Andrew Appel on New Hampshire’s Election Audit

Really interesting two part analysis of the audit conducted after the 2020 election in Windham, New Hampshire.

Based on preliminary reports published by the team of experts that New Hampshire engaged to examine an election discrepancy, it appears that a buildup of dust in the read heads of optical-scan voting machines (possibly over several years of use) can cause paper-fold lines in absentee ballots to be interpreted as votes… New Hampshire (and other states) may need to maintain the accuracy of their optical-scan voting machines by paying attention to three issues:…

Continue reading Andrew Appel on New Hampshire’s Election Audit

Websites Conducting Port Scans

Security researcher Charlie Belmer is reporting that commercial websites such as eBay are conducting port scans of their visitors. Looking at the list of ports they are scanning, they are looking for VNC services being run on the host, which is the same thing that was reported for bank sites. I marked out the ports and what they are known… Continue reading Websites Conducting Port Scans

Two new autism diagnostic tools offer objective ways to detect the condition

Two new autism detection methods are promising to offer clinicians objective diagnostic tools that are not based on subjective behavioral assessments. Both systems are in early stages of clinical verification, so not quite ready for prime tim… Continue reading Two new autism diagnostic tools offer objective ways to detect the condition

Terahertz Millimeter-Wave Scanners

Interesting article on terahertz millimeter-wave scanners and their uses to detect terrorist bombers. The heart of the device is a block of electronics about the size of a 1990s tower personal computer. It comes housed in a musician’s black case, akin to the one Spinal Tap might use on tour. At the front: a large, square white plate, the terahertz… Continue reading Terahertz Millimeter-Wave Scanners

Google Login Security for High-Risk Users

Google has a new login service for high-risk users. it’s good, but unforgiving. Logging in from a desktop will require a special USB key, while accessing your data from a mobile device will similarly require a Bluetooth dongle. All non-Google services … Continue reading Google Login Security for High-Risk Users

Google Login Security for High-Risk Users

Google has a new login service for high-risk users. It’s good, but unforgiving. Logging in from a desktop will require a special USB key, while accessing your data from a mobile device will similarly require a Bluetooth dongle. All non-Google services and apps will be exiled from reaching into your Gmail or Google Drive. Google’s malware scanners will use a… Continue reading Google Login Security for High-Risk Users

Backslash Powered Scanning: Hunting Unknown Vulnerability Classes

Abstract
Existing web scanners search for server-side injection vulnerabilities by throwing a canned list of technology-specific payloads at a target and looking for signatures – almost like an anti-virus. In this document, I’ll share the conception a… Continue reading Backslash Powered Scanning: Hunting Unknown Vulnerability Classes

Backslash Powered Scanning: Hunting Unknown Vulnerability Classes

Abstract
Existing web scanners search for server-side injection vulnerabilities by throwing a canned list of technology-specific payloads at a target and looking for signatures – almost like an anti-virus. In this document, I’ll share the conception a… Continue reading Backslash Powered Scanning: Hunting Unknown Vulnerability Classes