To: gb63
What about the princton professor that showed how to tamper a diebold machine
(had three George washington votes convert to 1 vote for Georges and two votes for Benedict Arnold)
On Fox and Friends, the professor said the malicious code was self erasing and undetectable.
51 posted on
10/20/2006 12:42:37 PM PDT by
longtermmemmory
(VOTE! http://www.senate.gov and http://www.house.gov)
To: longtermmemmory
the professor said the malicious code was self erasing
And how do you do that? Pretty neat trick, easy for a Princeton professor with an agenda to say, but let's see a real demo backed up by computer forensic experts and James Randi if he's available.
How does the malware know when to erase itself? Remember too, it was loaded from a bogus memory card. The card would need to know that it was about to be removed from the machine, signal the operating system, have sys delete the malware and correct CRC, then sys deletes the malware from within its own code space. Then does it recompile itself? Don't forget, it would have to secure-wipe the free space in memory too.
And if the malware resides in a eeprom on the motherboard, the motherboard would need to have an eeprom burner onboard for sys to instruct to reprogram the eeprom.
Sorry, the story borders on magic and does not pass the computer geek smell test.
53 posted on
10/20/2006 12:54:02 PM PDT by
DBrow
To: longtermmemmory
"What about the princton professor"
I saw the demo. If you are carrying out any demonstration, and you are allowed to control all factors, as was true in that case, you can always determine the final outcome. In a real case, the possible outcomes would be limited by secure procedures verifying disks and recorded results. In the long-term future, I think we will see increased electronic voting, with the ultimate goal being voting from computers at home.
54 posted on
10/20/2006 12:56:59 PM PDT by
gb63
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson