Delegated Democracy - Part 2
Ok, I've come up with a few ideas that might reduce the problems I highlighted in my previous post, starting from a simple party-run computer system.
- Authentication: When you first register your identity with the party, you use a computer at the local party headquarters. While using this confidential voting station, you can input a list of URLs, with one "used" entry, and an unlimited number of "dummy" entries.
- No one will have to be a registered member of the party in order to input their list and participate in this system. The ultimate goal is to have elected officials who best represent the desires of the entire voting public, not just their own party.
- You will be able to update your list at any time should you be in some way coerced (see below) or decide to use a different first layer of delegation.
- (Update) Each URL would need the option of a password for encryption later in the process.
- Delegation: Those URLs point to vote "feeds", which can be run by anyone in any way. For instance, you could simply delegate your vote to a feed controlled by one of your friends.
- Another example for the more particular: you could delegate a private service anywhere on the internet that categorizes bills, which then accordingly delegates your favorite experts for each issue.
- This means there are no limits as to how you determine your vote; any crazy method of your own devising is fine.
- You could even publish your own opinions and convince people to delegate your feed. Keep in mind how you actually vote is still private, you just cannot hide what you openly endorse.
- (Update) The feeds with passwords would encrypt all communication with the first proxy. From there, the voter could have any sort of privacy settings up to and including completely secret votes.
- Resolution: When it's almost time for the party's elected official to vote, the party server queries all listed URLs, including the "dummy" entries. The final results (except of course for voter identities) are then made public.
- This is to prevent intimidation and bribery - even if someone forces you to list a computer they control that logs hits, they have no way of knowing if theirs was your "used" entry or not.
- Votes cast: The elected party representatives check to see what the winners were for each bill, and vote accordingly. Like in Senator On-Line, representatives will have to commit in writing that they will vote in accordance with the party view.