(picture)

September 23, 2003

Vote early, vote often

Electronic voting machines are being built, and deployed, with incredible lack of security. Not even "security through obscurity". Just no comprehension of even the most basic principles.

And he walked me through it just like a support tech does -- open this panel, click this, do this, do that. And as I'm doing this it was appalling how easy it was. Once you know the steps, a 10-year-old can rig an election.
And, here:
Right now you can open GEMS' .mdb file with MS-Access, and alter its contents. That includes the audit log. This isn't anything new. In VTS, you can open the database with progress and do the same... Being able to end-run the database has admittedly got people out of a bind though. Jane (I think it was Jane) did some fancy footwork on the .mdb file in Gaston recently. I know our dealers do it. King County is famous for it. That's why we've never put a password on the file before... Back to perception though, if you don't bring this up you might skate through [external audit].
Look, it's possible to have decentralized secure digital tools to support democratic process (or individual privacy, or whatever). But it seems to me, large parts of the IT industry as a whole -- educators, standards committees, ISVs, consultants, watchdogs -- are simply not working with either technical or organizational frameworks under which these things are likely to be done right. Very Very Scary. If you want to do something about it, start here.
(via BoingBoing)