{"id":3119,"date":"2022-12-02T00:15:22","date_gmt":"2022-12-01T23:15:22","guid":{"rendered":"https:\/\/innovatrics.com\/trustreport\/?p=3119"},"modified":"2022-12-08T16:11:09","modified_gmt":"2022-12-08T15:11:09","slug":"six-must-haves-for-a-trusted-election-via-smartphones","status":"publish","type":"post","link":"https:\/\/innovatrics.com\/trustreport\/six-must-haves-for-a-trusted-election-via-smartphones\/","title":{"rendered":"Six must-haves for a trusted election via smartphones"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" width=\"2632\" height=\"1292\" src=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/10\/Estonia-cover.png\" alt=\"\" class=\"wp-image-3121\" srcset=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/10\/Estonia-cover.png 2632w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/10\/Estonia-cover-300x147.png 300w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/10\/Estonia-cover-1024x503.png 1024w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/10\/Estonia-cover-1536x754.png 1536w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/10\/Estonia-cover-2048x1005.png 2048w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/10\/Estonia-cover-300x147@2x.png 600w\" sizes=\"(max-width: 2632px) 100vw, 2632px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:33.33%\"><\/div>\n\n\n\n<div class=\"wp-block-column\" style=\"flex-basis:66.66%\">\n<p class=\"has-medium-font-size\"><strong><strong>We go online to send money, manage our health, take classes and buy groceries \u2013 so why are we still unable to vote via our smartphones? Governments often cite risks of possible hacks and security breaches, which are said to have greater potential to affect online systems than traditional processes. But is that really the case?&nbsp;<\/strong>&nbsp;<\/strong><\/p>\n\n\n\n<p>In reality, online voting could increase voter turnout as well as avoid fraud and mistakes. Plus, sooner or later it&#8217;s also bound to be a matter of public expectation. Let\u2019s find out what we can learn from the pioneer in online voting, Estonia.<\/p>\n\n\n\n<p>Estonia has allowed its citizens to vote online for national, local and European elections since 2005. Citizens can vote from anywhere \u2013 their homes, offices, or even while they are on vacation \u2013 using any of their personal devices: smartphones, laptops, tablets. When you think about the possibilities, online voting has the potential to be a great thing. It\u2019s more convenient, the results should be more accurate, human mistakes could be avoided and counting would be easily repeatable. Nevertheless, many democratic countries see online voting as a taboo \u2013 and its potential still remains untapped.<\/p>\n\n\n\n<p>Hacks and sabotages are more than legitimate concerns when it comes to safeguarding the heart of the democratic system. Still, Estonia shows us that it is possible to vote online securely, and in a way deserving of citizens\u2019 trust.<\/p>\n\n\n\n<p>So, how can we make voting via smartphones a reality?<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<figure class=\"wp-block-image size-full desktop-only\"><img loading=\"lazy\" width=\"2480\" height=\"6756\" src=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/TR221002-Issue-3-Clanok-2-grafika-V02-02-update.png\" alt=\"\" class=\"wp-image-3627\" srcset=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/TR221002-Issue-3-Clanok-2-grafika-V02-02-update.png 2480w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/TR221002-Issue-3-Clanok-2-grafika-V02-02-update-110x300.png 110w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/TR221002-Issue-3-Clanok-2-grafika-V02-02-update-376x1024.png 376w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/TR221002-Issue-3-Clanok-2-grafika-V02-02-update-564x1536.png 564w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/TR221002-Issue-3-Clanok-2-grafika-V02-02-update-752x2048.png 752w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/TR221002-Issue-3-Clanok-2-grafika-V02-02-update-110x300@2x.png 220w\" sizes=\"(max-width: 2480px) 100vw, 2480px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full mobile-only\"><img loading=\"lazy\" width=\"1126\" height=\"8190\" src=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/12\/TR221002-Issue-3-Clanok-2-grafika-MOBILE-V02-02.png\" alt=\"\" class=\"wp-image-4031\" title=\"mobile-only\" srcset=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/12\/TR221002-Issue-3-Clanok-2-grafika-MOBILE-V02-02.png 1126w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/12\/TR221002-Issue-3-Clanok-2-grafika-MOBILE-V02-02-211x1536.png 211w\" sizes=\"(max-width: 1126px) 100vw, 1126px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column