Not secure BUT, they made sure to add this. From article;
“ While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.”
Damage control already out the gate. Also says from the article for systems using this software, to contact Dominion and have them help you keep the machines working as intended. Nothing about being obsolete. So it’s a start. A ways to go. But a start is all we need.
We just need doubts. By many state legislators. I feel the fraud is waaaay more proof than what’s needed. But to even doubt the machine could be a tipping point. So yea, this is good.
"While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.
Exploitation of these vulnerabilities would require physical access to individual ImageCast X devices, access to the Election Management System (EMS), or the ability to modify files before they are uploaded to ImageCast X devices."
Sounds like we need to get smart people to infiltrate and get:
physical access to individual Image cast X devices
Not secure BUT, they made sure to add this. From article;
“ While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.”
Damage control already out the gate. Also says from the article for systems using this software, to contact Dominion and have them help you keep the machines working as intended. Nothing about being obsolete. So it’s a start. A ways to go. But a start is all we need.
We just need doubts. By many state legislators. I feel the fraud is waaaay more proof than what’s needed. But to even doubt the machine could be a tipping point. So yea, this is good.
You're absolutely right but read the next line.
"While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.
Exploitation of these vulnerabilities would require physical access to individual ImageCast X devices, access to the Election Management System (EMS), or the ability to modify files before they are uploaded to ImageCast X devices."
Sounds like we need to get smart people to infiltrate and get: