{"id":43780,"date":"2024-01-24T20:08:23","date_gmt":"2024-01-25T01:08:23","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=43780"},"modified":"2024-01-24T20:08:23","modified_gmt":"2024-01-25T01:08:23","slug":"are-us-voting-machines-vulnerable-to-compromise","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/are-us-voting-machines-vulnerable-to-compromise\/","title":{"rendered":"Are US voting machines vulnerable to compromise?"},"content":{"rendered":"<p>Amidst swirling conspiracy theories about US election integrity, a federal trial is bringing the vulnerabilities of Georgia\u2019s voting system into the spotlight. Professor Alex Halderman of the University of Michigan has just given a courtroom demonstration that could be straight out of a hacker\u2019s handbook, showing how a voting machine might be compromised with just a pen, a faux voter card, or a USB stick.<\/p>\n<p>While the trial, under the gavel of U.S. District Judge Amy Totenberg, isn&#8217;t about past election fraud\u2014it&#8217;s already been debunked\u2014it&#8217;s probing the susceptibility of the system to meddling and mishaps. Election officials are standing firm, assuring that the Peach State\u2019s elections are hack-proof and that any vulnerabilities shown are merely theoretical.<\/p>\n<p>However, past breaches like January 2021&#8217;s Coffee County incident, where election software was copied, have activists pushing for a back-to-basics approach with paper ballots for 2024. The decision rests with Judge Totenberg, with the verdict set to resonate beyond Georgia, possibly redefining how elections are conducted across the US.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amidst swirling conspiracy theories about US election integrity, a federal trial is bringing the vulnerabilities of Georgia\u2019s voting system into the spotlight. Professor Alex Halderman of the University of Michigan has just given a courtroom demonstration that could be straight out of a hacker\u2019s handbook, showing how a voting machine might be compromised with just [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":43781,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16,9,215],"tags":[1207,275,1252],"class_list":["post-43780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-todays-news","category-top-stories","tag-election","tag-top-story","tag-voting-machine"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/43780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=43780"}],"version-history":[{"count":1,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/43780\/revisions"}],"predecessor-version":[{"id":43782,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/43780\/revisions\/43782"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media\/43781"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=43780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=43780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=43780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}