is-vertically-aligned-bottom\" style=\"flex-basis:33.33%\">\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-small-font-size\"><strong><strong>Authentication in traditional elections<\/strong><\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\">During in-person voting, one or more election officials manually verify the ID of the voter to prevent scams and check if the voter is inscribed in the electoral register. As secure as this method can be, it requires a certain amount of time. <\/p>\n\n\n\n<p class=\"has-small-font-size\">Mail-in voters usually verify their identity by communicating data such as their ID number or date of birth on a form that is attached to the ballot. To impersonate a voter, a thief would therefore simply need to obtain that information plus the ballot.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top\" style=\"flex-basis:66.66%\">\n<h3>1. Authenticating the voters<\/h3>\n\n\n\n<p>Any electoral system must ensure that only legitimate voters are casting a ballot: no deceased people, for example, or identity thieves. Knowing who is voting is the responsibility of a decent voting system \u2013 so how does it work in online voting?<\/p>\n\n\n\n<figure class=\"wp-block-image size-large width640\"><img loading=\"lazy\" width=\"1024\" height=\"246\" src=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-03-1-1024x246.png\" alt=\"\" class=\"wp-image-3310\" srcset=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-03-1-1024x246.png 1024w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-03-1-300x72.png 300w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-03-1-1536x369.png 1536w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-03-1.png 2000w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-03-1-300x72@2x.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In Estonia, 99% of citizens have a state-issued digital identity, and this makes the job half done. Basically, every Estonian has a digital profile \u2013 containing personal information like place and date of birth and biometric data \u2013 that is stored in their own electronic ID card or in a special mobile SIM card. This allows citizens to access a diverse range of digital services, from tax declaration to e-health. And this digital identity can also be used to authenticate voters.<\/p>\n\n\n\n<p>To cast a vote from their smartphone, for example, Estonians insert their ID cards into a card reader and then enter their PIN code. The system reads the digital profile and checks whether the citizen is eligible for voting or not, and after just a few seconds, the eligible voter is then ready to e-cast their ballot. In the future, biometrics may be used to ease this authentication process.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:33.33%\"><\/div>\n\n\n\n<div class=\"wp-block-column\" style=\"flex-basis:66.66%\">\n<h3>2. Ensuring that the voting is free<\/h3>\n\n\n\n<p>No coercion, no threats and no intimidation of any kind must be allowed to impact voters.&nbsp;<\/p>\n\n\n\n<p>One of the biggest objections to online voting is that it happens in places that can\u2019t be monitored \u2013 it does not happen in a polling station or in an embassy, it can take place anywhere. So how can you be sure that citizens are voting according to their own true will?<\/p>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<figure class=\"wp-block-image size-large width640\"><img loading=\"lazy\" width=\"1024\" height=\"305\" src=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-01-1-1024x305.png\" alt=\"\" class=\"wp-image-3311\" srcset=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-01-1-1024x305.png 1024w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-01-1-300x89.png 300w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-01-1-1536x457.png 1536w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-01-1.png 2000w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-01-1-300x89@2x.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Sometimes the best solution is the simplest one. Without the use of any tech fix, online voting systems usually resolve this coercion issue by allowing voters to cast as many votes they want \u2013 with the last vote being the only one that counts. It\u2019s simple, and it works.&nbsp;<\/p>\n\n\n\n<p>People who may have been biased, intimidated or forced in their vote can access the system again at a later stage and cast their actual vote. In Estonia, online voters may also visit a polling station after having voted online: in-person ballots have supremacy over the e-vote.