this post was submitted on 14 Aug 2024
40 points (97.6% liked)
Cybersecurity
5627 readers
36 users here now
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Well manipulation of people is my example with Venezuela with guns and corruption. but it is a small country. What about a 150 million or more country, what would be easier, manipulation of paper votes across the country involving a lot, and I mean a lot, of people using ballot stuffing and count rigging or getting a small hacking group years in advance to plan and execute a voting machine manipulation without anyone noticing
This is actually incredibly difficult. Finding vulnerabilities isn’t easy, and exploiting them often isn’t easy either. Sometimes a vulnerability requires the user of the device to do something specific, and sometimes it requires direct access to the device. This comes back to social engineering, as a hacker may have to trick a poll worker into triggering the vulnerability. Also some vulnerabilities might be less impactful than others, e.g. leaking some information rather than allowing a hacker to manipulate votes. Finally, vulnerabilities are discovered and patched all the time. The problems discovered at this year’s DefCon, maybe not all of them will be patched before the election. But planning an attack years in advance? That’s not happening.
So here’s a list of actual vote manipulation techniques that are commonly used in this country:
Here’s a list of vote manipulation techniques that were attempted but failed:
I really, deeply think that some unspecified electronic vulnerabilities are the least of our concerns for this upcoming election.