{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/940cdba47fa045b69accdf5429ae371f\" frameborder=\"0\" width=\"1114\" height=\"835\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":835,"width":1114,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":835,"thumbnail_width":1114,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/940cdba47fa045b69accdf5429ae371f-00001.gif","duration":179.69999999999993,"title":"Engineering an Attack on Election Anonymity","description":"In this video, I explain an attack that can potentially de-anonymize participants of an election and link their votes. The attack involves replaying the app ID to produce the same nullifier for a user and attempting to link their identity after the election has taken place. To prevent this, I propose decoupling the registration and voting process by using an anodar for registration and a semaphore for anonymous voting. I also provide a minimal demo of our application."}