Security Analysis of a Thirteenth-Century Venetian Election Protocol

This paper discusses the protocol used for electing the Doge of Venice between 1268 and the end of the Republic in 1797.
We will show that it has some useful properties that in addition to being interesting in themselves, also suggest that its fundamental design principle is worth investigating for application to leader election protocols in computer science.
It gives some opportunities to minorities while ensuring that more popular candidates are more likely to win, and offers some resistance to corruption of voters.
The most obvious feature of this protocol is that it is complicated and would have taken a long time to carry out.
We will also advance a hypothesis as to why it is so complicated, and describe a simplified protocol with very similar properties.
Security theatre has positive aspects too, provided that it is not used as a substitute for actions that would actually improve security.
In the context of the election of the Doge, the complexity of the protocol had the effect that all the oligarchs took part in a long, involved ritual in which they demonstrated individually and collectively to each other that they took seriously their responsibility to try to elect a Doge who would act for the good of Venice, and also that they would submit to the rule of the Doge after he was elected.
This demonstration was particularly important given the disastrous consequences in other Mediaeval Italian city states of unsuitable rulers or civil strife between different aristocratic factions.
It would have served, too, as commercial brand-building for Venice, reassuring the oligarchs' customers and trading partners that the city was likely to remain stable and business-friendly.
The security theatre continued for several days of elaborate processions and parties.
There is also some evidence of security theatre outside the election period.
A 16th century engraving by Mateo Pagan depicting the lavish parade which took place in Venice each year on Palm Sunday shows the balotino in the parade, in a prominent position-next to the Grand Chancellor-and dressed in what appears to be a special costume.
I like that this paper has been accepted at a cybersecurity conference.
For the record, I have written about the positive aspects of security theater.


This Cyber News was published on www.schneier.com. Publication date: Wed, 06 Dec 2023 18:43:05 +0000


Cyber News related to Security Analysis of a Thirteenth-Century Venetian Election Protocol

