<html><body><span style="font-family:Verdana; color:#000; font-size:10pt;"><div>Well argued:</div><div><br></div><div><a href="http://cacm.acm.org/blogs/blog-cacm/211056-the-real-lesson-of-the-alleged-russian-hack/fulltext">http://cacm.acm.org/blogs/blog-cacm/211056-the-real-lesson-of-the-alleged-russian-hack/fulltext</a></div><div><br></div><div>and </div><div><br></div><div><a href="http://cacm.acm.org/blogs/blog-cacm/215159-cybersecurity-in-the-trump-era/fulltext">http://cacm.acm.org/blogs/blog-cacm/215159-cybersecurity-in-the-trump-era/fulltext</a><br></div><div><br></div><div>Ironically the US Elections systems data is mostly already "in the Fog" simply because of the device centric deployment to the edge voting machines that is then reported up to the central tabulators via mechanical transfers.</div><div><br></div><div>This is a good thing - as I have noted repeatedly previously - security by obscurity and diversification.</div><div><br></div><div>However, as we have equally seen the risk then moves to those transfer processes and the tallying itself, which sadly is completely opaque.</div><div><br></div><div>John Arquilla would no doubt grade all this as a "D-" - the need for open source, transparency and verification has never been greater.<br></div><div><br></div><div>David<br></div></span></body></html>