Recently, we were asked about a concept authored by a former technology executive at Citrix (yes, those folks) back in 2012 regarding a potential end to end secure voting system. But that was actually part of a larger question: whether and to what extent digital security must now live beneath the operating system software layer … Continued