As we’ve already seen with exfiltrated voter registration databases and the endless methods of poisoning manufacturer updates, manipulating DRE and optical scan machines and bypassing air gap defense, the state election official’s illusion of security is being pummeled by the reality of cyberattack.
James Scott