Privacy Preserving and Trusted Voting

There is, of course, much more to creating a trustworthy democratic infrastructure, but I thought I’d introduce a few basic concepts here.

Our existing voting methods are often unfit for the 21st Century. In the UK we still receive a piece of paper with our name on it and then go along to the polling station and receive a ballot paper. Our name is then scored off a list with a pen. We next go into…




This publication brings together interesting articles related to cyber security.

Recommended from Medium

IT Executive Sam Tenorio III Explores the Benefits of Edge Computing

Transferring $12.5 million into your account …

Brainpan 1 — Try Hack Me

Deltahub Capital invests in Hackless

How I “Red Teamed” into my smart home (Part 1) — Prelude

But, What Does A Digital Signature Actually Look Like?

Shop and Earn with ASK

Spherium Finance Token Smart Contract Audit Update

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

A Bit of RSA and PowerShell, And The Wonder of dP, dQ and InvQ

What Makes Elliptic Curve Cryptography So Good? … Montgomery’s Ladder

Proving a Number Is In A Given Range Without Revealing The Number: Meet Bulletproofs