![defcon convention defcon convention](http://4.bp.blogspot.com/-8XvAMj9gMXU/VXBzWIUnA5I/AAAAAAAAEv8/QZrE1iUGRFs/s1600/Defcon.jpg)
“Anybody got a card scanner?” or “Did somebody have the manual for the Diebold?” Every once in a while, someone would call out for help or advice. Only one of the models has been decommissioned, the rest are still in use around the country, he said.Īd hoc clusters of attendees hunched around each of them, murmuring quietly as they tested various inputs. The machines themselves were mostly bought on eBay, said event co-coordinator Matt Blaze, a professor at the University of Pennsylvania and election security expert. He came to the event because voting “has been such a hot topic after the presidential election,” he said.Ĭonference goers thronged to the room where more than 30 voting machines were laid out in various states of disassembly. It’s not even as strongly protected as a PC,” said Brandon Pfeifer, a security expert who works on embedded aviation systems in Kansas City. “This software just isn’t up to modern standards. elections and get them involved in fixing them. Its goal was to educate the computer security community about potential weaknesses of the voting systems used in U.S. The Voting Machine Hacking Village event at the 25th annual DefCon computer security conference ran from Friday to Sunday. One group even managed to rick-roll a touch screen voting machine, getting it to run Rick Astley’s song “Never Gonna Give You Up,” from 1987.
![defcon convention defcon convention](https://www.shaunchng.com/wp-content/uploads/2020/02/defcon-2019-034.jpg)
And none of these vulnerabilities has ever been found before, they’ll all new,” said Harri Hursti, co- coordinator of the event.
![defcon convention defcon convention](https://icdn.digitaltrends.com/image/digitaltrends/def-con-20-hacking-conference-pictures-from-viss-closing-ceremonies.jpg)
“The first ones were discovered within an hour and 30 minutes. It took less than a day for attendees at the DefCon hacking conference to find and exploit vulnerabilities in five different voting machine types. LAS VEGAS – Hackers 5, voting machines 0. Watch Video: Guests at DefCon hacking conference hack voting machines