What are the ways these machines can be exploited? Root Passwords given out? Hacking with thumb drives? Network Security?
Also, there should be a way to get neutral officials to handle the voting process and counting of ballots.
What are the ways these machines can be exploited? Root Passwords given out? Hacking with thumb drives? Network Security?
Also, there should be a way to get neutral officials to handle the voting process and counting of ballots.