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column is-vertically-aligned-bottom\" style=\"flex-basis:33.33%\">\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-small-font-size\"><strong><strong>Voter anonymity in traditional elections<\/strong><\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\">Maintaining voter anonymity also represents a challenge for more traditional ways of voting. Clandestine cameras at poll sites can be used to expose voter identity, while latent fingerprints left on ballots might also be used to link voters to their ballots.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column\" style=\"flex-basis:66.66%\">\n<h3>3. Anonymising the ballots<\/h3>\n\n\n\n<p>The vote is secret \u2013 this is one of the essentials of any democratic electoral system. Although the identity of the voter must initially be verified in order to let the voter cast the ballot, it must in no way be linked with their preference.<\/p>\n\n\n\n<p>To anonymise the ballots, online voting systems use a so-called double-envelope scheme. This is a classical scheme that also works in the analogue world. Imagine two envelopes, one inside the other. The inner envelope contains the vote, the outer envelope contains the voter&#8217;s name. The so-assembled bundle arrives at the teller: the outer envelope is opened, the name is checked to make sure the voter is eligible, and then disposed of. Only the inner envelope remains, still sealed and containing the vote. This is mixed in the ballot box with all other votes.&nbsp;<\/p>\n\n\n\n<p>Online voting basically replicates this &#8220;old-school&#8221; scheme: yet instead of envelopes we have separate encryption algorithms that secure each part of the vote, maintaining the anonymity as well as ensuring nobody can open (or decrypt) the ballots before the counting. When ready to count, the first round of decryption is done to the \u201couter envelope\u201d,&nbsp; i.e. the voter\u2019s name. Once approved, the \u201cinner envelope\u201d, still encrypted, is then added to the digital ballot box. The digital anonymisation goes even further than the manual version, however, as the secret votes are mixed several times through a chain of servers before being decrypted, making it even harder for would-be hackers to trace back to a voter\u2019s identity.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:33.33%\"><\/div>\n\n\n\n<div class=\"wp-block-column\" style=\"flex-basis:66.66%\">\n<h3>4. Securely transmitting the ballots<\/h3>\n\n\n\n<p>During an online election, as votes leave the voters\u2019 smartphones they are sent to a virtual central ballot box where they will then be tallied. How to ensure that votes are not tampered with along the way? And how to prevent that information from being revealed to prying eyes?&nbsp;<\/p>\n\n\n\n<p>This is a critical point, and it is much emphasised by critics arguing that hackers would exploit any security flaw in this transition. Yet, with the right measures, transmitting votes can be completely secure.<\/p>\n\n\n\n<p>Two things are needed to safely transmit an electronic vote. First, the information must be encrypted \u2013 meaning it\u2019s only possible to be read by the intended, legitimate people \u2013 and second, it must be sent over a secure connection linking the smartphone with the central system.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<figure class=\"wp-block-image size-large width640\"><img loading=\"lazy\" width=\"1024\" height=\"307\" src=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-05-1-1024x307.png\" alt=\"\" class=\"wp-image-3312\" srcset=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-05-1-1024x307.png 1024w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-05-1-300x90.png 300w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-05-1-1536x460.png 1536w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-05-1.png 2000w, https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/11\/Est-infobox-05-1-300x90@2x.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Put simply, encryption algorithms turn the vote into a string of numbers and letters, something that looks like this: <em>7hjkaouy84uhalk001klosokcbnz<\/em>. Obviously, no one can understand the meaning of the string, unless they have the only thing that can turn it back: the decryption key.&nbsp;<\/p>\n\n\n\n<p>Encrypted votes are then sent over secure connections. Popular protocols are employed here, such as the Transport Layer Security (TLS) used by PayPal, among others. The security of these channels is also guaranteed by cryptography.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:33.33%\"><\/div>\n\n\n\n<div class=\"wp-block-column\" style=\"flex-basis:66.66%\">\n<h3>5. Decrypting the votes<\/h3>\n\n\n\n<p>Votes have now reached the virtual ballot box. They are stored in a highly secure server, which is called an air-gapped server \u2013 a set of computers physically isolated from any other network to prevent them from being reached by any malicious actor.