• petersr@lemmy.world
    link
    fedilink
    arrow-up
    8
    arrow-down
    1
    ·
    1 day ago

    I also don’t know exactly what she is getting at. What are these generated ballot images being used for precisely?

    • azuth@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 hours ago

      Fake data to test the validator program as some random guys can’t have access to real filled in ballots.

      Of course the hard part in hacking would not be generating the false ballots but putting them in the system.

      Its a complete non story.

    • DragonTypeWyvern@midwest.social
      link
      fedilink
      arrow-up
      7
      ·
      16 hours ago

      It’s not a great theory, and quite frankly I think getting stuck on a college project is silly when you can just make a new program with better resources but I think it goes:

      1: Issue blue pens to swingable democratic regions (or whatever).

      2: Have the machines set to generate a fake ballot image when it detects blue ink on the voter signature. Doesn’t need to be every ballot, just enough to swing the region.

      3: Print the generated ballot instead of what they voted for. I’m not sure how all machines work but my area physically prints a paper copy, do any machines just keep entirely digital records?

      4: Voter is apparently unaware their choices were changed.

      This presumably wouldn’t work in my area any more as it prints a scannable code and your entries, but it would have worked in 2016 when it just printed the code.

      I don’t buy this specific chain of events, but it is an excellent demonstration of why voting machines are just a stupid fucking idea. Even if they were the most secure, unhackably hardcoded systems in existence there would always be doubts.

      On the other hand, it’s not like paper ballots are tamper proof themselves.

      • petersr@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        7 hours ago

        But let me get this straight - this requires access to the voting machine in a way that allows installing software that somehow intervene with the existing voting software.

        And perhaps I am naive here, but I would assume that such a voting machine runs either

        • custom firmware / embedded operating system
        • custom version of Windows
        • custom or special purpose Linux
        • Windows in kiosk mode so normal users can’t access other application than the voting software nor OS settings.

        As a minimum I would assume kiosk mode, but to be honest I would expect much more than that from a voting system, including tightened security and no or very limited interoperability between the voting software and other software on the machine. And I am not seeing any nasty malicious system-level code in the repo.

        And yes, as you highlight, it is hard to buy this chain of events and yes, voting machines are a bad idea. As a technical person it sounds like conspiracy theorizing.