In Summary
  • A server is a dedicated computer that manages network resources.
  • ‘Read-only’ access basically means usernames are provided to log into the servers and see everything without being able to change anything.
  • We probably shall have more liberty next week to analyse the proceedings after the verdict has been made.

No doubt the ongoing Kenyan presidential petition has captivated audiences both here and abroad. 

Whereas we cannot discuss the merits or otherwise of the various position, it would be useful to break down and define some of the technical jargon that has been repeated throughout.

Top on the list is ‘logs’. What exactly is a computer log?

The dictionary definition of a log is a record of performance, events, or day-to-day activities.  A computer therefore keeps a record of each and every activity that transpires during its course of executing tasks.

The electronic voter identification (EVID) kit is actually a specially designed computer with the ability to identify voters through their fingerprints, scan election forms and transmit results.

Each of these EVID kits keeps a summary of what transpired before, during and after elections.  It is important to observe that it is a ‘summary’ and not necessarily a replication of everything that transpired.

As an example, the logs from the kit would record the time when the election results were transmitted, who transmitted the result and if enabled, an encrypted copy of what was transmitted.


Which brings us to the next buzzword, ‘encryption’. Encryption is the translation of data into a secret code. This basically means that information is deliberately hashed up to make it inaccessible to someone without the approved credentials.

It is a standard way of making data secure and immune to un-authorised changes. Indeed the EVID kit was designed to transmit the results in encrypted format, to make it a bit harder for someone to intercept and change in transit.

Page 1 of 2