
Episode 2295 Scott Adams: CWSA 11/17/23
Real Coffee with Scott Adams
00:00
Vulnerabilities in Voting Machines
This chapter discusses the vulnerabilities of the election system, specifically regarding the audit logs and the possibility of changing them. It explores the potential for hackers to manipulate vote totals and audit logs, as well as the concerning fact that a single person with access to a machine or poll worker's card can obtain the cryptographic keys to manipulate election results.
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.