I don't know why you would ever trust a computer. They can work OK but if you wanted to subvert them that would work as well.
You can write programs that work only on certain days or at certain times, polling day, for instance. So they would pass every test in the preceding days but still rig the vote.
You can write programs that delete themselves after running so a follow-up audit would never find them.
The Chinese added some extra spying components to some SuperMicro server motherboards it made. You could alter the BIOS, the operating system, some subroutines etc.
Then there is interference across a network. The list goes on and if there was money in it then you can bet someone has done it.
All valid points; I am not a coder but encrypting something to act only on election day wouldn't that be seen in auditing of the code? Of course that's with the assumption someone is looking.
Everything has to have a paper trail right (or evidence of its removal), hence no way around we caught them all.
I believe he said the encryption keys are for election data, so anyone could decrypt the results data, make changes to vote totals, then encrypt the altered data to change the final results. Also they could change the tabulator settings to control how votes were counted, so there was no need to hack the Windows/BIOS code.
I don't know why you would ever trust a computer. They can work OK but if you wanted to subvert them that would work as well.
You can write programs that work only on certain days or at certain times, polling day, for instance. So they would pass every test in the preceding days but still rig the vote.
You can write programs that delete themselves after running so a follow-up audit would never find them.
The Chinese added some extra spying components to some SuperMicro server motherboards it made. You could alter the BIOS, the operating system, some subroutines etc.
Then there is interference across a network. The list goes on and if there was money in it then you can bet someone has done it.
All valid points; I am not a coder but encrypting something to act only on election day wouldn't that be seen in auditing of the code? Of course that's with the assumption someone is looking.
Everything has to have a paper trail right (or evidence of its removal), hence no way around we caught them all.
I believe he said the encryption keys are for election data, so anyone could decrypt the results data, make changes to vote totals, then encrypt the altered data to change the final results. Also they could change the tabulator settings to control how votes were counted, so there was no need to hack the Windows/BIOS code.