Smartphone voting will get a trial run during November’s U.S. elections. As part of a new pilot program, West Virginia has partnered with Voatz, a Boston-based technology startup, to allow some members of the military stationed overseas to cast ballots with devices connected to a blockchain-enabled vote recording system.

Security experts have had mixed reactions to the plan, with some saying blockchain technologies aren’t yet ready for important tasks such as voting security. But defenders say the pilot program will allow veterans stationed in remote locations to make their voices heard during the midterm elections — as long as proper security measures are put in place.

Is Blockchain Ready for the Big Time?

Joseph Lorenzo Hall, chief technologist at the Center for Democracy and Technology, a digital rights group, believes smartphone voting is too unproven to use during this year’s elections.

“I don’t know why everyone’s solution to things lately is ‘rub some blockchain on it,'” he said. “Blockchain voting methods typically mean you are doing internet voting — which is a horrifically bad idea — and committing encrypted ballots to the blockchain.”

Current encryption schemes will be broken in coming years, Hall predicted, meaning a secret ballot this year may end up in the public domain in the future.

“Imagine if you’re a uniformed military serviceman stationed abroad, excited to be able to cast a ballot … using a remote blockchain voting system. Then imagine that in 20 years, the entire contents of your ballot are decryptable and publicly available. You may face ridicule or other kinds of blowback from your ballot from 20 years ago.”

Given these risks, Hall urged caution, noting that the voting process is not something to tinker with before conducting a “serious and deep inquiry and interrogation.”

The Benefits of Blockchain-Based Balloting

West Virginia Secretary of State Mac Warner, on the other hand, defended the pilot program. According to Mike Queen, Warner’s deputy chief of staff, the retired Army officer had been unable to vote during his deployments, and he wants to provide members of the military with better opportunities.

During a tour in Afghanistan, Queen noted that Warner didn’t have access to a phone line or a mailbox — meaning he was cut off from voting in a past election. Many other servicemen and women face the same problem. During the 2016 general election, military members and other U.S. citizens living overseas requested about 930,000 absentee ballots, 68.1 percent of which were returned, according to the U.S. Election Assistance Commission.

This isn’t the first smartphone-and-blockchain voting trial for West Virginia. A smaller pilot allowed veterans from two counties to vote on smartphones during May’s primary election, but, as Queen noted, fewer than 20 did.

Given May’s numbers, officials aren’t expecting a huge portion of veterans to participate in November’s trial. According to Queen, the November pilot project will allow overseas military members from about 15 West Virginia counties to vote on smartphones.

How Can Governments Address Voting Security Challenges?

Even so, the forthcoming trial will employ other security measures in addition to blockchain. The voting system will use two-factor authentication (2FA) — fingerprints and facial recognition — to identify and verify voters, Queen said.

“We’re not suggesting the blockchain is 100 percent foolproof,” he said, but blockchain, combined with other security measures, “is as safe as we can get.”

Some blockchain experts believe that the security of the voting system will largely depend on its implementation and ability to identify the correct user of a given device. A correctly established blockchain using multiple distributed nodes, they argue, should make the voting system extremely difficult to compromise.

With a robust blockchain, user authentication may be the most crucial security measure, said Andre McGregor, a partner at global investment and advisory firm TLDR Capital and a former FBI cyber special agent.

“While it is exciting to see blockchain being used in a very public and necessary environment such as elections, we must realize that security compromise will almost always lie with the end user — or, in this case, the voter,” McGregor said. “Vote interception malware is a real concern. Biometric compromise by a fake voter is even more of a concern.”

It would also be possible for an authenticated voter to pass his or her phone to someone else to cast a ballot, he said. That’s “the digital equivalent of having someone else walk into the voting booth under your name,” McGregor added.

“The ease in which a mobile phone vote can transfer hands in a split of an instant could very well undermine the voting process, and could even call a candidate’s victory into question.”

But while some cryptocurrency blockchains operate thousands of nodes, Voatz will provide “up to 16 nodes” for the voting pilot. Still, Voatz said the system is secure, with its voting app undergoing “frequent, rigorous red-team testing” by independent security auditors.

Even a blockchain system with as few as 16 nodes would be extremely difficult to compromise, as long as the nodes are securely set up, said Kyle Fournier, crypto analyst at blockchain training vendor CryptoManiaks. The standard blockchain compromise, called the 51 percent attack because attackers would have to take over more than half of the system’s nodes, would be difficult if the nodes are tested and verified against the rules of the system, he said.

“For a 51 percent attack to occur on a 16-node blockchain, a bad actor would need to gain control of at least nine nodes, assuming that the nodes share equal responsibility,” Fournier explained. “If the servers being used as nodes have been verified in any real sense, I would say that a 51 percent attack should not be feasible.”

What Does the Future Hold for Blockchain-Based Voting?

Fournier said he sees potential in blockchain-based voting.

“Our current method of voting is simply not good enough,” he said. “Requiring people to travel to physical locations causes low voter turnout. Counting by hand is slow. And although bringing the process online seems to open us up to hacking, hacking already exists with the way we do things now.”

Still, Jeff Anderson, blockchain expert and certified security professional, suggested it may be too soon to move toward smartphone voting using blockchain. Blockchain-based voting will require a lot of training to help voters ensure their votes are correctly recorded, he said.

The technology might be ready in five to 10 years, when more people are comfortable with blockchain, Anderson added.

“Blockchain is still an incredibly early technology,” he said. “Voting is something we want to ensure is done on tested platforms.”

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today