Ben Adida
banner
benadida.com
Ben Adida
@benadida.com
I lead an incredible team building voting machines everyone can trust. https://voting.works

Optimistic about judicious uses of tech. Systems, security, privacy, cryptography, and the web are my jam.

Previously: Clever, Square, Mozilla, Harvard, MIT.
Absolutely fascinating. I really want to know how they diagnosed this. Incredible.
November 28, 2025 at 10:41 PM
How does the software revert make this better? Did they inadvertently remove some error correction?
November 28, 2025 at 10:09 PM
This is one great example of how AI could be a huge accessibility win. I think we're all underestimating this category of use case.
November 28, 2025 at 9:44 PM
Non, je ne suis pas d'accord, ce n'est pas la leçon a tirer. On peut échouer en faisant une election sur papier aussi. Les elections, c'est compliqué. Et avec Helios, l'association de cryptologues a réussi un niveau de confiance bien supérieur depuis 15ans.
November 23, 2025 at 3:55 PM
You're sure you would never make a mistake here? Once in 15 years?
November 23, 2025 at 2:53 AM
Yes, I agree, that could help!
November 22, 2025 at 9:17 PM
lol yeah, that's one for the books.
November 22, 2025 at 7:53 PM
Privacy in systems like Helios is always susceptible to collusion of (some of) the trustees, just a matter of deciding how large you want your minimum number of colluders to be.

Accuracy of the count, however, isn't affected even if all trustees collude.
November 22, 2025 at 3:37 PM
We should totally fix this! Fewer rounds to set up effective threshold decryption would be amazing.

Best I can think of right now without actual threshold cryptography would be escrowing your share encrypted against one other trustee's public key.
November 22, 2025 at 3:11 PM
Correct, Helios doesn't support this out of the box and it's the UX that would be awkward, not the cryptography.

IACR is going to move to 2-out-of-3 manually for now by sharing a key share across two trustees.

And then I gotta think about how to make this better, whether there is a reasonable UX.
November 22, 2025 at 3:08 PM
so hard.
November 22, 2025 at 2:44 AM
So the problem stands – how do you offer real security & privacy that different users can use safely? It's super hard.

All I can say is, if you're making fun of someone who lost their secret key, you're doing it wrong. It will happen to you someday, too.

And I need to make Helios better.
November 22, 2025 at 2:40 AM
And still, to this day, about once every 2 months, a user clicks through the scary popup that tells them that if they don't save their secret key, they won't be able to tally their election. Then they lose their key and email asking for help. Help that is mathematically infeasible for me to provide.
November 22, 2025 at 2:40 AM
I used to regularly get emails saying "I lost my private key, can you send me a new one?" But ... that doesn't work.

So I made the trustee function really scary. By default, Helios manages the key, and privacy is not as strong. There's an ugly scary popup if you try to set up trustees.
November 22, 2025 at 2:40 AM
And of course this is where designing Helios for different audiences is really tricky. Some users, like the IACR, are super expert and they can go through the complex setup process. Other users don't even understand what a key is.
November 22, 2025 at 2:40 AM
Do you require all trustees to be present for decryption, or do you tolerate a minority of trustees to be absent?

For resilience, it seems clear you should tolerate some trustees being absent. But that complicates the setup process: all trustees need to log in once, then a second time.
November 22, 2025 at 2:40 AM
And then you need to manage how the decryption of the tally is performed, and the only way we know how to do that reasonably well is by having a set of trustees where no single individual can go rogue and break privacy.

But there's a very specific design tradeoff here.
November 22, 2025 at 2:40 AM