Security of Diebold voting machines

“Electronic voting machine firm Diebold is once again the subject of an embarrassing security gaffe after hackers created keys capable of opening voting machines from pictures posted on its website.

Two of three keys crafted by Ross Kinard of SploitCast were capable of opening a voting machine obtained by Princeton University for testing purposes. It’s tempting to think, given the apparent ease of the attack, that the locks are simple enough to be opened by anyone with a basic knack for lockpicking.
[…]
Access to the key would allow tamperers to slip in a memory card containing a virus or, even worse, tally-altering software. In theory, security tape ought to be posted over the compartment to detect such tampering, but that relies on election officials checking for problems.”

Quelle: The Register

Advertisements

~ by Balle on July 7, 2007.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: