More discrepancies in voting system

No computing system is fail proof, but ask any IT audit/security practicioner – system like e voting is as critical as banking system, a thorough compliance and penetration testing should have taken place.

It is not just about Prey. It’s the overall process. I am pretty sure during development of the system, there is no proper fall back, disaster recovery, tablet security, election procedures – is opened for any possible discrepancy.

Liken this to building an online banking system using WordPress – are you not terrified?

(I was a accredited IT server/security trainer since young age and exposed to certified ethical hacking during my early days in career. Though I am now off the trade, but I am still a tech savvy guy)