At least some of the machines used had active wireless on them
What does physical access to the polling booth gain a "hacker"? They would need physical access to the tabulator that counts the individual votes, would they not?
And how, pray tell, do you get "paranoid enough to watch access" to mean *anything* when we allow the hacker *physical* *access* *AND* be unsupervised due to the design of the polling booth?
Paul Schmehl (pauls@xxxxxxxxxxxx) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html