BugTraq
RE: Diebold Global Election Management System (GEMS) Backdoor Account Allows Authenticated Users to Modify Votes Sep 23 2004 10:21AM
Jeremy Epstein (jeremy epstein webmethods com) (7 replies)
RE: Diebold Global Election Management System (GEMS) Backdoor Sep 27 2004 11:25AM
Paul Wouters (paul xtdnet nl) (2 replies)
Re: Diebold Global Election Management System (GEMS) Backdoor Sep 28 2004 12:08AM
Adam Shostack (adam homeport org)
Re: Diebold Global Election Management System (GEMS) Backdoor Sep 28 2004 12:00AM
Crispin Cowan (crispin immunix com) (1 replies)
RE: Diebold Global Election Management System (GEMS) Backdoor Sep 29 2004 08:05AM
David Schwartz (davids webmaster com)
Re: Diebold Global Election Management System (GEMS) Backdoor Account Allows Authenticated Users to Modify Votes Sep 26 2004 05:16PM
Nicholas Knight (nknight runawaynet com) (2 replies)
Re: Diebold Global Election Management System (GEMS) Backdoor Account Allows Authenticated Users to Modify Votes Sep 28 2004 12:33AM
Matthew Keller (mgkeller users sourceforge net) (1 replies)
Re: Diebold Global Election Management System (GEMS) Backdoor Account Allows Authenticated Users to Modify Votes Sep 29 2004 10:39AM
Casper Dik (casper holland sun com)

>On Sun, 2004-09-26 at 13:16, Nicholas Knight wrote:
>> Unrealistic? It is a *voting system*! It does exactly *one* *very*
>> *simple* thing! If it cannot do it bug-free, its developers are
>> incompetent and should not be allowed anywhere near a compiler, much
>> less the key to democracy.
>
>Thank you. This is the most rational post I've seen.
>
>if(VoteForBush) { bush++; }
>elseif(VoteForKerry) { kerry++; }
>elseif(VoteForNader) { nader++; }
>
>Is not tough. Diebold's refusal to allow the world to see that is highly
>suspicious. I suppose I'll get sued under the DMCA for posting their
>intellectual property now... Or maybe I have to change line 2 to:
>elseif(VoteForKerry) { bush++; } first... There, let the lawsuits rain

You are underestimating the compexity of the system.

Surely a touch screen is involved or some other device and
an operating systems.

Surely it's just a minor matter of programming of either the

touchscreen
window system
OS

to recognize a voting screen and redirect the input
events to different buttons.

A touch screen can do this by sending wrong coordinates
and then fake output.

A window system can do this by sending the even to the
wrong button and doing some I/O substitution.

All a minor matter of programming.

And as other have said; as an ordinary voter you have to
trust people who verified the voting system unless you
get a paper copy of your ballot which you can put in the backup
bin.

Casper

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus