diff options
author | 46halbe <46halbe@berlin.ccc.de> | 2017-09-07 12:40:32 +0000 |
---|---|---|
committer | 46halbe <46halbe@berlin.ccc.de> | 2020-05-23 13:40:04 +0000 |
commit | 83334de27398473354100bc021710ca3679bf79a (patch) | |
tree | 2da1e4029ca01d0be765cf0723e08136aeec650b /updates/2017 | |
parent | c24248bca6e121933b45048d95dd3009c1ea4741 (diff) |
committing page revision 4
Diffstat (limited to 'updates/2017')
-rw-r--r-- | updates/2017/pc-wahl.en.md | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/updates/2017/pc-wahl.en.md b/updates/2017/pc-wahl.en.md index 04e66980..5e7a6151 100644 --- a/updates/2017/pc-wahl.en.md +++ b/updates/2017/pc-wahl.en.md | |||
@@ -1,8 +1,8 @@ | |||
1 | title: Software to capture votes in upcoming national election is insecure | 1 | title: Software to capture votes in upcoming national election is insecure |
2 | date: 2017-09-07 03:11:00 | 2 | date: 2017-09-07 03:11:00 |
3 | updated: 2017-09-07 09:43:41 | 3 | updated: 2017-09-07 12:40:32 |
4 | author: 46halbe | 4 | author: 46halbe |
5 | tags: update, pressemitteilung | 5 | tags: update, pressemitteilung, voting |
6 | previewimage: /images/LogoPC-wahl.jpg | 6 | previewimage: /images/LogoPC-wahl.jpg |
7 | 7 | ||
8 | The Chaos Computer Club is publishing an analysis of software used for tabulating the German parliamentary elections (Bundestagswahl). The analysis shows a host of problems and security holes, to an extent where public trust in the correct tabulation of votes is at stake. Proof-of-concept attack tools against this software are published with source code. | 8 | The Chaos Computer Club is publishing an analysis of software used for tabulating the German parliamentary elections (Bundestagswahl). The analysis shows a host of problems and security holes, to an extent where public trust in the correct tabulation of votes is at stake. Proof-of-concept attack tools against this software are published with source code. |
@@ -60,8 +60,8 @@ independent channel. | |||
60 | The attack scenarios shown, and the remarkably bad general state of this | 60 | The attack scenarios shown, and the remarkably bad general state of this |
61 | software call into question the security of competing products used for | 61 | software call into question the security of competing products used for |
62 | the same purpose. In the Netherlands, the Dutch version of another | 62 | the same purpose. In the Netherlands, the Dutch version of another |
63 | product, IVU.elect, used in Germany, was tested by Sijmen Ruwhof. The | 63 | product, IVU.elect, used in Germany, was tested by Sjoerd van der Hoorn |
64 | results were not pretty. \[2\] | 64 | and Sijmen Ruwhof. The results were not pretty. \[2\] |
65 | 65 | ||
66 | „It is simply not the right millenium to quietly ignore IT-security | 66 | „It is simply not the right millenium to quietly ignore IT-security |
67 | problems in voting“, says Linus Neumann. „Effective protective measures | 67 | problems in voting“, says Linus Neumann. „Effective protective measures |