EXPOSED: HOW IEBC DATABASE Was DESIGNED To Facilitate VOTER RIGGING, Raila and NASA MUST DEMAND for A secure Database to Reflecting Best Practice

Date:


By JAMES ORUNDU

I think CORD is being played. I was attentive in class when they taught us the principles of database design.

They told us that primary keys, secondary keys, and unique identifiers are essential condiments of database integrity.

What it means is that If you were IEBC and had a database of voters, you would create a national ID field in a database table having a unique identifier. This field is where all IDs of registered voters is stored.

Since the field is unique, it would be impossible to have identical entries under the ID field. No way would a Wanjiru masquerade as a Kalonzo.
You would also hash the ID entries and “salt” them so that, in the event the database gets hacked, the hacker cannot access anyone’s ID
number. Even better, you would encrypt them.

In the IEBC database, these entries are not unique and are not encrypted. So why was the IEBC system designed that way?
The answer is simple: it was designed NOT to be foolproof. It lights up the Establishment’s path to victory.

If CORD cannot have this database audited and improved to reflect best practice, then CORD is wasting our time.
Asking us to register in a silly database is like telling us to store water in our trouser pockets. Can’t work.

LEAVE A REPLY

Please enter your comment!
Please enter your name here


Share post:

Subscribe

spot_imgspot_img

Popular

More like this
Related

KRA Appoints Mohamed Abdul M’maka as Commissioner for Investigations and Enforcement

Kenya Revenue Authority has appointed Mohamed Abdul M’maka as...

Explosive Claims as Democratic Party Alleges Plot by William Ruto Allies to Seize Control of Nairobi Hospital

Fresh political tension has erupted after the Democratic Party...

KCB Posts KSh 68.4 Billion Profit as Loans and Deposits Surge Across East Africa

KCB Group Plc has announced improved financial results for...