Hackers 5. Voting machines 0
It took less than a day for attendees at the DefCon hacking conference to find and exploit vulnerabilities in five different voting machine types.
“The first ones were discovered within an hour and 30 minutes. And none of these vulnerabilities has ever been found before, they’ll all new,” said Harri Hursti, co- coordinator of the event.
Hackers 5. Voting machines 0.
It took less than a day for attendees at the DefCon hacking conference to find and exploit vulnerabilities in five different voting machine types.
“The first ones were discovered within an hour and 30 minutes. And none of these vulnerabilities has ever been found before, they’ll all new,” said Harri Hursti, co- coordinator of the event.
Hackers 5. Voting machines 0.