Yea, write a simple Python/Perl script that interfaces with TOR and force-reset your exit nodes each time you send out a new request and randomize the time interval. There are plenty of TOR exit nodes in the world to swing the vote your way.
It's not too difficult to detect and ban votes from exit nodes. It could even be done after the fact (and still be mostly effective) if it appeared that an attack took place.
Actually, that's not even necessary. They just track with cookies. Incognito mode with Chrome makes this child's play. Run a script to open in incognito and keeping voting till a certain point. If you want to be really scrupulous, keep changing IP.
> Run a script to open in incognito and keeping voting till a certain point
Why would you bother to script a full-fledged browser when you can just connect to the site directly through the script, ignoring cookies and/or changing the user-agent string.
How? I mean, through all my shell accounts, I could probably easily fake 10 votes.
Back in my less mature days, I registered 20 AIM accounts, and then wrote a script to have them all log in simultaneously and in one by one start a conversation with a target, and then at my command, flood the target with "warnings", silencing them on AIM. So immature - so fun.
well... if you're a hacker with control to a botnet, then yeah, just tell the botnet to vote no. The 'no' votes will come in so fast that it will crash the servers.