{"id":597,"date":"2006-05-11T23:58:22","date_gmt":"2006-05-11T23:58:22","guid":{"rendered":"https:\/\/www.docbug.com\/blog\/archives\/597"},"modified":"2006-05-11T23:58:22","modified_gmt":"2006-05-11T23:58:22","slug":"report-documents-worst-voting-machine-security-flaw-yet","status":"publish","type":"post","link":"https:\/\/www.docbug.com\/blog\/archives\/597","title":{"rendered":"Report documents worst voting-machine security flaw yet&#8230;"},"content":{"rendered":"<p>An inexcusable number of security flaws have been found in Diebold voting machines the past few years, but a new <a href=\"http:\/\/www.blackboxvoting.org\/BBVtsxstudy.pdf\">report<\/a> from BlackBoxVoting documents what <a href=\"http:\/\/www.avirubin.com\/\">Ari Rubin<\/a> and <a href=\"http:\/\/www.freedom-to-tinker.com\/\">Ed Felten<\/a> at <a href=\"http:\/\/www.freedom-to-tinker.com\/?p=1014\">Freedom to Tinker<\/a> say is the worst one yet:<\/p>\n<blockquote>\n<p>A report by Harri Hursti, <a href=\"http:\/\/www.blackboxvoting.org\/BBVtsxstudy.pdf\">released<\/a> today at BlackBoxVoting, describes some very serious security flaws in Diebold voting machines. These are easily the most serious voting machine flaws we have seen to date \u2014 so serious that Hursti and BlackBoxVoting decided to redact some of the details in the reports&#8230;<\/p>\n<p>The attacks described in Hursti\u2019s report would allow anyone who had physical access to a voting machine for a few minutes to install malicious software code on that machine, using simple, widely available tools. The malicious code, once installed, would control all of the functions of the voting machine, including the counting of votes.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>An inexcusable number of security flaws have been found in Diebold voting machines the past few years, but a new <a href=\"http:\/\/www.blackboxvoting.org\/BBVtsxstudy.pdf\">report<\/a> from BlackBoxVoting documents what <a href=\"http:\/\/www.avirubin.com\/\">Ari Rubin<\/a> and <a href=\"http:\/\/www.freedom-to-tinker.com\/\">Ed Felten<\/a> at <a href=\"http:\/\/www.freedom-to-tinker.com\/?p=1014\">Freedom to Tinker<\/a> say is the worst one yet:<\/p>\n<blockquote>\n<p>A report by Harri Hursti, <a href=\"http:\/\/www.blackboxvoting.org\/BBVtsxstudy.pdf\">released<\/a> today at BlackBoxVoting, describes some very serious security flaws in Diebold voting machines. These are easily the most serious voting machine flaws we have seen to date \u2014 so serious that Hursti and BlackBoxVoting decided to redact some of the details in the reports&#8230;<\/p>\n<p>The attacks described in Hursti\u2019s report would allow anyone who had physical access to a voting machine for a few minutes to install malicious software code on that machine, using simple, widely available tools. The malicious code, once installed, would control all of the functions of the voting machine, including the counting of votes.<\/p>\n<\/blockquote>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[15],"tags":[],"class_list":["post-597","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/posts\/597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/comments?post=597"}],"version-history":[{"count":0,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/posts\/597\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/media?parent=597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/categories?post=597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/tags?post=597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}