&nbsp;<\/p>\n\n\n\n<p>Votes will then be decrypted by the electoral committee and tallied. As mentioned, a private decryption key is needed to read the votes. This key is perhaps the most important thing to be kept secret and secure: anyone who gets their hands on it could sabotage the elections of a democratic country.<\/p>\n\n\n\n<p>The decryption key is thus broken down into several pieces, with each one given to a different member of the electoral board. In Estonia, for example, each one of the seven electoral board members has a token. The token is stored in a smart card or USB device, protected by a PIN code. When it comes time to count the votes, the electoral board members must enter their tokens into the air-gapped server to rebuild the decryption key. A minimum quorum is needed to generate the key.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column is-vertically-aligned-bottom\" style=\"flex-basis:33.33%\">\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-small-font-size\"><strong>Counting the traditional way<\/strong><br><br>Most democracies collect votes in traditional ballot boxes, which then require armies of poll workers \u2013 or, more recently, automated scanning machines \u2013 to tally the results. The counting of paper ballots has an estimated error rate that ranges from 0.5% to 2%.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column\" style=\"flex-basis:66.66%\">\n<h3>6. Counting the votes<\/h3>\n\n\n\n<p>Finally: the vote counting. The tallying is usually operated by the air-gapped computers.<\/p>\n\n\n\n<p>In Estonia, to make sure that the computers count the votes correctly, logic and accuracy tests are constantly conducted. For example, the system is regularly fed with test ballots that have been already counted.&nbsp;<\/p>\n\n\n\n<p>In 17 years of online elections in Estonia, not a single vote has been incorrectly counted.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:33.33%\"><\/div>\n\n\n\n<div class=\"wp-block-column\" style=\"flex-basis:66.66%\">\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-color has-small-font-size\" style=\"color:#7c878e\"><strong>AUTHOR<\/strong><br>Giovanni Blandino<\/p>\n\n\n\n<p class=\"has-text-color has-small-font-size\" style=\"color:#7c878e\"><strong>PHOTOS<\/strong><br>Shutterstock<\/p>\n\n\n\n<p class=\"has-text-color has-small-font-size\" style=\"color:#7c878e\"><strong>SOURCES<\/strong><br><a href=\"https:\/\/spectrum.ieee.org\/online-voting-isnt-as-flawed-as-you-thinkjust-ask-estonia\" target=\"_blank\" rel=\"noreferrer noopener\">Online Voting Isn\u2019t as Flawed as You Think\u2014Just Ask Estonia<\/a><br><a href=\"https:\/\/aceproject.org\/ace-en\/topics\/lf\/lfb\/lfb10\" target=\"_blank\" rel=\"noreferrer noopener\">Elections and Technology<\/a><br><a href=\"https:\/\/e-estonia.com\/solutions\/e-identity\/id-card\/\" target=\"_blank\" rel=\"noreferrer noopener\">e-Identity<\/a><br><a href=\"https:\/\/nap.nationalacademies.org\/read\/25120\/chapter\/7\" target=\"_blank\" rel=\"noreferrer noopener\">Ensuring the Integrity of Elections<\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>We go online to send money, manage our health, take classes and buy groceries \u2013 so why are we still unable to vote via our smartphones? Governments often cite risks of possible hacks and security breaches, which are said to have greater potential to affect online systems than traditional processes. But is that really the [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":3121,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[55,54,62],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.6.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Six must-haves for a trusted election via smartphones - Innovatrics<\/title>\n<meta name=\"description\" content=\"Today, we use the internet to send money, manage our health, take classes and buy groceries \u2013 so why are elections still not happening via our smartphones? Online voting could increase voter turnout as well as avoid fraud and mistakes, and sooner or later it will also just be a matter of public expectation. Yet, very few countries currently allow online elections. Resistance focuses on hacks and security breaches, which are said to have greater potential to affect online systems than traditional voting processes. But is that really the case? Let&#039;s see what we can learn from an online voting pioneering country: Estonia.