Diebold Says So Long To North Carolina
from the turning-tail dept
Diebold has a long history of resisting sharing the source code for its much-derided electronic voting machines, even if it's with election officials wanting to verify the machines actually work like they're supposed to. North Carolina had passed a law requiring e-voting machine vendors to make their source code available for scrutiny by officials and experts, and Diebold managed to get itself exempted from the law, drawing a suit from the EFF. Last week, a judge ruled against Diebold, saying if they wanted to sell their machines in North Carolina, they'd have to follow the law. Diebold's response is pretty predictable: they'd rather not do business in the state than expose their code. The company just doesn't seem to get it: elections, and the equipment used in them, need to be transparent and open to public scrutiny. Running away rather than opening their code won't engender much trust in their equipment, in North Carolina, or anywhere.Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Reader Comments
Subscribe: RSS
View by: Time | Thread
No Subject Given
[ link to this | view in chronology ]
Re: No Subject Given
[ link to this | view in chronology ]
No Subject Given
[ link to this | view in chronology ]
Re: No Subject Given
If the officials want to determine if the machine is secure, they can try to hack it. Opening up the source code is total bull crap.
[ link to this | view in chronology ]
Old Skool
[ link to this | view in chronology ]
Re: No Subject Given
If it can't be verified the results are not influenced by the source than it's not public.
We all have a right to the knowledge that our elected officials were put into office honestly and with all the "bull crap" going on in our government right now I would think that you would too.
Wake up.
[ link to this | view in chronology ]
Re: No Subject Given
If the officials want to determine if the machine is secure, they can try to hack it. Opening up the source code is total bull crap."
The idea they might hire an incompetent hacker was just covered here a couple days ago so I'll leave that one alone, but there are other things that can go wrong besides evil Republicans/Democrats attaching keyboards in the voting booth, typing secret for the password, and changing the votes.
There is more to vote counting than the machine licking its electronic finger and saying "One, two , three..."
For instance, what are the rules for when someone chooses 2 or 4 candidates in a "choose 3" race? Will the program do it right? Maybe it will not count the rest of the ballot or will carry the overvote over to the next race or ballot. It's happened before.
[ link to this | view in chronology ]
Re: No Subject Given
Besides, security is not the only issue, as someone else already brought up. Is the system robust? Is there some malicious backdoor coded in there by a programmer with an agenda? Are there any obscure bugs in there? The only way to find these things out is by extensive beta testing and public code review.
[ link to this | view in chronology ]
Hacking isn't good enough
Yep, that might work for unintentional insecurities.
On the other hand, if diebold put in an intentional backdoor, they could code one that only respnded to a specific IP, or used port knocking, or a malformed ping packet, or probably a dozen other secure gateways that the hackers'd never even see.
So, given that political control of the most powerful nation on the planet is a valuable commodity in some circles, given that the history books are full of election fixing scams, and given that diebold have done such a laughable job of securing their software so far, how are we to trust that software?
In fact, how are we to trust any software that we cannot inspect?
This does mean that diebold should be forced to open their source. It does mean any machine used for electoral purposes should have its codebase publically audited, discussed and approved before use.
[ link to this | view in chronology ]
They must have something to hide
[ link to this | view in chronology ]
No Subject Given
Whether or not opening up your source code to politicians and professors is a good idea (and I have some serious doubts about it), the law said you have to if you want public money. That's just the way it is. Diebold tried to play politics and got burned. They better get used to it if they plan to play like that.
[ link to this | view in chronology ]
No Subject Given
[ link to this | view in chronology ]
Lucky for some of us...
[ link to this | view in chronology ]
It's a matter of security
Kinda defeats the intent.
[ link to this | view in chronology ]
Re: It's a matter of security
Opening up the source code is nothing like revealing your password... The code *should be* secure even if the source code is opened up. If it's not, then someone's going to figure it out sooner or later (and so far, it seems like some people have figured it out sooner).
[ link to this | view in chronology ]
Re: It's a matter of security
No, its more secure, because everybody sees the code, and in doing so, there's a thousand set of eyes that all agree: there's no way to execute unwanted code or gain illegal access.
Thats a sign of a failing democracy anyway, or crony capitalism. It shouldn't be but a flick of the wrist to spawn some company that does computerized voting on an open-source Linux-based computer, perhaps a distro created for the express purpose of voting. But, it doesn't happen.
[ link to this | view in chronology ]