Viewing a single comment thread. View all comments

CybaBunnii t1_iu5bswx wrote

Hello, I have some experience in hacking Diebold election machines, I know from experience that you can remove the hard drive from these electronic machines fairly easily, and replace them just as easily in a private booth.

What protections are in place to prevent someone from swaping out a hard drive with false data, be that cryptographic signatures or session tracking?

see attached: https://ksltv.com/392899/hackers-get-into-voting-machines-during-hackwest-convention/

−13

voteearlyday OP t1_iu5csqr wrote

SEC. TOULOUSE OLIVER: To my knowledge, the machines referred to in this article are no longer in use. Additionally, a "hackathon" type activity does not replicate the real world security measures in place in every polling location in the country that would have prevented you from engaging a voting machine in that type of unfettered way. I consider this post disinformation and respectfully ask that you rethink spreading it.
That being said, for tabulators that are currently in use around the country the security mechanisms to prevent them from being hacked are multifaceted. I'll speak to the NM process, but this looks largely the same in every state: First of all, machines in NM are NEVER connected to the internet. The tabulators are only open, closed, and accessed by bi-partisan teams of poll officials at every level. We have strict chain of custody processes and seal each card slot with a serial numbered tag to ensure there is no tampering or replacement of a memory card at any point. Results are uploaded to air-gapped systems and then shared with our external systems to post results.

15

aqlu t1_iu67lxd wrote

On a related note, can NM voters verify their vote has been recorded accurately?

5

voteearlyday OP t1_iu5cyzl wrote

COMMISIONER HOVLAND: Election officials around the country build safeguards throughout the process. From pre-election logic and accuracy tests to post election tabulation audits and everything in between. Check out this document for more details on some of the security measures that are used in elections. https://www.eac.gov/sites/default/files/electionofficials/security/Voting_System_Security_Measures_508_EAC.pdf
S

7

Atxlvr t1_iu5x1ns wrote

wow guys we found a real hacker here, in the flesh. I read it on the internet.

3