The Real Scoop on Security of E-voting: from the Brennan Center ReportQuicklink submitted by Joan Brunwasser Permalink
Become a Fan
|It would be quite practical to hide an effective Trojan horse inside a modern voting machine. Merely switching a very small number of votes on a large percentage of voting machines would be enough to swing many close statewide elections. It would not be possible to detect such a broad attack merely by reviewing precinct totals.|
The time limit for entering new comments on this Quicklink has expired.
This limit can be removed. Our paid membership program is designed to give you many benefits, such as removing this time limit. To learn more, please click here.