{"id":908,"date":"2003-11-19T13:18:41","date_gmt":"2003-11-19T20:18:41","guid":{"rendered":"http:\/\/www.edgewiseblog.com\/mjh\/uncategorized\/electronic-voting-insecurity\/"},"modified":"2003-11-19T13:18:41","modified_gmt":"2003-11-19T20:18:41","slug":"electronic-voting-insecurity","status":"publish","type":"post","link":"https:\/\/www.edgewiseblog.com\/mjh\/nada\/dump-duhbya\/electronic-voting-insecurity\/","title":{"rendered":"Electronic voting insecurity"},"content":{"rendered":"<blockquote><p>The following email quote is one of many taken from Diebold, maker of electronic voting machines. It appears in a rather long article on the vital issue. Electronic voting is not secure. mjh<\/p><\/blockquote>\n<p><a title=\"The Register\" href=\"http:\/\/www.theregister.co.uk\/content\/55\/34051.html\">Electronic Voting Debacle<\/a><br \/>\nBy Scott Granneman, SecurityFocus, The Register<\/p>\n<p>&#8220;Right now you can open GEMS&#8217; .mdb file with MS-Access, and alter its contents. That includes the audit log. This isn&#8217;t anything new. &#8230; Now, where the perception comes in is that its right now very *easy* to change the contents. Double click the .mdb file. &#8230; It is possible to put a secret password on the .mdb file to prevent Metamor [a consulting company] from opening it with Access. Being able to end-run the database has admittedly got people out of a bind though. Jane (I think it was Jane) did some fancy footwork on the .mdb file in Gaston recently. I know our dealers do it. King County is famous for it. That&#8217;s why we&#8217;ve never put a password on the file before.&#8221; (Source: &#8220;RE: alteration of Audit Log in Access&#8221;, support.w3archive\/200110\/msg00122.html, dated 18 October 2001)<br \/>\n===<br \/>\nSee also <a title=\"mjh's weBlog: Can we trust electronic voting machines?\" href=\"http:\/\/www.mjhinton.com\/blogs\/000115.htm\">mjh&#8217;s weBlog: Can we trust electronic voting machines?<\/a> November 03, 2003<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following email quote is one of many taken from Diebold, maker of electronic voting machines. It appears in a rather long article on the vital issue. Electronic voting is not secure. mjh Electronic Voting Debacle By Scott Granneman, SecurityFocus, The Register &#8220;Right now you can open GEMS&#8217; .mdb file with MS-Access, and alter its &hellip; <a href=\"https:\/\/www.edgewiseblog.com\/mjh\/nada\/dump-duhbya\/electronic-voting-insecurity\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Electronic voting insecurity<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-908","post","type-post","status-publish","format-standard","hentry","category-dump-duhbya"],"_links":{"self":[{"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/posts\/908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/comments?post=908"}],"version-history":[{"count":0,"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/posts\/908\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/media?parent=908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/categories?post=908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/tags?post=908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}