Anonymous ID: 75f7e5 Dec. 3, 2020, 5:50 a.m. No.11886174   🗄️.is 🔗kun   >>6285 >>6287 >>6325 >>6454

>>11886008

>>11886132

[KNOWINGLY]

Dominion test report for California

 

Vulnerabilities

For any vulnerabilities discovered, SLI was tasked with identifying the particular standards applicable to each vulnerability. To the extent possible, reported vulnerabilities include an indication of whether the exploitation of the vulnerability would require access by:

• Voter: Usually has low knowledge of the voting machine design and configuration. Some may have more advanced knowledge. May carry out attacks designed by others. They have access to the machine(s) for less than an hour.

• Poll worker: Usually has low knowledge of the voting machine design and configuration. Some may have more advanced knowledge. May carry out attacks designed by others. They have access to the machine(s) for up to one week, but all physical security has been put into place before the machines are received.

• Elections official insider: Wide range of knowledge of the voting machine design and configuration. May have unrestricted access to the machine for long periods of time. Their designated activities include: • Setup and pre-election procedures;

• Election operation;

• Post-election processing of results; and

• Archiving and storage operations.

Vendor insider: Possesses great knowledge of the voting machine design and configuration. They have__ unlimited access__ to the machine before it is delivered to the purchaser and, thereafter, may have unrestricted access when performing warranty and maintenance service, and when providing election administration services.

 

https://votingsystems.cdn.sos.ca.gov/vendors/dominion/ds52-sc.pdf

Anonymous ID: 75f7e5 Dec. 3, 2020, 6:03 a.m. No.11886287   🗄️.is 🔗kun   >>6325 >>6454

>>11886132

 

>>11886174

Final Report

Sixty-nine discrepancies were identified within theDominion Democracy Suite 5.2 code base.

Several potential vulnerabilities were identified

within the Dominion Democracy Suite 5.2 code base, within either the ICE code base or the ICX code base. Within the Dominion Democracy Suite 5.2 ICE code base, all findings were low risk vulnerabilities that would require an in-depth knowledge of the ICE code base and how it operates to be able to successfully subvert the system. To exploit them successfully would require modifying the code before any build.

cough cough Eric Coomer

Within the Dominion Democracy Suite 5.2 ICX code base,

one potential vulnerability was discovered and the level of access required to take advantage of this potential vulnerability would be

open to a variety of actors including a voter, a poll worker, an election official insider, and a vendor insider.

This possible vulnerability has a__ more widespread potential__. Polling place procedures are one method of mitigating this issue, with poll workers actively verifying that the USB ports are sealed and no one has access. As per the direction given by the California Secretary of State, this software testing report does not include any recommendation as to whether or not the system should be approved.