![]()
Gone, But Not Forgotten? What The Internet Will Look Like Under SOPA Fearsgiving Week Jesus Approves of Waterboarding Beware of Asteroids ![]() ![]()
![]() All links are current as of the date of publication. All content created by the author is copyrighted 2005-2010, except where held by the owners/publishers of parent works and/or subject materials. Any infringement of another's work is wholly unintentional. If you see something here that is yours, a polite request for removal or credit will be honored. |
� |
Steal AwayFriday, Sept. 15, 2006 1:08 PMA group at Princeton University conducted a security analysis of the Diebold AccuVote-TS machine and found it to be vulnerable to extremely serious attacks. An attacker with access to the machine or its removable memory card could install malicious code that could steal votes, modifying all records, logs, and counters to be consistent. These findings are independent from those published earlier this year by Open Foundation Voting, which showed that the circuit board on a Diebold machine has the instructions for altering the machine's boot-up process printed on the circuit board. A screwdriver, a minute or two, and you're in business (or in office, as the case may be). And yet, Diebold has been consistent in their denials that their machines are flawed, routinely accusing security experts as making up scenarios. A spokesman for Diebold has said he doesn't believe that 'evil elections people' � employees with access to the machines and intent to defraud the public ��exist. But it overlooks small details like all of the machines being protected by the same key, with a lock that can be easily picked. (As one member of the Princeton group did.) It neglects policies where voting machines, after being certified, are then 'sent home' with polling place workers. The authors of the Princeton study point out that they do not believe that past elections have been stolen, but that the vulnerabilities in the Diebold machine cannot be ignored.
|