Voting Machine Manual Instructed Election Officials To Use Weak Passwords
An nameless reader quotes a document from Motherboard: An election safety skilled who has completed risk-assessments in numerous states since 2016 not too long ago discovered a reference handbook that looks to had been created via one vote casting system seller for county election officers and that lists essential usernames and passwords for the seller’s tabulation device. The passwords, together with a device administrator and root password, are trivial and simple to crack, together with one composed from the seller’s identify. And even supposing the record signifies that consumers shall be brought on periodically via the device to switch the passwords, the record instructs shoppers to re-use passwords in some circumstances — alternating between two of them — and in different circumstances to easily alternate a host appended to the top of a few passwords to switch them.
The seller, California-based Unisyn Voting Solutions, makes an optical-scan device referred to as OpenElect Voting System to be used in each precincts and central election places of work. The passwords within the handbook seem to be for the Open Elect Central Suite, the backend election-management device used to create election definition recordsdata for each and every vote casting system prior to each election — the recordsdata that inform the system the right way to apportion votes according to the marks citizens make on a poll. The suite additionally tabulates votes amassed from all of a county’s Unisyn optical scan methods. The credentials indexed within the handbook come with usernames and passwords for the preliminary log-in to the device in addition to credentials to log into the customer tool used to tabulate and retailer reliable election effects.