Difference between revisions of "Voting"
Jump to navigation
Jump to search
(→Video) |
(→Video: tempest attack) |
||
Line 13: | Line 13: | ||
===Video=== | ===Video=== | ||
* '''2007-06-09''' [http://www.youtube.com/watch?v=EowKalRT3lc changing the ROMs of a Nedap e-voting computer in 60 seconds]: the ROMs control how the machine works; a thorough visual examination of the system wouldn't necessarily be able to detect the swap. Voting machines can be designed to prevent this, however, by including a nonvolatile memory area containing an encrypted hash of the authorized ROM contents. At boot time, before loading the ROMs, the machine would compare the hash of the actual ROMs with the stored hash; if they did not match, it would refuse to boot and would display an error message alerting operators to the problem. '''Any machine which does ''not'' have a solution like this built into it, though, is therefore vulnerable to this kind of swap.''' | * '''2007-06-09''' [http://www.youtube.com/watch?v=EowKalRT3lc changing the ROMs of a Nedap e-voting computer in 60 seconds]: the ROMs control how the machine works; a thorough visual examination of the system wouldn't necessarily be able to detect the swap. Voting machines can be designed to prevent this, however, by including a nonvolatile memory area containing an encrypted hash of the authorized ROM contents. At boot time, before loading the ROMs, the machine would compare the hash of the actual ROMs with the stored hash; if they did not match, it would refuse to boot and would display an error message alerting operators to the problem. '''Any machine which does ''not'' have a solution like this built into it, though, is therefore vulnerable to this kind of swap.''' | ||
+ | * '''2006-10-11''' [http://www.youtube.com/watch?v=B05wPomCjEY voting computer tempest attack]: The Nedap ES3B voting computer leaks a signal, receivable at up to 25m, which can be decoded to detect what votes are being cast. 90% of all Dutch votes are cast using that computer, according to the video. |
Revision as of 01:29, 14 June 2007
Overview
This page is a seed article. You can help Issuepedia water it: make a request to expand a given page and/or donate to help give us more writing-hours!
|
Related Pages
Links
Reference
News
Video
- 2007-06-09 changing the ROMs of a Nedap e-voting computer in 60 seconds: the ROMs control how the machine works; a thorough visual examination of the system wouldn't necessarily be able to detect the swap. Voting machines can be designed to prevent this, however, by including a nonvolatile memory area containing an encrypted hash of the authorized ROM contents. At boot time, before loading the ROMs, the machine would compare the hash of the actual ROMs with the stored hash; if they did not match, it would refuse to boot and would display an error message alerting operators to the problem. Any machine which does not have a solution like this built into it, though, is therefore vulnerable to this kind of swap.
- 2006-10-11 voting computer tempest attack: The Nedap ES3B voting computer leaks a signal, receivable at up to 25m, which can be decoded to detect what votes are being cast. 90% of all Dutch votes are cast using that computer, according to the video.