Are Diebold Voting Machines Hackable?
Posted on May 15, 2006
A new evaluation has found critical security issued with the Diebold TSx. The PDF document of the report written by Harri Hursti on BlackBoxVoting says someone with private access to one of the Diebold electronic voting terminals could load their own vote altering software on the machine. Ed Felten and Avi Rubin at Freedom to Tinker have posted a brief summary of what the report says. The Diebold systems could potentially be used to miscount votes.
Hursti's findings suggest the possibililty of other attacks, not described in his report, that are even more worrisome.One of the main concerns raised in the 2004 elections was that there should be a way to provide a paper trail in the form of a paper print-out (or receipt) in case there was tampering with one of the Diebold machines. However, most U.S. states using the Diebold machines did not give voters a print out.In addition, compromised machines would be very difficult to detect or to repair. The normal procedure for installing software updates on the machines could not be trusted, because malicious code could cause that procedure to report success, without actually installing any updates. A technician who tried to update the machine's software would be misled into thinking the update had been installed, when it actually had not.
On election day, malicious software could refuse to function, or it could silently miscount votes.
- Character.ai Provides AI Characters to Chat With
- Photobucket's Huge Bucket of Images of Interest to AI Companies
- Opera Adds Experimental Support for 150 Local LLMs
- Read AI Raises $21 Million in Series A Financing
- You Can Now Use ChatGPT Without an Account