No, no, no, fucking no. IT person here. Man this site is going to shit.
No password does NOT mean that anyone can alter the data. No password simply means that the voting machines can get on the Internet without providing a password to connect to Wi-Fi. These are two completely different things; first being access to the Internet and the second being access to the information system in order to alter votes.
Should the voting machines have access to the Internet? Questionable.
Can the voting machines have their own encryption methods and access control methods, YES!
If you don’t know, please ask when it comes to IT as this is flat out stupid.
These Machines were being managed by a Win10 system certified in March 2020 using an image deployed in February. Not a single asset was updated past August 2020.
Wifi access is not the same as Direct Access unless you’re claiming a vulnerability enables an attacker access that they would not otherwise have remotely.
No, no, no, fucking no. IT person here. Man this site is going to shit.
No password does NOT mean that anyone can alter the data. No password simply means that the voting machines can get on the Internet without providing a password to connect to Wi-Fi. These are two completely different things; first being access to the Internet and the second being access to the information system in order to alter votes.
Should the voting machines have access to the Internet? Questionable.
Can the voting machines have their own encryption methods and access control methods, YES!
If you don’t know, please ask when it comes to IT as this is flat out stupid.
Actual IT guy here.
Physical Access is all access.
If this Machine was left on an unsecured network I would have direct access.
Less than two hours worth of YouTube videos could teach the average adult all they need to be able to quickly compromise these Machines.
You would have nothing unless you have physical access to the voting machines themselves. That is NOT what this post was declaring.
Is physical access “game over”. I agree for the most part. (unless the target is encrypted, etc.). But that is NOT was this post was declaring.
I have 20 years of IT experience. Don’t claim to be an “Actual IT guy”.
Wifi Access is the same as Direct Access.
These Machines were being managed by a Win10 system certified in March 2020 using an image deployed in February. Not a single asset was updated past August 2020.
That took me 2 minutes.
Wifi access is not the same as Direct Access unless you’re claiming a vulnerability enables an attacker access that they would not otherwise have remotely.