Sun May 26, 2019, 04:44 PM
diva77 (6,372 posts)
Microsoft's ElectionGuard a Trojan Horse for a Military-Industrial Takeover of US Elections
https://www.mintpressnews.com/microsoft-electionguard-a-trojan-horse-for-a-military-industrial-takeover-of-us-elections/258732/
May 24th, 2019 By Whitney Webb Whitney Webb @_whitneywebb Earlier this month, tech giant Microsoft announced its solution to “protect” American elections from interference, which it has named “ElectionGuard.” The election technology is already set to be adopted by half of voting machine manufacturers and some state governments for the 2020 general election. Though it has been heavily promoted by the mainstream media in recent weeks, none of those reports have disclosed that ElectionGuard has several glaring conflicts of interest that greatly undermine its claim aimed at protecting U.S. democracy. In this investigation, MintPress will reveal how ElectionGuard was developed by companies with deep ties to the U.S. defense and intelligence communities and Israeli military intelligence, as well as the fact that it is far from clear that the technology would prevent foreign or domestic interference with, or the manipulation of, vote totals or other aspects of American election systems. SNIP However, investigative journalist Yasha Levine likened Microsoft’s promotion of ElectionGuard’s still unreleased open source code to a “PR move.” Levine told MintPress: Open source inevitably has bugs and vulnerabilities that are there accidentally because all code has vulnerabilities. This is true for open source and closed source systems. Open source just means that people can look at it, but then that code has to be run through a compiler that actually runs an executable program. So there you already have a degree of abstraction and separation from the open source code. But even if the executable code and the source code are the same, there are bugs which can be exploited. SNIP
|
12 replies, 1470 views
![]() |
Author | Time | Post |
![]() |
diva77 | May 2019 | OP |
Voltaire2 | May 2019 | #1 | |
ret5hd | May 2019 | #3 | |
earthshine | May 2019 | #4 | |
diva77 | May 2019 | #5 | |
Voltaire2 | May 2019 | #6 | |
diva77 | May 2019 | #8 | |
TheBlackAdder | May 2019 | #7 | |
diva77 | May 2019 | #9 | |
TheBlackAdder | May 2019 | #10 | |
diva77 | May 2019 | #11 | |
Ms. Toad | May 2019 | #12 | |
Igel | May 2019 | #2 |
Response to diva77 (Original post)
Sun May 26, 2019, 04:55 PM
Voltaire2 (8,939 posts)
1. The attack on open source is nonsense.
The point is that open source code *can* be reviewed, compiled, and tested by anyone. Closed source code is only subject to analysis by the owners and their agents.
An open system doesn’t guarantee no bugs or exploit vulnerabilities, but it certainly is a step up from closed systems. |
Response to Voltaire2 (Reply #1)
Sun May 26, 2019, 05:48 PM
ret5hd (15,953 posts)
3. No shit. Plus, think of the...
feather-in-the-cap of someone that discovered a flaw and was able to get it fixed.
My bet is that thousands of people would be poring over that code line by line to discover any flaws they could, even typos in the comments/documentation. And don't get me started on the ridiculous idea that there is some kind of uber-coding skills needed to essentially "add one to cell D5...now add 1 to cell F7...etc etc ". |
Response to ret5hd (Reply #3)
Sun May 26, 2019, 10:51 PM
earthshine (1,642 posts)
4. +1 Well said!
thousands of people would be poring over that code line by line to discover any flaws they could Computer geeks are going to have a field day. They live for this stuff. This is the DU member formerly known as earthshine.
|
Response to Voltaire2 (Reply #1)
Mon May 27, 2019, 12:20 AM
diva77 (6,372 posts)
5. good luck getting access to any of the voting machines or tabulators to inspect the code --
whatever code is supposed to be in the machines may not be what's actually there -- whether proprietary or open source
|
Response to diva77 (Reply #5)
Mon May 27, 2019, 07:48 AM
Voltaire2 (8,939 posts)
6. Well if the vendor is claiming that its
software is open source and is lying that would be fraud. For closed systems obviously there is no access.
The point is that an audit able open source election system is a good idea, not a bad idea, as the cited article seems to claim. |
Response to Voltaire2 (Reply #6)
Mon May 27, 2019, 02:33 PM
diva77 (6,372 posts)
8. Where in the article did it state that an auditable open source election system is a good idea?
My take is that the article makes the case for removing computers from the voting process altogether -- that computerized voting is nontransparent and any added cybersecurity adds too much complexity and vulnerability to the process.
|
Response to Voltaire2 (Reply #1)
Mon May 27, 2019, 09:15 AM
TheBlackAdder (19,880 posts)
7. That's a Myth--Open-Source is the most vulnerable Code Base, infiltrated by Hackers & Nation States
.
