We don't need more reasons. All such systems not only cannot be trusted,
they *must not* be trusted. Schneier did the clinching analysis eight
years ago:
Stealing an Election
https://www.schneier.com/crypto-gram-0404.html#4
and the only things that have changed in the interim are (a) the
attacker budget has dramatically increased and (b) the cost of
the required technology has decreased.
---rsk
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.