Diebold disclosed e-voting key on website

Electronic voting machine firm Diebold is once again the subject of
an embarrassing security gaffe after hackers created keys capable of opening voting machines from pictures posted on its website.

Two of three keys crafted by Ross Kinard of SploitCast were capable
of opening a voting machine obtained by Princeton University for
testing purposes. It's tempting to think, given the apparent ease of
the attack, that the locks are simple enough to be opened by anyone
with a basic knack for lockpicking.

Diebold has removed the offending images, replacing them with
pictures of digital card keys but that's akin to closing the gate after
the horse has bolted. Access to the key would allow tamperers to slip
in a memory card containing a virus or, even worse, tally-altering
software. In theory, security tape ought to be posted over the
compartment to detect such tampering, but that relies on election
officials checking for problems.

To make matters worse, the filing cabinet-style key is the same across all Diebold voting machines of the same model.

From The Register.


Author: Xavier Ashe

Entrepreneur, Infosec Executive, CISSP, CISM, Ironman triathlete, traveler, UU, paleo, father of 8, goyishe, gamer, & geek. http://linkedin.com/in/xavierashe

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s