[Paleopsych] diebold

K.E. guavaberry at earthlink.net
Thu Nov 11 03:41:59 UTC 2004

At 10:06 AM 11/5/2004, you wrote:
"Our analysis shows that this voting system is far below
even the most minimal security standards applicable
in other contexts."


News Update from Citizens for Legitimate Government
   November 10, 2004

Diebold Source Code!!! --by ouranos (dailykos.com) "Dr. Avi Rubin is 
currently Professor of Computer Science at John Hopkins University. He 
'accidentally' got his hands on a copy of the Diebold software 
program--Diebold's source code--which runs their e-voting machines. Dr. 
Rubin's students pored over 48,609 lines of code that make up this 
software. One line in particular stood out over all the rest: 
#defineDESKEY((des_KEY8F2654hd4" All commercial programs have provisions to 
be encrypted so as to protect them from having their contents read or 
changed by anyone not having the key... The line that staggered the Hopkins 
team was that the method used to encrypt the Diebold machines was a method 
called Digital Encryption Standard (DES), a code that was broken in 1997 
and is NO LONGER USED by anyone to secure programs. F2654hd4 was the key to 
the encryption. Moreover, because the KEY was IN the source code, all 
Diebold machines would respond to the same key. Unlock one, you have then 
ALL unlocked. I can't believe there is a person alive who wouldn't 
understand the reason this was allowed to happen. This wasn't a mistake by 
any stretch of the imagination."


The Educational CyberPlayGround

National Children's Folksong Repository

Hot List of Schools Online and
Net Happenings, K12 Newsletters, Network Newsletters

7 Hot Site Awards
New York Times, USA Today , MSNBC, Earthlink,
USA Today Best Bets For Educators, Macworld Top Fifty

More information about the paleopsych mailing list