Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: rigelkentaurus
The machines are physically transferred to the counting location. Machines are physically connected to the counting machine which is also air gapped.

Is this more secure than sneakernetting a memory card of some type?

At least for the Dominion machines the tabulator writes the ballot and vote counts to an encrypted memory card. It seems that a proprietary device to read that card and physically transfer the data to a compatible reader on the server would both preserve the original data and isolate and protect the tabulator.

30 posted on 12/02/2020 10:31:47 AM PST by semimojo
[ Post Reply | Private Reply | To 27 | View Replies ]


To: semimojo

USB access by definition is a pathway to introduce malware, spyware, viruses both intentional and unintentionally, even boot a separate operating system then mounting the host device to access its files. Once a USB is then separated, it can be substituted or edited in another device or have malware, spyware, viruses introduced during transport.

How many people had the knowledge of the encryption keys? Encryption is not the end all when physical access is possible and especially so when the encryption keys could be compromised.


33 posted on 12/02/2020 11:00:39 AM PST by rigelkentaurus
[ Post Reply | Private Reply | To 30 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson