2016 Postmortem
Related: About this forumA Quick Brick Upside the Head to an Election Consipiracy Theory.
http://bluntandcranky.wordpress.com/2012/11/23/a-quick-brick-upside-the-head-to-an-election-consipiracy-theory/RC
(25,592 posts)While the voting machines themselves may not be outside hackable, the central tabulators are.
riqster
(13,986 posts)Last edited Fri Nov 23, 2012, 04:11 PM - Edit history (1)
For an outside hack to have worked in Ohio, November 2012, the outside group would have to have had all of the following:
* access to the tabulation environment,
* a copy of the most recent code used on the tabulation devices, and
* sufficient expertise to hack the code so as to alter the code so as to produce the desired result.
The first is not difficult. The second and third are very hard, because the vendors are constantly putting new patches in. So for an outside hacker, no matter how skilled, to be able to access and modify the code and know it would work without raising any red flags in the corrupt, partisan election offices (operated by the vendors themselves) is so risky as to not be worth the effort.
Oh, and the voting devices are easy to hack. Ludicrously so. They are often times not kept in secured environments, the poll workers not given the correct training and resources to run them properly, and are so badly built and designed that it can be hard for the people on the ground to tell a hack from an error. They are not as profitable to hack, but not as difficult as the central tabulators.
Please note that inside hacking is depressingly easy in all scenarios.
NashvilleLefty
(811 posts)is really astounding.
I'm not saying that Anonymous DID what the letter claims, but it certainly is reasonable. The blog's primary premise is that the voting machines were on a closed system. However, IF the software patches really were man-in-the-middle patches AND if the ORCA software was as the letter claimed, then it was an open system. And, what they claimed fit the reports. Now, whether they were made to fit the reports after the fact or not we will never actually know or be able to prove one way or the other.
riqster
(13,986 posts)If one were going to call someone out for being fact-challenged, the best way to do it would be to provide facts of one's own.
The blog states that the tabulation devices had illegal patches placed on them by the vendor: Fact: http://www.freepress.org/departments/display/19/2012/4766
The blog states that the voting machines themselves are inaccurate, badly made, poorly maintained, not auditable, and not always handled in the prescribed manner: Fact: http://homepage.cs.uiowa.edu/~jones/voting/congress.html
As to the basic premise of the difficulty of an outsider hacking recently-updated black-box code with the sure and certain knowledge that one would succeed and not be caught: ask anyone who has done it. Not happening. Yes, one COULD hack the code, but the most likely outcome would be to crash the system.
Got any facts of your own to contribute?
bleever
(20,616 posts)D'oh.
riqster
(13,986 posts)Thanks! I focused more on the technical aspect of the topic.
Comrade_McKenzie
(2,526 posts)The rest of us call an orange, an orange.
Coyotl
(15,262 posts)Gee, you mean Karl Rove's smart phone isn't connected to every voting machine?
Response to riqster (Original post)
Name removed Message auto-removed