- Twitch streamer’s mom, roommate get into brawl during live broadcast Thursday 8:41 PM
- Top NFL draft pick Nick Bosa scrubs racist, homophobic social media activity Thursday 8:18 PM
- Jared Kushner’s ‘comprehensive immigration plan’ is just 2 bullet points Thursday 8:16 PM
- ‘Lil Billie Xanish’ is the deepfake mashup of Billie Eilish and Lil Xan Thursday 5:10 PM
- Gossip account the Shade Room to launch 3 original series on Instagram Thursday 4:46 PM
- Biden says he asked Obama not to endorse him—but people aren’t buying it Thursday 3:17 PM
- Marvel makes more money than Harry Potter and Star Wars combined Thursday 3:13 PM
- ‘Avengers: Endgame’: Obituaries for the fallen heroes Thursday 2:51 PM
- T-Mobile, Verizon admit most Americans won’t see fast 5G Thursday 1:52 PM
- PlayStation Vue is offering a sweet streaming deal for a limited time Thursday 1:42 PM
- Twitter reportedly worried banning white nationalists would also flag some Republicans Thursday 1:31 PM
- Lawyer of cop in viral assault case calls the crime a ‘Facebook misdemeanor’ Thursday 12:33 PM
- Biden’s ‘all men’-focused announcement gets roasted Thursday 11:49 AM
- Skillshare is offering new users one month of premium for free Thursday 10:44 AM
- Report: Facebook is punishing Black people for talking about racism (updated) Thursday 10:15 AM
Hackers at a conference broke into U.S. voting machines in just 90 minutes
This is unsettling.
Hackers reportedly managed to penetrate multiple U.S. voting machines in a relatively short period of time at a conference in Las Vegas this week, a cautionary demonstration for people concerned with the integrity and security of American elections.
The group of hackers attending the annual DEF CON conference reportedly took just 90 minutes to compromise 30 different voting machines, breaking through different companies’ security measures, including Winvote, Diebold, and Sequoia. In some cases, the machines included external ports that could be used to plug in malware, while others―perhaps more concerning―had poorly secured Wi-Fi connectivity enabled, allowing the hackers to breach the systems remotely.
Jeff Braun, a cybersecurity expert at the University of Chicago, reportedly convinced the DEF CON conference to take up the demonstration, hoping to show whether voting machine companies’ assurances of security could be trusted. After the event concluded, he told the Register that the perils are obvious.
“Without question, our voting systems are weak and susceptible. Thanks to the contributions of the hacker community today, we’ve uncovered even more about exactly how,” Braun said.
“The scary thing is we also know that our foreign adversaries—including Russia, North Korea, Iran—possess the capabilities to hack them too, in the process undermining principles of democracy and threatening our national security.”
Election cybersecurity has been a hot topic in recent months, thanks to the U.S. intelligence community’s broad concurrence that the Russian government attempted to interfere in the presidential election. Specifically, it’s been widely alleged that Russia hacked the Democratic National Committee and the email account of Hillary Clinton’s campaign chairman John Podesta, in an attempt to funnel damaging information about her into the public consciousness.
It’s also been reported that Russian hackers accessed U.S. voting machines in 39 states in the run-up to the election, although there’s no evidence that any votes were changed.
Update 3:58pm CT, Aug. 1: Hackers discovered the records of 654,517 people in an ExpressPoll-5000 electronic voting machine at Voting Village, according to a Gizmodo report.
The records appear to be from people who voted in Shelby County, Tennessee, and contain names, addresses, dates of birth, political party affiliations, whether people voted absentee, and if they were asked to provide ID.
Security researcher Josh Palmer first discovered the database by simply removing the memory card from the voting machine and connecting it to a computer. Palmer told Gizmodo it was not encrypted and didn’t even have a password. The conference quickly confiscated the memory card to protect the more than 650,000 voters whose personal information was left unprotected. If Palmer had the card before an election, he said he could write a script “in seconds” that would make it appear as if all people already cast absentee ballots.
Chris Tognotti is a frequent contributor for the Daily Dot. He’s a news and current events writer based out of Berkeley, California, and a co-host of the podcast Now We Know. While he specializes in domestic politics and opinion writing, he’s also savvy on sports, video games, and film.