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/innovatrics.com\/trustreport\/six-must-haves-for-a-trusted-election-via-smartphones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Six must-haves for a trusted election via smartphones - Innovatrics\" \/>\n<meta property=\"og:description\" content=\"Today, we use the internet to send money, manage our health, take classes and buy groceries \u2013 so why are elections still not happening via our smartphones? Online voting could increase voter turnout as well as avoid fraud and mistakes, and sooner or later it will also just be a matter of public expectation. Yet, very few countries currently allow online elections. Resistance focuses on hacks and security breaches, which are said to have greater potential to affect online systems than traditional voting processes. But is that really the case? Let&#039;s see what we can learn from an online voting pioneering country: Estonia.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/innovatrics.com\/trustreport\/six-must-haves-for-a-trusted-election-via-smartphones\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovatrics\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-01T23:15:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-08T15:11:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/10\/Estonia-cover.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2632\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"8 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/innovatrics.com\/trustreport\/#website\",\"url\":\"https:\/\/innovatrics.com\/trustreport\/\",\"name\":\"Innovatrics\",\"description\":\"Len \\u010fal\\u0161ia WordPress str\\u00e1nka\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/innovatrics.com\/trustreport\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/innovatrics.com\/trustreport\/six-must-haves-for-a-trusted-election-via-smartphones\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/innovatrics.com\/trustreport\/wp-content\/uploads\/2022\/10\/Estonia-cover.png\",\"width\":2632,\"height\":1292},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/innovatrics.com\/trustreport\/six-must-haves-for-a-trusted-election-via-smartphones\/#webpage\",\"url\":\"https:\/\/innovatrics.com\/trustreport\/six-must-haves-for-a-trusted-election-via-smartphones\/\",\"name\":\"Six must-haves for a trusted election via smartphones - Innovatrics\",\"isPartOf\":{\"@id\":\"https:\/\/innovatrics.com\/trustreport\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/innovatrics.com\/trustreport\/six-must-haves-for-a-trusted-election-via-smartphones\/#primaryimage\"},\"datePublished\":\"2022-12-01T23:15:22+00:00\",\"dateModified\":\"2022-12-08T15:11:09+00:00\",\"author\":{\"@id\":\"https:\/\/innovatrics.com\/trustreport\/#\/schema\/person\/057dfc46923c292d7bd5dd8adac98971\"},\"description\":\"Today, we use the internet to send money, manage our health, take classes and buy groceries \\u2013 so why are elections still not happening via our smartphones? Online voting could increase voter turnout as well as avoid fraud and mistakes, and sooner or later it will also just be a matter of public expectation. Yet, very few countries currently allow online elections. Resistance focuses on hacks and security breaches, which are said to have greater potential to affect online systems than traditional voting processes. But is that really the case? Let's see what we can learn from an online voting pioneering country: Estonia.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/innovatrics.com\/trustreport\/six-must-haves-for-a-trusted-election-via-smartphones\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/innovatrics.com\/trustreport\/#\/schema\/person\/057dfc46923c292d7bd5dd8adac98971\",\"name\":\"Michal Nagy\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/innovatrics.com\/trustreport\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c0252b23328b205363132fb29240f1d4?s=96&d=mm&r=g\",\"caption\":\"Michal Nagy\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/innovatrics.com\/trustreport\/wp-json\/wp\/v2\/posts\/3119"}],"collection":[{"href":"https:\/\/innovatrics.com\/trustreport\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/innovatrics.com\/trustreport\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/innovatrics.com\/trustreport\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/innovatrics.com\/trustreport\/wp-json\/wp\/v2\/comments?post=3119"}],"version-history":[{"count":197,"href":"https:\/\/innovatrics.com\/trustreport\/wp-json\/wp\/v2\/posts\/3119\/revisions"}],"predecessor-version":[{"id":4035,"href":"https:\/\/innovatrics.com\/trustreport\/wp-json\/wp\/v2\/posts\/3119\/revisions\/4035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/innovatrics.com\/trustreport\/wp-json\/wp\/v2\/media\/3121"}],"wp:attachment":[{"href":"https:\/\/innovatrics.com\/trustreport\/wp-json\/wp\/v2\/media?parent=3119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/innovatrics.com\/trustreport\/wp-json\/wp\/v2\/categories?post=3119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/innovatrics.com\/trustreport\/wp-json\/wp\/v2\/tags?post=3119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}