No, no, no, fucking no. IT person here. Man this site is going to shit.
No password does NOT mean that anyone can alter the data. No password simply means that the voting machines can get on the Internet without providing a password to connect to Wi-Fi. These are two completely different things; first being access to the Internet and the second being access to the information system in order to alter votes.
Should the voting machines have access to the Internet? Questionable.
Can the voting machines have their own encryption methods and access control methods, YES!
If you don’t know, please ask when it comes to IT as this is flat out stupid.
IT (over three decades). You are Flat Out Wrong about “unless you have physical access” and you should know once you get into a system via the internet, you can control it. That means “manipulate and/or delete data”. This is not brain surgery - it’s SOP. I hope you just misunderstood the context, because otherwise ....
Access to the information system exactly how? It doesn’t matter if you can see the traffic flowing across the network if the traffic is encrypted at the application/session layer. You have no access to it. It doesn’t matter if your network access to the voting machine means that the voting machine refuses to accept admin connections from your IP address. Access control of management ports is STANDARD practice.
Please describe EXACTLY how you intend to gain access to a voting machine over the Internet that refuses to answer from your source IP address.
No, no, no, fucking no. IT person here. Man this site is going to shit.
No password does NOT mean that anyone can alter the data. No password simply means that the voting machines can get on the Internet without providing a password to connect to Wi-Fi. These are two completely different things; first being access to the Internet and the second being access to the information system in order to alter votes.
Should the voting machines have access to the Internet? Questionable.
Can the voting machines have their own encryption methods and access control methods, YES!
If you don’t know, please ask when it comes to IT as this is flat out stupid.
Actual IT guy here.
Physical Access is all access.
If this Machine was left on an unsecured network I would have direct access.
Less than two hours worth of YouTube videos could teach the average adult all they need to be able to quickly compromise these Machines.
You would have nothing unless you have physical access to the voting machines themselves. That is NOT what this post was declaring.
Is physical access “game over”. I agree for the most part. (unless the target is encrypted, etc.). But that is NOT was this post was declaring.
I have 20 years of IT experience. Don’t claim to be an “Actual IT guy”.
IT (over three decades). You are Flat Out Wrong about “unless you have physical access” and you should know once you get into a system via the internet, you can control it. That means “manipulate and/or delete data”. This is not brain surgery - it’s SOP. I hope you just misunderstood the context, because otherwise ....
Access to the information system exactly how? It doesn’t matter if you can see the traffic flowing across the network if the traffic is encrypted at the application/session layer. You have no access to it. It doesn’t matter if your network access to the voting machine means that the voting machine refuses to accept admin connections from your IP address. Access control of management ports is STANDARD practice.
Please describe EXACTLY how you intend to gain access to a voting machine over the Internet that refuses to answer from your source IP address.