TL;DR version: the machine was pwned so hard they were able to get it to play Pong. The file system was totally unencrypted and unprotected. It's security is laughably bad.
I mean, not even a SE Linux variant? Yeah, no engineer who has worked in the secured sector would look at this and say it's secure enough for elections. And I mean NONE! No hardening of any intrusion points, NO hardening of bootstrap, NO hardening of network capabilities. FFS
Fucking thing was designed to be manipulated nefariously... Likely BY DESIGN!
The Dominion ImageCast Precinct machines are probably the ones used by the State of Michigan and others.
In 2019, the hackers at the Defcon 27 conference's Voting Machine village had access to several voting machines, including this one.
Here's the report: https://media.defcon.org/DEF%20CON%2027/voting-village-report-defcon27.pdf
The relevant section starts on page 18
TL;DR version: the machine was pwned so hard they were able to get it to play Pong. The file system was totally unencrypted and unprotected. It's security is laughably bad.
Laughably bad.
No wonder TX said hell NO!
I mean, not even a SE Linux variant? Yeah, no engineer who has worked in the secured sector would look at this and say it's secure enough for elections. And I mean NONE! No hardening of any intrusion points, NO hardening of bootstrap, NO hardening of network capabilities. FFS
Fucking thing was designed to be manipulated nefariously... Likely BY DESIGN!
Coincidence that one of the hackers was/is at University of Michigan where they have a program just for that? https://www.linkedin.com/in/henrymeng