Federal Cybersecurity Agency Launches Program to Boost Support for State, Local Election Offices - The nation's cybersecurity agency has launched a program aimed at boosting election security in the states, shoring up support for local offices and hoping to provide reassurance to voters that this year's presidential elections will be safe and ...
4 months ago Securityweek.com
The Exploration of Static vs Dynamic Code Analysis - Two essential methodologies employed for this purpose are Static Code Analysis and Dynamic Code Analysis. Static Code Analysis involves the examination of source code without its execution. In this exploration of Static vs Dynamic Code Analysis, ...
5 months ago Feeds.dzone.com
Only 4% of US States Fully Prepared for Cyber-Attacks Targeting Electi - Under 4% of US states are fully prepared to detect and recover from election-targeted cybersecurity incidents, according to research by Arctic Wolf. The survey of state and local government leaders across the US found that 14.3% of states were 'not ...
5 months ago Infosecurity-magazine.com
Security Analysis of a Thirteenth-Century Venetian Election Protocol - This paper discusses the protocol used for electing the Doge of Venice between 1268 and the end of the Republic in 1797. We will show that it has some useful properties that in addition to being interesting in themselves, also suggest that its ...
6 months ago Schneier.com
Arctic Wolf Survey Surfaces Election Security Fears - A survey of 136 state and local government leaders in the U.S. published today finds nearly half expect to see an increase in the number of cybersecurity incidents involving elections in 2024. Conducted by the Center for Digital Government on behalf ...
5 months ago Securityboulevard.com
Shared Responsibility: How We Can All Ensure Election Security - In 2024, voters in more than 60 countries-representing 4 billion people-will cast ballots. Some of the elections are far-reaching-such as the upcoming European Parliamentary elections, which will span 27 countries from June 6 to 9. In an era where ...
1 month ago Feedpress.me
Three Years After January 6th: The Insurrection's Impact on U.S. Democracy - Three years ago, on January 6, 2021, the U.S. Capitol was stormed by a mob intent on overturning the results of the 2020 Presidential Election. This event - the January 6th insurrection - was a direct attack on the democratic process and the peaceful ...
5 months ago Securityboulevard.com
Protect Yourself from Election Misinformation - Welcome to your U.S. presidential election year, when all kinds of bad actors will flood the internet with election-related disinformation and misinformation aimed at swaying or suppressing your vote in November. As EFF's Corynne McSherry wrote in ...
3 months ago Eff.org
Survey: Election Workers Feel Unprepared for Upcoming Cyberthreats - The issues of outside interference in U.S. elections and the security of the systems behind them have been talked and debate for at least a decade and promise to be at the forefront again as the country gears up for what promises to be a pivotal ...
5 months ago Securityboulevard.com
Lookback Analysis in ERP Audit - This article explores the interdependence between lookback analysis and access governance and how it can transform modern ERP audits. From a Segregation of Duties perspective, Lookback Analysis is a critical tool in ensuring control effectiveness and ...
1 month ago Securityboulevard.com
Election security threats in 2024 range from AI to anthrax The Register - In time for the long Presidents' Day weekend in the US there have been multiple warnings about what will undoubtedly be a challenging and potentially dangerous year for voting processes and government workers. State and county officials have been ...
4 months ago Go.theregister.com
Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets - Unit 42 researchers have observed threat actors using malicious JavaScript samples to steal sensitive information by abusing popular survey sites, low-quality hosting and web chat APIs. In this article, we'll describe some of the tactics used by ...
6 months ago Unit42.paloaltonetworks.com
Lawmakers: Ban TikTok to Stop Election Misinformation! Same Lawmakers: Restrict How Government Addresses Election Misinformation! - In a case being heard Monday at the Supreme Court, 45 Washington lawmakers have argued that government communications with social media sites about possible election interference misinformation are illegal. Just this week the vast majority of those ...
3 months ago Eff.org
Microsoft Warns of Election Threats in 2024 - A new threat intelligence assessment released by Microsoft's Threat Analysis Center has warned of potential unprecedented challenges to the security of elections over the next year. In its latest report, Microsoft suggested that authoritarian nation ...
7 months ago Infosecurity-magazine.com
Meta says it will begin labeling political ads that use AI-generated imagery - WASHINGTON - Facebook and Instagram will require political ads running on their platforms to disclose if they were created using artificial intelligence, their parent company announced on Wednesday. Under the new policy by Meta, labels acknowledging ...
7 months ago Apnews.com
2022 Election Not Impacted by Chinese, Russian Cyber Activity: DOJ, DHS - Threat actors were observed launching cyberattacks and collecting information during the 2022 mid-term election in the United States, but there is no evidence of significant impact, according to a joint report published on Monday by the Justice ...
6 months ago Securityweek.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
The Intersection of AI and Cybersecurity: Unveiling Threats to Elections - As we witness the growing reliance on AI, particularly in the realm of elections, a new concern emerges-how AI usage can potentially open the door to cybersecurity threats that jeopardize the integrity of democratic processes. 1.) AI-Powered ...
6 months ago Cybersecurity-insiders.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
6 months ago Microsoft.com
2023 Updates in Review: Malware Analysis and Threat Hunting - Throughout ReversingLabs' 14-year history, our products have constantly excelled and improved to tailor the needs of our customers and match the changing cybersecurity threat landscape. This past year, we have delivered key improvements to ...
5 months ago Securityboulevard.com
Foreign Actors Targeted 2022 US Elections, Intelligence Reveals - The US intelligence community has confirmed it detected evidence of foreign interference during the 2022 US federal elections. Russia, China and Iran were among the estimated countries of origins for these operations. In a series of declassified ...
6 months ago Infosecurity-magazine.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
6 months ago Feeds.dzone.com
Kremlin accuses US of plotting election-day cyberattack The Register - The Kremlin has accused the United States of meddling in Russia's upcoming presidential election, and even accused Uncle Sam of planning a cyberattack on the country's online voting system. The snoops did not provide any proof to support these ...
3 months ago Go.theregister.com
Week in review: Terrapin SSH attack, Mr. Cooper breach - Creating a formula for effective vulnerability prioritizationIn this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights into the business impact of vulnerabilities. EMBA: Open-source ...
6 months ago Helpnetsecurity.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
4 months ago Esecurityplanet.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)