Difference between revisions of "Voting"
Jump to navigation
Jump to search
(→Related Pages: hardware companies; minor reorg) |
|||
Line 1: | Line 1: | ||
− | + | CsryjM | |
− | + | ||
==Related Pages== | ==Related Pages== | ||
* [[voting systems]] | * [[voting systems]] |
Revision as of 00:03, 15 July 2009
CsryjM
Related Pages
- voting systems
- virtual voting districts
- voting in the United States
- voting system software should be moved to voting software and open-source voting software
- voting hardware
Links
Reference
News
Video
- 2007-06-09 changing the ROMs of a Nedap e-voting computer in 60 seconds: the ROMs control how the machine works; a thorough visual examination of the system wouldn't necessarily be able to detect the swap. Voting machines can be designed to prevent this, however, by including a nonvolatile memory area containing an encrypted hash of the authorized ROM contents. At boot time, before loading the ROMs, the machine would compare the hash of the actual ROMs with the stored hash; if they did not match, it would refuse to boot and would display an error message alerting operators to the problem. Any machine which does not have a solution like this built into it, though, is therefore vulnerable to this kind of swap.
- 2006-10-11 voting computer tempest attack: The Nedap ES3B voting computer leaks a signal, receivable at up to 25m, which can be decoded to detect what votes are being cast. 90% of all Dutch votes are cast using that computer, according to the video.