• @[email protected]
    link
    fedilink
    615 hours ago

    It’s not a great theory, and quite frankly I think getting stuck on a college project is silly when you can just make a new program with better resources but I think it goes:

    1: Issue blue pens to swingable democratic regions (or whatever).

    2: Have the machines set to generate a fake ballot image when it detects blue ink on the voter signature. Doesn’t need to be every ballot, just enough to swing the region.

    3: Print the generated ballot instead of what they voted for. I’m not sure how all machines work but my area physically prints a paper copy, do any machines just keep entirely digital records?

    4: Voter is apparently unaware their choices were changed.

    This presumably wouldn’t work in my area any more as it prints a scannable code and your entries, but it would have worked in 2016 when it just printed the code.

    I don’t buy this specific chain of events, but it is an excellent demonstration of why voting machines are just a stupid fucking idea. Even if they were the most secure, unhackably hardcoded systems in existence there would always be doubts.

    On the other hand, it’s not like paper ballots are tamper proof themselves.

    • @petersr
      link
      36 hours ago

      But let me get this straight - this requires access to the voting machine in a way that allows installing software that somehow intervene with the existing voting software.

      And perhaps I am naive here, but I would assume that such a voting machine runs either

      • custom firmware / embedded operating system
      • custom version of Windows
      • custom or special purpose Linux
      • Windows in kiosk mode so normal users can’t access other application than the voting software nor OS settings.

      As a minimum I would assume kiosk mode, but to be honest I would expect much more than that from a voting system, including tightened security and no or very limited interoperability between the voting software and other software on the machine. And I am not seeing any nasty malicious system-level code in the repo.

      And yes, as you highlight, it is hard to buy this chain of events and yes, voting machines are a bad idea. As a technical person it sounds like conspiracy theorizing.