News
The Wi-Fi network the machines use is encrypted with wired equivalent privacy, an algorithm so weak that it takes as little as 10 minutes for attackers to break a network's encryption key.
Voting machines are key physical targets in election fraud schemes. At the DEF CON hacking conference, cybersecurity experts have been working to safeguard them.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results