>>19386242 (LB)
You won't know. That is the point.
Suppose for a moment that every last machine has all of its identifiers posted. You know, things like mac addresses, etc.
Next assume that a program is inserted into the machine that does the following things, after certification.
A. It changes identifiers, such as the mac address.
B. After the election, a shutdown program runs that erases the program that changed the identifiers.
C. Resets the log files so there is no trace of the program that did A and B was ever installed or run.
How do you defeat that, pig?