The following blog post was originally published on 2 July 2018, in Hacking, Distributed (HD) — the site (run by Gün Sirer) where IC3 blog posts were originally published. When HD went offline, the post disappeared. We’re reviving it now, seven years later, because its ideas have proven to be so prescient. Its focus was on how trusted execution environments (TEEs) could be used to attack voting systems through private smart-contracts for bribery. For this idea, we coined the term Dark DAOs.
        