You are viewing an obsolete version of the DU website which is no longer supported by the Administrators. Visit The New DU.
Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Reply #3: Quote from the "Call and Post" [View All]

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU
Bushfire Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-04-03 03:08 PM
Response to Original message
3. Quote from the "Call and Post"
"So it was most unusual to find the industry leader being discredited in a report created by a couple of Johns Hopkins Univ. grad students. In what appeared to be a code-cracking homework assignment, the students prepared a report that directly contradicts information provided by Robyn M. Downs, elections administrator of Prince George's County, MD..."

last I checked these "grad students" are actually Avi Rubin, technical director of the John Hopkins Information Security Institute, Rice University computer-science professor Dan Wallach, and two John Hopkins grad students Tadayoshi Kohno & Adam Stubblefield. I would heed the security concerns of information security EXPERTS before Robyn Downs, Elections Administrator of Prince George's County MD. Nowhere does Diebold, or Call and Post backup their claim that this was just a homework assignment. The burden of proof regarding security still lies with Diebold, and other voting machine manufacturers.

http://reuters.com/newsArticle.jhtml?type=technologyNews&storyID=3155955

"It's unfortunate to find flaws in a system as potentially important as this one," Tadayoshi Kohno, a graduate student at the John Hopkins Information Security Institute, said in a telephone interview.

While researchers said they did not know for sure whether the software had been used in voting situations, they said comments and copyright notices in the code indicated that it was legitimate.

"I have no proof that this is what's running in their systems, but I would bet it's pretty close," said Avi Rubin, technical director of the Information Security Institute.

Rubin, Kohno, Johns Hopkins graduate student Adam Stubblefield, and Rice University computer-science professor Dan Wallach said they had uncovered several flaws in the system.
Printer Friendly | Permalink |  | Top
 

Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC