On Mon, 9 Oct 2006, Gary McGraw wrote:
The most interesting thing from an sc-l perspective about this column is
that it emphasizes a client need we're often forced to address---the
need for a demo exploit. Sometimes those on the receiving end of a
software security vulnerability don't
: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: [SC-L] darkreading: voting machines
Hi all,
I'm sure that many of you saw the Ed Felten and friends
break Diebold machines story a couple of weeks ago...maybe
in DDJ or on /.. I wrote a piece about the crack
Jeremy Epstein:
Interesting point. I'm on the Virginia state commission charged with making
recommendations around voting systems, and we watched the Princeton video as
part of our most recent meeting. The reaction from the election officials
was amusing and scary: if this is so real, why
, October 09, 2006 12:19 PM
To: SC-L@securecoding.org
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: [SC-L] darkreading: voting machines
Hi all,
I'm sure that many of you saw the Ed Felten and friends
break Diebold machines story a couple of weeks ago...maybe
in DDJ
Hi all,
I'm sure that many of you saw the Ed Felten and friends break Diebold
machines story a couple of weeks ago...maybe in DDJ or on /.. I wrote
a piece about the crack for darkreading, which you can find here:
http://www.darkreading.com/document.asp?doc_id=105188WT.svl=column1_1
The most