Kudos.......nice going.
This flagrant online fraud needs to be brought up everytime you-know-who's machine voting is touted as being "safe and secure."
Liz, as the most senior Freeper to this point in the thread, if I may be so bold, you of all people need an about page. You are inspiring, and your about page would be doubly so.
...and if I have overreached or stepped on toes, forgive me.
See, Knighthawk’s as a patriotic example.
Connectivity to a network immediately makes an infrastructure system "compromised" in a zero trust, assume breach security stance. For that reason, critical security infrastructure is recommended to be offline or on a "Tier 0 network" that is isolated from the Internet and heavily controlled.
As an IT security professional, I deal a lot with public key infrastructure. This is the stuff that ensures the websites you visit are secure. That little lock in your URL bar means the site is secured using a certificate that is trusted back to a specific issuing authority. If the root certificate authority (CA) is online, it can be compromised. With every single customer I've worked, I recommend the root CA be offline and act as a "signer" for CAs down the chain that act as "issuers." I can't tell you how many corporations and even federal entities have online root CAs. If the bad guys get into your environment, their first stop is your identity infrastructure (i.e. Active Directory), and as soon as they have the keys to your kingdom, they're looking for your CA. If they can get on your CA, Katie bar the door.
Election systems should natively be offline. They should never once be put online in any way; not via wired or wireless or even Bluetooth connections. If any of those mechanisms are available, the system can, and likely will be, compromised.