{"id":50,"date":"2006-10-05T22:07:53","date_gmt":"2006-10-05T20:07:53","guid":{"rendered":"http:\/\/blackbag.toool.nl\/?p=50"},"modified":"2006-10-06T08:52:08","modified_gmt":"2006-10-06T06:52:08","slug":"the-keys-to-democracy","status":"publish","type":"post","link":"https:\/\/blackbag.toool.nl\/?p=50","title":{"rendered":"The keys to democracy &#8230;"},"content":{"rendered":"<p>The sh*t has hit the fan!<\/p>\n<p>\u00c3\u201a\u00c2\u00a0<img decoding=\"async\" title=\"a126 \" alt=\"a126 \" src=\"http:\/\/blackbag.toool.nl\/images\/nedap-clones.jpg\" \/><\/p>\n<p>We came out in the open about research we conducted on a couple of<br \/>\nNedap ES3B voting computers we got our hand on. Behind the scenes we<br \/>\nhave been working hard for the last five weeks to reverse engineer and<br \/>\nhack these devices. It was quite a project, but since of yesterday the<br \/>\nworld knows about it. A <a title=\"Nedap Groenendaal ES3B voting computer security analysis\" href=\"http:\/\/www.wijvertrouwenstemcomputersniet.nl\/images\/9\/91\/Es3b-en.pdf\">whitepaper<\/a> is available online for you to read<br \/>\nour conclusions. And besides that we also decided to trow all <a title=\"black box more transparent\" href=\"http:\/\/www.wijvertrouwenstemcomputersniet.nl\/Nedap\">Nedap<br \/>\nsoftware, rom dumps and internal documentation online<\/a>. Just for the<br \/>\npublic to see what it is they are voting on&#8230;.<\/p>\n<p>The juicy part: about the keys \u00c3\u00a2\u00e2\u201a\u00ac\u00c2\u00a6. If you read Dutch law about the<br \/>\nrequirements concerning voting they mention several times the<br \/>\nimportance of the voting computers key. The head of the ticket office<br \/>\nmust carry this key with him at all times, and when the elections<br \/>\nclose it has to be stored in a sealed envelope. When Nedap learned we<br \/>\nwhere after their device they send out an emergency letter to each<br \/>\nmunicipality to store the keys to these voting computers in a safe.<\/p>\n<p>I was heavily disappointed when I finally got my hands on these keys.<\/p>\n<p>Just a very, very, simple four lever key and no use of anti-manipulation<br \/>\nor anti-copy technology. It was no problem to have the key copied in<br \/>\nthe first lock shop I entered. Anyone with five minutes of instruction<br \/>\n(or less) could learn how to pick or bypass this lock.<\/p>\n<p><a title=\"Order now!\" href=\"http:\/\/www.google.nl\/search?q=115140126+C%26K\"><img decoding=\"async\" title=\"nedap A126 C&#038;K key\" alt=\"nedap A126 C&#038;K key\" src=\"http:\/\/blackbag.toool.nl\/images\/nedap-key.jpg\" \/><\/a><\/p>\n<p>All three Nedap voting computers we examined came with a sets of<br \/>\nidentical keys. So all keys where the same, and one of these keys could<br \/>\noperate all these computers. We can safely assume one key can operate<br \/>\nall 8.000 Nedap voting computers in use in the Netherlands. Other<br \/>\nproof of this claim is that the keys are nickled over, meaning they<br \/>\nwere mass-produced with the cuts already made. Something you only do<br \/>\nwhen you make large batches.<\/p>\n<p>Getting your hands on that key is simple. Order yours online now &#8230;.<br \/>\nFor just one euro you can order the key from multiple different online<br \/>\nsources. All you have to do is <a title=\"order now!\" href=\"http:\/\/www.google.nl\/search?q=115140126+C%26K\">google for &#8216;C&#038;K&#8217; and key number &#8216;A126&#8217;<\/a>.<br \/>\nLooking at the datasheet of this key you can learn its part number is<br \/>\n115140126. We ordered 100 and gave each and every journalist a<br \/>\npersonal Nedap voting computer key at the press conference we held<br \/>\nthis morning. As if you needed keys for locks like this&#8230;<\/p>\n<p><a title=\"Technical specs\" href=\"http:\/\/blackbag.toool.nl\/images\/Nedap_locks.pdf\"><img decoding=\"async\" title=\"technical drawing of key\" alt=\"technical drawing of key\" src=\"http:\/\/blackbag.toool.nl\/images\/nedap-key-tech.jpg\" \/><\/a><\/p>\n<p>\u00c3\u201a\u00c2\u00a0<\/p>\n<p>We all worked real hard on this project and I will post some more of<br \/>\nour findings in greater detail during the days to come. Stay tuned &#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The sh*t has hit the fan! \u00c3\u201a\u00c2\u00a0 We came out in the open about research we conducted on a couple of Nedap ES3B voting computers we got our hand on. Behind the scenes we have been working hard for the last five weeks to reverse engineer and hack these devices. It was quite a project, [&hellip;]<\/p>\n","protected":false},"author":171,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"_links":{"self":[{"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=\/wp\/v2\/posts\/50"}],"collection":[{"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=\/wp\/v2\/users\/171"}],"replies":[{"embeddable":true,"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=50"}],"version-history":[{"count":0,"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=\/wp\/v2\/posts\/50\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=50"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=50"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=50"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}