Interesting discussion of how to use public-key encryption tools to create software serial numbers (and, incidentally, another object lesson in why SHA-1 being broken is important).
Security researchers, commissioned by the state of California, report that they can compromise each of three major e-voting systems in a number of different ways, including overwriting firmware and bypassing server clients to directly access the vote database.
Leave a Reply
If your comment doesn't appear right away, it was probably eaten by our spam-killing bot. If your comment was not, in fact, spam (and if you're actually reading this, it probably wasn't), please send me an email and I'll try to extricate your comment from our electronic spam purgatory.