<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	
	>
<channel>
	<title>
	Comments on: California experiments with open-source voting	</title>
	<atom:link href="https://calwatchdog.com/2014/03/28/california-experiments-with-open-source-voting/feed/" rel="self" type="application/rss+xml" />
	<link>https://calwatchdog.com/2014/03/28/california-experiments-with-open-source-voting/</link>
	<description></description>
	<lastBuildDate>Wed, 25 Mar 2015 06:01:38 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Dave		</title>
		<link>https://calwatchdog.com/2014/03/28/california-experiments-with-open-source-voting/#comment-79264</link>

		<dc:creator><![CDATA[Dave]]></dc:creator>
		<pubDate>Tue, 29 Apr 2014 01:31:46 +0000</pubDate>
		<guid isPermaLink="false">http://calwatchdog.com/?p=61310#comment-79264</guid>

					<description><![CDATA[So something similar to what Estonia had: http://arstechnica.com/tech-policy/2013/07/estonia-publishes-its-e-voting-source-code-on-github/ ?]]></description>
			<content:encoded><![CDATA[<p>So something similar to what Estonia had: <a href="http://arstechnica.com/tech-policy/2013/07/estonia-publishes-its-e-voting-source-code-on-github/" rel="nofollow ugc">http://arstechnica.com/tech-policy/2013/07/estonia-publishes-its-e-voting-source-code-on-github/</a> ?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Kay		</title>
		<link>https://calwatchdog.com/2014/03/28/california-experiments-with-open-source-voting/#comment-76251</link>

		<dc:creator><![CDATA[Kay]]></dc:creator>
		<pubDate>Thu, 03 Apr 2014 14:30:36 +0000</pubDate>
		<guid isPermaLink="false">http://calwatchdog.com/?p=61310#comment-76251</guid>

					<description><![CDATA[California law does not allow for online voting...all votes have to be able to be paper audited...this law was passed not that many years ago; so it isn&#039;t possible to really &quot;hack&quot; elections in this state.... unless you can also fabricate the real votes.]]></description>
			<content:encoded><![CDATA[<p>California law does not allow for online voting&#8230;all votes have to be able to be paper audited&#8230;this law was passed not that many years ago; so it isn&#8217;t possible to really &#8220;hack&#8221; elections in this state&#8230;. unless you can also fabricate the real votes.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: G.R.		</title>
		<link>https://calwatchdog.com/2014/03/28/california-experiments-with-open-source-voting/#comment-76195</link>

		<dc:creator><![CDATA[G.R.]]></dc:creator>
		<pubDate>Wed, 02 Apr 2014 23:24:54 +0000</pubDate>
		<guid isPermaLink="false">http://calwatchdog.com/?p=61310#comment-76195</guid>

					<description><![CDATA[LA County is NOT using e-voting or thinking of using it..you can read their website...their system is not yet close to being implemented, perhaps in another 3 years or more; and after a lot of testing.   You can see everything they are doing on their website: 

http://www.lavote.net/Voter/VSAP/research.html

It is public information...]]></description>
			<content:encoded><![CDATA[<p>LA County is NOT using e-voting or thinking of using it..you can read their website&#8230;their system is not yet close to being implemented, perhaps in another 3 years or more; and after a lot of testing.   You can see everything they are doing on their website: </p>
<p><a href="http://www.lavote.net/Voter/VSAP/research.html" rel="nofollow ugc">http://www.lavote.net/Voter/VSAP/research.html</a></p>
<p>It is public information&#8230;</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Bill Gore		</title>
		<link>https://calwatchdog.com/2014/03/28/california-experiments-with-open-source-voting/#comment-75883</link>

		<dc:creator><![CDATA[Bill Gore]]></dc:creator>
		<pubDate>Mon, 31 Mar 2014 02:35:56 +0000</pubDate>
		<guid isPermaLink="false">http://calwatchdog.com/?p=61310#comment-75883</guid>

					<description><![CDATA[Any form of e-voting is hackable and WILL be hacked.

Paper ballots, please, (yes these are hackable too, just less so) WITH a picture ID.... It is NOT racist to demand a picture ID for voting. Or mail in ballots, if going to a polling place and voting is just &#039;too much&#039;....]]></description>
			<content:encoded><![CDATA[<p>Any form of e-voting is hackable and WILL be hacked.</p>
<p>Paper ballots, please, (yes these are hackable too, just less so) WITH a picture ID&#8230;. It is NOT racist to demand a picture ID for voting. Or mail in ballots, if going to a polling place and voting is just &#8216;too much&#8217;&#8230;.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Brent Turner		</title>
		<link>https://calwatchdog.com/2014/03/28/california-experiments-with-open-source-voting/#comment-75594</link>

		<dc:creator><![CDATA[Brent Turner]]></dc:creator>
		<pubDate>Sat, 29 Mar 2014 00:02:37 +0000</pubDate>
		<guid isPermaLink="false">http://calwatchdog.com/?p=61310#comment-75594</guid>

					<description><![CDATA[A couple of notes- McPherson&#039;s study is now outdated and the open source issue has been resolved by  it&#039;s acceptance and use. SOS Bowen&#039;s &quot;Top to Bottom Review&quot; highlights the lack of security  feasibility for the &quot; secret software&quot; model. regarding the &quot; internet hack &quot;  of 2010 .. that is a red herring as the hosts of the demonstration  were inept and the proving ground skewed. The fact is we now know technology is needed to escape the current debacle..  and the beneficial  use of open source, the internet, and  smart-phones is obvious.]]></description>
			<content:encoded><![CDATA[<p>A couple of notes- McPherson&#8217;s study is now outdated and the open source issue has been resolved by  it&#8217;s acceptance and use. SOS Bowen&#8217;s &#8220;Top to Bottom Review&#8221; highlights the lack of security  feasibility for the &#8221; secret software&#8221; model. regarding the &#8221; internet hack &#8221;  of 2010 .. that is a red herring as the hosts of the demonstration  were inept and the proving ground skewed. The fact is we now know technology is needed to escape the current debacle..  and the beneficial  use of open source, the internet, and  smart-phones is obvious.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: calwatchdog.com @ 2026-04-15 00:20:29 by W3 Total Cache
-->