{"id":611805,"date":"2019-08-29T00:00:46","date_gmt":"2019-08-29T07:00:46","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&p=611805"},"modified":"2019-09-30T18:02:16","modified_gmt":"2019-10-01T01:02:16","slug":"the-worst-form-including-all-those-others-canadas-experiments-with-online-voting","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/the-worst-form-including-all-those-others-canadas-experiments-with-online-voting\/","title":{"rendered":"The Worst Form Including All Those Others: Canada\u2019s Experiments with Online Voting"},"content":{"rendered":"

Although Canada is quickly becoming a world leader in the use of online voting, a vacuum of cybersecurity standards, regulation, and public awareness has left online voting vendors largely to set their own bar for accountability. This talk will chronicle the rise of online voting in Canada, and present a set of case studies examining recent failures in voter authentication, ballot secrecy, client-side security, disaster preparedness, and results transparency.<\/p>\n

[SLIDES]<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Although Canada is quickly becoming a world leader in the use of online voting, a vacuum of cybersecurity standards, regulation, and public awareness has left online voting vendors largely to set their own bar for accountability. This talk will chronicle the rise of online voting in Canada, and present a set of case studies examining […]<\/p>\n","protected":false},"featured_media":611823,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-video-type":[206954],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-611805","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-video-type-microsoft-research-talks","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/_UrAkmmMDFY","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/611805"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/611805\/revisions"}],"predecessor-version":[{"id":611826,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/611805\/revisions\/611826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/611823"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=611805"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=611805"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=611805"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=611805"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=611805"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=611805"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=611805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}