In the 1990s, I served on a "Blue Ribbon Committee" that was advising a 
consortium of Midwest states (WI, MN, IA, SD) reviewing responses to an RFP for 
voting machines. The most notable item in the RFP was a requirement for a 
mechanism that would allow the head election official to "correct" vote tallies 
when "necessary." The mechanism had to bypass the normal audit trail.  All of 
the proposals included such a feature and 'security' was little more than a 
password.

Of course, I never saw the code behind the machines that were eventually 
purchased, but I always suspected that a clever hacker could exploit that 
feature if, in fact, it was actually implemented. Because of that I have always 
given, "grain of salt" credibility to claims of voting machine-based fraud.

davew


On Thu, Nov 21, 2024, at 9:37 AM, glen wrote:
> • I looked around a bit but couldn't find the code they say is easily 
> accessible on GitHub. Maybe I just missed it.
>
> • It's fine to suggest that having the software allows it to be 
> modified such that it could add a ballot. But we need the 
> update/install mechanism. Was it sideloaded or did it use a standard 
> update and the modification was included upstream? I'm too ignorant of 
> how the tabulation machines work to know how plausible such an attack 
> is.
>
> • Why fake bullet ballots? It seems like whatever templating software 
> is used, it would be just as easy to vote straight ticket. But maybe 
> there is some issue given state differences? Maybe it's easier to grep 
> for Trump than it is for Republican? Plus, there's all those 
> initiatives and non-partisan offices.
>
> The rest seems reasonable enough for Harris to file a challenge. I 
> would. Apparently the deadline in NC is tomorrow?
>
> On 11/20/24 14:30, _ Bruno W wrote:
>> Anyone interested in double checking any of this or look at different 
>> statistics.
>> I think it would be good to check that voter preference does correlate with 
>> voting machine vendor.
>> I was able to get data from Michigan, have not looked beyond there yet.
>> But the data will need to be reformatted to be useful...
>> https://www.planetcritical.com/p/cyber-security-experts-warn-election-hacked
>
> -- 
> ꙮ Mɥǝu ǝlǝdɥɐuʇs ɟᴉƃɥʇ' ʇɥǝ ƃɹɐss snɟɟǝɹs˙ ꙮ
>
> .- .-.. .-.. / ..-. --- --- - . .-. ... / .- .-. . / .-- .-. --- -. --. 
> / ... --- -- . / .- .-. . / ..- ... . ..-. ..- .-..
> FRIAM Applied Complexity Group listserv
> Fridays 9a-12p Friday St. Johns Cafe   /   Thursdays 9a-12p Zoom 
> https://bit.ly/virtualfriam
> to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
> FRIAM-COMIC http://friam-comic.blogspot.com/
> archives:  5/2017 thru present 
> https://redfish.com/pipermail/friam_redfish.com/
>   1/2003 thru 6/2021  http://friam.383.s1.nabble.com/

.- .-.. .-.. / ..-. --- --- - . .-. ... / .- .-. . / .-- .-. --- -. --. / ... 
--- -- . / .- .-. . / ..- ... . ..-. ..- .-..
FRIAM Applied Complexity Group listserv
Fridays 9a-12p Friday St. Johns Cafe   /   Thursdays 9a-12p Zoom 
https://bit.ly/virtualfriam
to (un)subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
FRIAM-COMIC http://friam-comic.blogspot.com/
archives:  5/2017 thru present https://redfish.com/pipermail/friam_redfish.com/
  1/2003 thru 6/2021  http://friam.383.s1.nabble.com/

Reply via email to