Friday, August, 14
Host Ira Flatow draws this conclusion about the technique described by UCSD professor that circumvents proprietary source code entirely:
FLATOW: 'Well, if you could get - steal a machine - I shouldn't say steal a machine. If someone could steal a machine, or you could buy a machine and look at the machine and not have to have the source code and then go in and hack the machine the night before, it doesn't say very much about the security of electronic voting, does it?'
Click here to listen:
Watch this video Hovav Shacham Demonstrates the Hack