Stories
Slash Boxes
Comments

SoylentNews is people

posted by mrcoolbp on Friday April 24 2015, @11:50PM   Printer-friendly
from the never-trusted-those-things-anyways dept.

From the Wichita Eagle:

A Wichita State University mathematician sued the top Kansas election official Wednesday, seeking paper tapes from electronic voting machines in an effort to explain statistical anomalies favoring Republicans in counts coming from large precincts across the country.

Wichita Eagle's coverage

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by Hairyfeet on Saturday April 25 2015, @01:32PM

    by Hairyfeet (75) <bassbeast1968NO@SPAMgmail.com> on Saturday April 25 2015, @01:32PM (#175051) Journal

    Sigh...do you even understand what source code IS? It is just that, the source of the code that MIGHT be on the machine. It isn't magical pixie dust that protects you from attackers that control the hardware and to think otherwise is either beyond naive or simply ignoring reality to push your FOSS agenda.

    If there was rigging it was done by people that control the hardware which means it means exactly jack and squat if you have the source because 1.- The source you have may not be what was running at the time, 2.- The source does not in any way stop them from loading malware, and 3.- The source does not magically keep them from removing said malware after the election.

    Source lets you fix bugs IF you are a developer OR have the money to hire some, it does NOT create a magic malware shield.

    --
    ACs are never seen so don't bother. Always ready to show SJWs for the racists they are.
    Starting Score:    1  point
    Moderation   +1  
       Troll=1, Insightful=1, Informative=1, Total=3
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 2) by mendax on Saturday April 25 2015, @10:03PM

    by mendax (2840) on Saturday April 25 2015, @10:03PM (#175179)

    I am a programmer. I think I know what source code is. And I recognize that making it available creates some sort of "magic malware shield", but complete openness makes it harder for someone to do some unkosher (or non-halal if you prefer).

    --
    It's really quite a simple choice: Life, Death, or Los Angeles.
    • (Score: 3, Informative) by Hairyfeet on Sunday April 26 2015, @08:10AM

      by Hairyfeet (75) <bassbeast1968NO@SPAMgmail.com> on Sunday April 26 2015, @08:10AM (#175299) Journal

      Alright smart guy lets here EXACTLY how source code is gonna keep an attacker that controls the hardware and has unfettered access from doing any damned thing they want. While you are at it explain 1.- How EXACTLY you are gonna prove that the source YOU have was the source that was running at the time, 2.- That there wasn't malware loaded during the critical election period, and 3.- That said alteration wasn't taken off after the fact.

      Because I really want to hear this because it sounds EXACTLY like you are assigning magical pixie powers to source...so lets here it, elucidate us with your wisdom oh wise one.

      --
      ACs are never seen so don't bother. Always ready to show SJWs for the racists they are.