Essentials  
 
     Site Home
List of Past Entries
Email Me
What Is This Site?
Wedding Website
 
  Flickr Photo Sets  
 
     [More...]
 
  Photo Gallery  
 
     Browse All
Our Wedding - April 29, 2006
NYC 2005
Puerto Vallarta 2005
Iowa City X-Mas 2004
John Edwards Rally
Michael Moore
Summerset State Park
Kerry Edwards Rally
Pella / Ellinwood
Howell Tree Farm 2004
NYC 2004
Worlds of Fun 2004
Balloons 2004
New Orleans / Pensacola 2004
Chicago 2004
New House
NYC 2003
Harkin Steakfry 2003
Adventureland 2003
Ballooning 2003
[More...]
 
  Daily Reads  
 
     Aint It Cool News
Bateman Cartoons
Cinescape
Dark Horizons
IGN
Slate
Spoiler Fix
Television Without Pity
The Onion
Working for Change
 
  Other Blogs  
 
     Benn's Journal
Brian Stevens
C:\Pirillo.exe
Carrie
Dave Barry
Gretchen
Grrl Bonnie
Jake's Jive
Jessica's Journal
JoshWest.com
Kacie's Chatter
Mackenzie
PhilBlog
RedHead Ramblings
RickSite
Special K
The Dream of 95
Tom's World
Wil Wheaton
 
  Liberal Fun  
 
     Bateman Cartoons
Cheney Segway
GWBush04.com
This Modern World
Working for Change
 
  General Oddity  
 
     All Your Base…
Bubb Rubb
HumanForSale
IKPuppet
Kikkoman
PPI
They Fight Crime!
Wrath
Zombie Infection
Zombo.com
 
  Work  
 
     CrossPaths.net
FBX Internet
Iowa Telecom
iSpot ACCESS
Topis Technologies
 
  Copyright  
 
     ©2005 Jason Cross
All Rights Reserved
 

Monday, September 18, 2006     
  
Open a Diebold Voting Machine with a Filing Cabinet Key
    

So let's say you make a voting machine that is readily hackable given access to a memory card...  wouldn't you think that the lock to said memory card should at least be secure?

Apparently Diebold doesn't.

It turns out that the voting machines use standard filing cabinet locks - so someone wanting to put corrupt code on a voting machine could do so with keys easily purchased from the Internet or in the homes/offices of many people.

So, do people still think a paper trail is unnecessary?

Using such a standard key doesn't provide much security, but it does allow Diebold to assert that their design uses a lock and key. Experts will recognize the same problem in Diebold's use of encryption — they can say they use encryption, but they use it in a way that neutralizes its security benefits.

The bad guys don't care whether you use encryption; they care whether they can read and modify your data. They don't care whether your door has a lock on it; they care whether they can get it open. The checkbox approach to security works in press releases, but it doesn't work in the field.

   
Posted by Jason on 9/18/2006 at 9:28:31 AM #




Previous Month May 2024

Next Month

S M T W T F S
29 30 31 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Fear the wrath of Sparky!