • Usefully provided new data, validating the whole purpose of the proposed experiment
  • Cleverly put us in a challenging position, because we of course don't want to help advertise vote buying, but even more importantly, don't want to censor submissions. [although in non HACK SIV contexts this wouldn't apply]

Against:

  • Feels unusually specific to this vote, more like scoring political points.
  • Feels disconnected from the enthusiasm the overwhelming majority of DEFCONers have shown (and tons of other pro-democracy people before them), about being able to engage with and use the verifiable SIV design.
  • Because a vote for this submission is superficially an endorsement of it as an important attack, deserving of prize money, it's extra hard to tell if would be vote-sellers are actually being compromised, or just genuinely like the submission.
  • Why only $1? Why not more? If the attack works, isn't it more persuasive to show it at overwhelming scale?
  • Unclear if the "I will publicly prove my identity, outing myself as an open-enemy of the election's legitimacy" really translates to other contexts. "International buyers will openly violate the host country's law" seems like an attack upon the entire geopolitical apparatus? Eg the sanctions system. An open attack on sovereignty? Unclear if this is as cut-and-dry as being portrayed.

Prize Allocation

Total: $857.67

  • SIV: $113.38
  • Public: $744.29

Payment Status

Track process on siv-org/hack.siv.org#11

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants