5 Measures to Harden Election Technology

Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world’s most capable.                                                                                                                                                             

Part 2 of a two-part series. Read both articles in Dark Reading

Attackers could target the ballot design, the voting machines themselves, the scanners which read the ballots, or the centralized tabulator which tallies up results from multiple polling places. In addition, the transmission of vote counts along this chain could be compromised.

Leave a Comment

Your email address will not be published. Required fields are marked *