Security quotes of the week
DRE (direct-recording electronic) voting machines are ones where voters
cast their ballots by pressing buttons or using a touch screen, and the
primary record of the votes is stored in a computer memory. Numerous
scientific studies have demonstrated that such machines can be reprogrammed
to steal votes, so when we got our hands on a DRE called the Sequoia AVC
Edge, we decided to do something different: we reprogrammed it to run
Pac-Man.
-- J. Alex
Halderman
The Indian government has refused to let [researchers] review the machine, and
insists that it's tamper-proof. Even after the initial report came out
proving this not to be the case, the government has continued to insist the
machines are fine and have no problems. Here in the US, it's quite
troubling how much the government has relied on e-voting machines without
allowing security researchers to really test them, but at least they don't
arrest those who have been able to access and test the machines. This is a
hugely troubling move by the Indian government, and hopefully getting more
attention on such a questionable arrest will make the Indian government
regret this decision -- and open up the machines for real security
testing.
-- Mike
Masnick on the arrest of an Indian security researcher
Of course, doing so just turns it from "Running code as X gives you
root" to "Running code as X gives you root the moment someone types in a
root password, even if they're on a different terminal". I accept that
this is a barrier, but the only real solution is to have each X session
run as a different user - and that requires Linux to gain revoke()
support.
-- Matthew Garrett on why X still runs as root
