On 7 Sep 2004, at 10:50 pm, Julia Randolph wrote:

http://www.blackboxvoting.org/?q=node/view/78  (Article dated 8/26/04)

Quote:

By entering a 2-digit code in a hidden location, a second set of votes
is created. This set of votes can be changed, so that it no longer
matches the correct votes. The voting system will then read the totals
from the bogus vote set. It takes only seconds to change the votes,
and to date not a single location in the U.S. has implemented security
measures to fully mitigate the risks.


This program is not "stupidity" or sloppiness. It was designed and
tested over a series of a dozen version adjustments.


I thought this might be of interest to some.


" The GEMS program runs on a Microsoft Access database." -- William T Goodall Mail : [EMAIL PROTECTED] Web : http://www.wtgab.demon.co.uk Blog : http://radio.weblogs.com/0111221/

"Our products just aren't engineered for security." - Brian Valentine, senior vice president in charge of Microsoft's Windows development team.

_______________________________________________
http://www.mccmedia.com/mailman/listinfo/brin-l

Reply via email to