Voting
Jump to navigation
Jump to search
Overview
This page is a seed article. You can help Issuepedia water it: make a request to expand a given page and/or donate to help give us more writing-hours!
|
Related Pages
- voting systems
- virtual voting districts
- voting in the United States
- voting system software should be moved to voting software and open-source voting software
- voting hardware
Links
Reference
News
Video
- 2007-06-09 changing the ROMs of a Nedap e-voting computer in 60 seconds: the ROMs control how the machine works; a thorough visual examination of the system wouldn't necessarily be able to detect the swap. Voting machines can be designed to prevent this, however, by including a nonvolatile memory area containing an encrypted hash of the authorized ROM contents. At boot time, before loading the ROMs, the machine would compare the hash of the actual ROMs with the stored hash; if they did not match, it would refuse to boot and would display an error message alerting operators to the problem. Any machine which does not have a solution like this built into it, though, is therefore vulnerable to this kind of swap.
- 2006-10-11 voting computer tempest attack: The Nedap ES3B voting computer leaks a signal, receivable at up to 25m, which can be decoded to detect what votes are being cast. 90% of all Dutch votes are cast using that computer, according to the video.