6939
posted ago by RatioInvictus ago by RatioInvictus +6939 / -0

I knew the moment that I compared voter turnout in CO and found that primary voter turnout from 2016 to 2020 increased by over 140% despite population increasing less than 5% that something was off. Now, I'm digging into all the connections, but it's a lot.

The more I dig, the more shit bothers me.

E.g.

All of these companies' employees, BTW, donate almost exclusively to ActBlue, Biden, Warren, etc, though some hide it (e.g. Monica Childers donated and the FEC log says she said she was unemployed, but her LI profile said she was employed by Democracy Works in that same timeframe).

Anyway, could use some help.

Comments (363)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
10
CoderForMAGA 10 points ago +13 / -3

This! Open source software means the original code is published and can be audited by anyone. This should be public domain code, published online, not obfuscated in any way, and there should be some system in place to correct it should anyone discover a flaw. This is usually the nature of open source software.

The counter argument, (that I do not really agree with) is that publishing the code could make it less secure should someone find a flaw and hide it for themselves. Really, if it is public then both the good guys and the bad guys will have the same access, and we can probably trust that there are enough clever good guys who will share any flaws. Keeping it closed source only allows secrets to prevail.

22
FormerGraveheart 22 points ago +22 / -0

A bigger problem is, how do you know the source that you have is actually running on the machines?

13
orange_dit 13 points ago +13 / -0

Exactly!

The same for the HW. How do you know the hardware is the same as in the published schematics? Randomly taking machines apart?

You can hash the software and check if the right one is running on the machine. But if the machine is compromised it could provide a fake hash. Or it can be changed after you checked it, or changed back before you check it.

10
Klyuchak 10 points ago +10 / -0

And even with hardwired logic with no programming, and all the parts clearly laid out, there are still plenty of exploits like adding a temporary daughter board to change certain functions that can easily be put in and removed at any time, or even just a few jumper wires here and there.