3427
Comments (66)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
32
california_tim 32 points ago +32 / -0

The Dominion ImageCast Precinct machines are probably the ones used by the State of Michigan and others.

In 2019, the hackers at the Defcon 27 conference's Voting Machine village had access to several voting machines, including this one.

Here's the report: https://media.defcon.org/DEF%20CON%2027/voting-village-report-defcon27.pdf

The relevant section starts on page 18

TL;DR version: the machine was pwned so hard they were able to get it to play Pong. The file system was totally unencrypted and unprotected. It's security is laughably bad.

16
Stickybedel 16 points ago +16 / -0

Laughably bad.

No wonder TX said hell NO!

I mean, not even a SE Linux variant? Yeah, no engineer who has worked in the secured sector would look at this and say it's secure enough for elections. And I mean NONE! No hardening of any intrusion points, NO hardening of bootstrap, NO hardening of network capabilities. FFS

Fucking thing was designed to be manipulated nefariously... Likely BY DESIGN!

5
r4ptur3 5 points ago +5 / -0

Coincidence that one of the hackers was/is at University of Michigan where they have a program just for that? https://www.linkedin.com/in/henrymeng