Everyone keeps perpetuating the myth that people are reviewing open-source software and making it more secure. The truth is that the only people reviewing open-source are college academia, hackers and nation state actors. The development communities are infiltrated by hackers who inject code to weaken the code and install access points. Many of the vulnerabilities are kept quashed so allow intrusion. One of the least secure offerings is Spring, which most banks rely on to develop code. Open-source presents the source, instead of trying to disassemble code, which most private ISVs use their own compiler variants to make decryption more difficult. Folks using open-source, often use standard compilers which makes hacking easy for the rest of their code.
Download the Synopsis report for more information. . |
Response to TheBlackAdder (Reply #7)
Mon May 27, 2019, 02:34 PM
diva77 (6,372 posts)
9. +1,000 Thank you for this info.
Response to diva77 (Reply #9)
Mon May 27, 2019, 05:52 PM
TheBlackAdder (19,880 posts)
10. Here are a few reports, including one stating there are over a million unregistered vulnerabilities.
.
This year's report, in the aforementioned article.
"You probably have unpatched open source vulnerabilities in your code Last year's report: https://www.synopsys.com/content/dam/synopsys/sig-assets/reports/2018-ossra.pdf ==== Here's Sonatype's Analysis from 2018, it will scare the shit out of you! The report requires registering.
https://www.theregister.co.uk/2018/09/25/open_source_security/ Just search: SONATYPE OPEN SOURCE SECURITY . |
Response to TheBlackAdder (Reply #10)
Mon May 27, 2019, 08:04 PM
diva77 (6,372 posts)
11. Yep, you scared the S*** out o' me, alright. LA County is spending nearly $300,000,000
Last edited Tue May 28, 2019, 12:09 AM - Edit history (3) to switch from hand marked paper ballots to BMDs with open source code just in time for 2020. They are going to DECERTIFY hand marked paper ballots. Above & beyond scam...
![]() ![]() ![]() I think of all the dilapidated schools in LA County, the 55,000+ homeless, underpaid teachers ---- and somehow, the Board of Supes thinks we want nontransparent voting machines with bells & whistles that print out bar coded 100% nonverifiable "ballots"???? 31,000 fancy "voting" machines for $300,000,000 -- that comes out to be about $10,000 per voting booth -- compare that to the cost of a paper ballot with a table with a 3 sided attachment to add privacy, no software or hardware or insurance or techies required. We've got the equivalent of the $1000 toilet seat lid on steroids coming to LA County. ![]() |
Response to Voltaire2 (Reply #1)
Mon May 27, 2019, 11:22 PM
Ms. Toad (25,773 posts)
12. The problem with open source & election code
is that the code that runs the machines cannot be changed until review of the proposed changes is completed. That process takes a long time (~1 year). So the machines will be vulnerable to published potential exploits for a year or so and the boards of election can do nothing to block the exploits.
There are no good solutions - but at least the closed source code is not subject to publication of potential exploit which cannot, by law, be fixed prior to a full review. |
Response to diva77 (Original post)
Sun May 26, 2019, 05:45 PM
Igel (31,554 posts)
2. Of course there are conflicts of interest.
If you're a top-notch programmer and designer involved in cybersecurity you'll probably be doing this for a living.
That means industry. Which, of course, means bias: Industries tend to be pro- or anti-Trump. Look at Google, Microsoft, Apple. Etc. Or the computer folk are connected to government. Not necessarily (just) the US government. Or they're connected to both, since governments tend to be tied in with cybersecurity. Go figure. And if you're connected with either in ways that involve cybersecurity, you're going to be tied in somehow with intelligence, government or military (or both). For the same reasons. There are exceptions. But many of them are hackers. As though hackers have no conflicts of interest. How you evaluate conflicts of interests itself has conflicts of interests. But open-source is like peer review. It may not be great, but it's better than nothing. At the same time, notice Yasha Levine's a Russian. (Ooh, big bad russky!) At the same time, he's apparently a satirist, and not in Putin's pocket. Unless that's what he *wants* us to think, so he can have cover as being "on the side of the ark (sic) of history" while undermining something that might inconvenience or hobble his masters. Ah, it's complicated trying to discern all the possible conflicts of interests and tangled webs that we don't see. |