Another Vote Against Diebold
A new study commissioned by the Maryland legislature states that electronic voting machines bought by the state from Diebold for $55 million have such poor software and physical security that an election could be disrupted or even stolen, according to the New York Times. The study represents the first hands-on effort to hack these machines under conditions found in an election. The team, from consulting firm RABA Technologies in Columbia, MD, did say that the weaknesses could be addressed–at least preliminarily–in time for the state’s primary elections in March.
This is only one in a series of reports attacking the security of electronic voting machines, particularly those manufactured by Diebold Election Systems. Diebold’s machines are used statewide in Georgia as well as in several populous counties in Califonia, Texas, and Ohio. Stanford computer scientist David Dill, who is among the security experts asking for more stringent regulation of this new technology, explains his concerns in this TR interview.
Keep Reading
Most Popular
Large language models can do jaw-dropping things. But nobody knows exactly why.
And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.
How scientists traced a mysterious covid case back to six toilets
When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.
The problem with plug-in hybrids? Their drivers.
Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.
Google DeepMind’s new generative model makes Super Mario–like games from scratch
Genie learns how to control games by watching hours and hours of video. It could help train next-gen robots too.
Stay connected
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.