lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: BFetch at texpac.com (Fetch, Brandon)
Subject: Electronic Voting Machines - WinVote by Adv
	anced Voting Solutions

Next question - is the traffic encrypted between the counting station and
the booth itself?  If it's not, I'm filing a paper vote in my community from
now on.

(Grand Prairie, TX BTW)

Brandon Fetch
817-871-4036
-- carpe ductum -- "Grab the tape"

-----Original Message-----
From: marchany@...edu [mailto:marchany@...edu]
Sent: Wednesday, August 18, 2004 4:41 PM
To: full-disclosure@...ts.netsys.com
Cc: marchany@...and.cc.vt.edu
Subject: [Full-Disclosure] Electronic Voting Machines - WinVote by Advanced
Voting Solutions

Our county has approved the purchase of these machines for the upcoming
election. I looked them up on the www and found that the Windows-based
voting
machines use WEP to ensure the security of the wireless transmissions of the
machines to a central site.

Without even commenting on the "security" of WEP, it seems to me that a
massive DDOS attack against the voting machines could prevent vote tallies
from being counted in a timely manner.

Has there been any discussion of the security of this type of voting machine
architecture?

The machine is particular is WinVote by Advanced Voting Solutions
(http://clients.enfocom.com/avs/home.html`).

        -Randy Marchany

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


This message is intended only for the person(s) to which it is addressed 
and may contain privileged, confidential and/or insider information. 
If you have received this communication in error, please notify us 
immediately by replying to the message and deleting it from your computer. 
Any disclosure, copying, distribution, or the taking of any action concerning
the contents of this message and any attachment(s) by anyone other 
than the named recipient(s) is strictly prohibited.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