this post was submitted on 23 Nov 2025
239 points (98.0% liked)

Not The Onion

19878 readers
1241 users here now

Welcome

We're not The Onion! Not affiliated with them in any way! Not operated by them in any way! All the news here is real!

The Rules

Posts must be:

  1. Links to news stories from...
  2. ...credible sources, with...
  3. ...their original headlines, that...
  4. ...would make people who see the headline think, “That has got to be a story from The Onion, America’s Finest News Source.”

Please also avoid duplicates.

Comments and post content must abide by the server rules for Lemmy.world and generally abstain from trollish, bigoted, or otherwise disruptive behavior that makes this community less fun for everyone.

And that’s basically it!

founded 2 years ago
MODERATORS
 

So secure was the annual contest to fill three director and four officer positions that when one trustee lost his cryptographic key to unlock the results, the error made it impossible.

top 24 comments
sorted by: hot top controversial new old
[–] Technus@lemmy.zip 106 points 2 months ago (3 children)

Assuming they were using threshold cryptography, they could have easily configured some redundancy into the system, e.g. by requiring 3 out of 5 people to decrypt it instead of 3 of 3.

It's easy to blame the one guy for losing the key, but he could have gotten hit by a bus or lost the hard drive in a house fire and they would have been equally as screwed. This is more of a system design failure than a PEBKAC failure.

[–] pupbiru@aussie.zone 50 points 2 months ago (2 children)

in complex systems design, you never blame human error. humans are fallible, and if the system doesn’t account for human error then it’s just a matter of time until failure occurs. look for a way to make the system tolerate or eliminate human error

[–] Tar_alcaran@sh.itjust.works 14 points 2 months ago (1 children)

Normal error theory even takes the view that errors are inevitable in complex systems and that you need to design them so that the effects of those errors can't escalate.

[–] pupbiru@aussie.zone 3 points 2 months ago

literally the same concept as a comment i just wrote about russian hypersonic missiles breaking apart mid flight because they didn’t put limits on how fast they can change course when going mach 5 aha

[–] SuperNovaStar@lemmy.blahaj.zone 5 points 2 months ago (1 children)

look for a way to make the system tolerate human error

Ah, if only managers understood this principle.

My motto is that "all failures are management failures." But I'm not far enough up the chain to really implement that 😅

[–] pupbiru@aussie.zone 1 points 2 months ago (1 children)

idk i fuck up and release buggy code at least 10% as much as management makes dumb ass decisions

[–] FuglyDuck@lemmy.world 2 points 2 months ago

And the 10% when you do… you were mismanaged!

[–] ApathyTree@lemmy.dbzer0.com 9 points 2 months ago (1 children)

According to the article they changed the procedure to require 2/3 keys, so at least they learned that lesson.

[–] fatalicus@lemmy.world 20 points 2 months ago (1 children)

Which is stupid, since the reason they had 3/3 was that two people could not collaborate to change the results, which they now can with 2/3.

Should have been changed to 3/5 instead.

[–] Technus@lemmy.zip 4 points 2 months ago

Exactly, it's worse all around.

And it's not like it's hard to use a different configuration; the threshold and total number of keys are just parameters of the algorithm.

[–] quick_snail@feddit.nl 2 points 2 months ago (1 children)

The article concludes that's exactly what they're doing. Both changing to 2/3 and also providing clearer instructions to key holders.

[–] Technus@lemmy.zip 1 points 2 months ago

See the reply thread just above this: https://lemmy.zip/comment/22938983

[–] CrackedLinuxISO@lemmy.dbzer0.com 35 points 2 months ago

Conspiracy time: Trustee #3 "lost" their key because polling suggested that they wouldn't like the results.

I have no reason to believe that's actually the case, but it's interesting that the org uses a 3 key system to prevent collusion between trustees, but didn't think about how this might enable lone-trustee sabotage.

[–] PiraHxCx@lemmy.ml 29 points 2 months ago

Fuuuck... okay people, I'm going to pass my hat around, and you just throw in a piece of paper with the name you voted for.

[–] sundray@lemmus.org 18 points 2 months ago

I've heard of secret ballots, but this is ridiculous!

[–] mp3@lemmy.ca 15 points 2 months ago

Skill issue.

[–] Fiery@lemmy.dbzer0.com 11 points 2 months ago (1 children)

In other news the owner of a vault whose key he threw away cannot access the contents.

It would be way worse if they somehow were able to decrypt the votes anyways without the key. Whether that be by retrieving the key from a backup or a flaw in the system. Because that would defeat the whole purpose.

All in all the technology they use is very interesting technically, but this event really demonstrates the tradeoff between security and convenience. Imagine if that was the election for a country... Oof

[–] Aatube@kbin.melroy.org 3 points 2 months ago

well the irony'd be in it anyway

~~—holy iambs, volume 14~~

the vaultkeepers alliance misplacing the key is what makes this such an amazing onion, though you probably agree, and I guess "Cryptographers unveil backdoor to every key ever created after losing key" would be an even better onion

[–] nya@ani.social 9 points 2 months ago* (last edited 2 months ago) (1 children)

https://archive.is/wae3Z

Obligatory archive.is link. NYT thinks I'm a robot :'). Good thing real robots still work tho

[–] quick_snail@feddit.nl 2 points 2 months ago

Obligatory comment that archive doesn't load because it thinks I'm a robot

[–] eager_eagle@lemmy.world 1 points 2 months ago (1 children)

that's why I'm hesitant to host vaultwarden myself as opposed to pay to use bitwarden

[–] ruan@lemmy.eco.br 1 points 2 months ago* (last edited 2 months ago)

Well, I'm not sure how using bitwarden changes anything here related to losing your keys?

Hosting vaultwarden you are just restricting third parties from having access to your cryptographed data. (personaly, to me, that's always better, since restricts possibilities of brute force - currently unfeasible for non-state actors, but who knows what will be achievable in 2, 4 years from now...)

If you lose the key* that unlocks your vault, be it vaultwarden or bitwarden, you will have effectively lost access to your vault either case.

*: losing the key is what seem to have happened in this election

[–] m3t00@piefed.world 1 points 2 months ago

a manager put all his passwords in a file then set a password to open it. forgot it. made him a new account. zip file iirc

[–] Zombie@feddit.uk 1 points 2 months ago

I guess that trustee won't be getting voted into any important positions in the re-run!