Hacker News new | past | comments | ask | show | jobs | submit login

The vulnerabilities they found are laughable. Even with all of them fixed, what about infected disk firmware, compromised Intel Management Engine (or the AMD equivalent), or a subverted compiler [1]? On the system itself, or on a developer's machine.

And suppose you somehow fix all of that, and run it on a mathematically verified secure chip. How do you know vulnerabilities weren't inserted into the silicon, or perhaps the whole chip was swapped with a compromised one when you weren't looking. There's already been reports of factory compromised hardware for credit card readers.

With control of the entire USA as the prize, you can bet that's the level of attack you'll be dealing with.

[1] https://www.win.tue.nl/~aeb/linux/hh/thompson/trust.html

The demand for electronic and online voting is so high that I fear it will be implemented in a compromised way, before the problem is actually solved. As I understand it, all known descriptions of electronic voting are worse than paper ballots in terms of security and anonymity.

This is just what a former CS professor told me years ago, but it seems to be supported by what experts are saying.

Edit: clarity and addl thought

I think the key is, you can't tell if the system's been compromised by looking at it. And not even by taking it apart and examining it, bit by bit. Not without an electron microscope. And unlike with banking, you can't tell by the results either.

We need a clear way to communicate why it's so dangerous that computer illiterate people will understand, and that's as clear as I can put it.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact