CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
- 
It is a well understood scientific fact that Internet voting in public elections is not securable: “the Internet should not be used for the return of marked ballots. … [N]o… 
- 
Vulnerability reporting is dysfunctionalBy Kevin Lee, Ben Kaiser, Jonathan Mayer, and Arvind Narayanan In January, we released a study showing the ease of SIM swaps at five U.S. prepaid carriers. These attacks—in which… 
- 
Building a Bridge with Concrete… ExamplesThanks to Annette Zimmermann and Arvind Narayanan for their helpful feedback on this post. Algorithmic bias is currently generating a lot of lively public and scholarly debate, especially amongst computer… 
- 
The CheapBit of Fitness Trackers AppsYan Shvartzshnaider (@ynotez) and Madelyn Sanfilippo (@MrsMRS_PhD) Fitness trackers are “[devices] that you can wear that records your daily physical activity, as well as other information about your health, such… 
- 
Ballot-level comparison audits: BMDIn my previous posts, I’ve been discussing ballot-level comparison audits, a form of risk-limiting audit. Ballots are imprinted with serial numbers (after they leave the voter’s hands); during the audit,… 
- 
Finding a randomly numbered ballotIn my previous posts, I’ve been discussing ballot-level comparison audits, a form of risk-limiting audit. Ballots are imprinted with serial numbers (after they leave the voter’s hands); during the audit,… 
- 
Why we can’t do random selection the other way round in PCOS RLAsIn my last article, I posed this puzzle for the reader. We want to do ballot-level comparison audits, a form of RLA (risk-limiting audit) on a precinct-count optical-scan (PCOS) voting… 
- 
Ballot-level comparison audits: precinct-countSpecial bonus: This article contains two puzzles for the reader, marked in green. Try to solve them yourself before reading the solutions in a future post! In my last post… 
- 
Ballot-level comparison audits: central-countAll voting machines these days are computers, and any voting machine that is a computer can be hacked to cheat. The widely accepted solution is to use voting machines to… 
- 
CITP Tech Policy Boot Camp 2019[This post was written by Liza Paudel, MPA’21 and Allison Huang, History’20.] Over Fall Break, the Center for Information Technology Policy (CITP) hosted 17 current students on a two-day tech… 

