lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: jftucker at gmail.com (James Tucker)
Subject: Electronic Voting Machines - WinVote by Adv anced Voting Solutions

Of course the power ranges you quote are also illegal, not to mention
extremely dangerous.

On Thu, 19 Aug 2004 10:21:49 -0500, Michael Williamson
<michael@...fin.tamucc.edu> wrote:
> Using 802.11 for anything remotely critical is outright STUPID.
> 
> FCC regulations are such that these part 15 devices (802.11, cordless
> phones, baby monitors) have no legal protection from interference from
> licensed services (amateur radio, TV stations, etc).  If I'm running a
> high powered (10-100 watt) maybe signal at 2.4 ghz for amateur radio TV
> and happen to be living across the street from an election center,
> they're basically screwed.  As a matter a fact, if their 802.11 is
> interfering with my licensed operation, it is they who must shut down.
> 
> -Michael
> 
> 
> 
> 
> > Without even commenting on the "security" of WEP, it seems to me that a
> > massive DDOS attack against the voting machines could prevent vote tallies
> > from being counted in a timely manner.
> 
> 
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