this post was submitted on 15 Jun 2025
247 points (78.5% liked)

United States | News & Politics

3003 readers
1357 users here now

Welcome to !usa@midwest.social, where you can share and converse about the different things happening all over/about the United States.

If you’re interested in participating, please subscribe.

Rules

Be respectful and civil. No racism/bigotry/hateful speech.

Post anything related to the United States.

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] minoscopede@lemmy.world 6 points 2 days ago* (last edited 2 days ago)

Context: I worked in IAM (computer security) at a past job.

In computer security, we don't wait to get proof that a vulnerability was exploited. We have to operate under the assumption that any vulnerability was immediately exploited, and take immediate action to fix it and limit the impact. Doubly so when the stakes are high.

We need popular support to get real security experts to investigate these claims. If there was even a single path that could have led to a vulnerability of this scale, we need to completely secure these systems and do an immediate recount/re-vote.

I'll also say, I was surprised to learn that these voting systems and their specs are not fully public and open source. That alone makes me very uncomfortable. Security through obscurity is not security at all.