Ruorc@lemmy.ml to politics @lemmy.world · 3 days agoComputer Scientists: Breaches of Voting System Software Warrant Recounts to Ensure Election Verificationfreespeechforpeople.orgexternal-linkmessage-square18fedilinkarrow-up1207arrow-down14
arrow-up1203arrow-down1external-linkComputer Scientists: Breaches of Voting System Software Warrant Recounts to Ensure Election Verificationfreespeechforpeople.orgRuorc@lemmy.ml to politics @lemmy.world · 3 days agomessage-square18fedilink
minus-squarekn33@lemmy.worldlinkfedilinkEnglisharrow-up3·2 days ago There is no such thing as “security” if someone has physical access to the device. We’ve gotten a lot closer. With fTPM, FDE, boot verification, etc. it’s become a lot more secure than it used to be.
We’ve gotten a lot closer. With fTPM, FDE, boot verification, etc. it’s become a lot more secure than it used to be.