Map
Index
Random
Help
th

Quote: tampering with a mechanical voting machine is visible after the fact; but a software attack can leave the machine exactly the same

QuoteRef: nislE1_2007 , p. 57



Group:
security
Topic:
limitations of system security

Quotation Skeleton

Tampering with a mechanical voting machine leaves traces: … reveal that votes were not recorded correctly … Attack software running on a voting machine can … no trace behind. … An after-the-vote inspection will show only original, approved, …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Group: security   (23 topics, 874 quotes)
Topic: limitations of system security (39 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.