There has been a very long running case, Curling v. Raffensperger in Georgia. It was filed when the state originally contracted with Dominion to ue their machines statewide. A lot of evidentiary hearings, discovery disputes, experts etc. In late October 2020, Judge wrote an opinion based in part by a truncated report written by Plainitff's expert, J. Alex Halderman. Among others he was afforded a very brief opportunity to have access to a Dominion BMD and EMS server. But the Judge ruled it was too close to the election to order a switch to all paper ballots.
The case continued after the election and Halderman was afforded more time to study and hack Dominion machines, culiminating in a lengthy (96 page) report that he filed with the court in July 2021, wherein it was promptly sealed.
This week more of that repor has been released. For the tech savvy folks, you can find it HERE
Major takeaways. First, easily hackable by any number of different methods. The QR codes are easily changed to flip votes and the voter has no idea nor way to ever know. And changing the QR codes ca also be done by various methods and taking almost no time. But wait, there are other issues he identified.
This stuff is not my bailiwick but perhaps some of you tech people can scan this and post on your thoughts?
The case continued after the election and Halderman was afforded more time to study and hack Dominion machines, culiminating in a lengthy (96 page) report that he filed with the court in July 2021, wherein it was promptly sealed.
This week more of that repor has been released. For the tech savvy folks, you can find it HERE
Major takeaways. First, easily hackable by any number of different methods. The QR codes are easily changed to flip votes and the voter has no idea nor way to ever know. And changing the QR codes ca also be done by various methods and taking almost no time. But wait, there are other issues he identified.
YIKES!Quote:
I show that the ICX suers from critical vulnerabilities that can be exploited to subvert all of its security mechanisms, including: user authentication, data integrity protection, access control, privilege separation, audit logs, protective counters, hash validation, and external rmware validation.
I demonstrate that these vulnerabilities provide multiple routes by which attackers can install ma-licious software on Georgia's BMDs, either with temporary physical access or remotely from election management systems (EMSs). I explain how such malwarecan alter voters' votes while subverting all of the procedural protections practiced by the State, including acceptance testing, hash validation, logic and accuracy testing, external rmware validation, and risk-limiting audits (RLAs
This stuff is not my bailiwick but perhaps some of you tech people can scan this and post on your thoughts?