Friday, December 07, 2007

California Testers Find Flaws in Voting Machines

The following article was unashamedly lifted from Slashdot.org this morning:

quanticle writes

"According to Ars Technica, California testers have discovered severe flaws in the ES&S voting machines. The paper seals were easily bypassed, and the lock could be picked with a "common office implement". After cracking the physical security of the device, the testers found it simple to reconfigure the BIOS to boot off external media. After booting a version of Linux, they found that critical system files were stored in plain text. They also found that the election management system that initializes the voting machines used unencrypted protocols to transmit the initialization data to the voting machines, allowing for a man-in-the-middle attack. Altogether, it is a troubling report for a company already in hot water for selling uncertified equipment to counties."

Also, if this topic interests you, please check out:

Hacking Democracy

That's all for now, kids!

No comments: