Every digital platform faces some kind of threat, either due to bugs or human intervention. When it comes to the application which is used to determine important aspects through voting, it needs to be verified before carrying out the process. Cybersecurity experts from different parts of the world have been working to explore the various features of the online voting application. The company makes it harder for those Security researchers to decode the vulnerabilities as many might know that these operations are carried forward to use these applications to take forward in the US election process. Though many political leaders have opposed the move to use these kinds of mobile-based applications for casting their votes, current scenarios that arose due to pandemic increases the need for a different solution for different problems.
Boston-based e-voting company, Voatz has been working on developing mobile applications that helps the users in casting their vote through a mobile application. In recent interviews, the company has claimed that unauthorized research over the application might lead to the hacks/attacks, which eventually results in unpredicted results and conclusions. It has also claimed that the process should be carried out under the authorized manner, which helps the company preventing hacks and other vulnerable activities. During one of the research experiments that has been carried out recently, Voatz has argued against the researchers from MIT who claims to have found issues in their mobile voting software application.
To ensure the security of the mobile application, the company has carried out bug-bounty programs. This program was carried directly under direct collaboration with Voatz. Based on the results that ethical hackers failed to enter, the system was said useless by the developing company. This is not only the first time that the company has carried out such programs to test their vulnerability, but they have carried out many such programs involving students and experts in the field of digital security to work on the application. Things to be noted is that all these research experiments are carried out under strict terms and conditions. Only the results of these experiments are announced, whereas the methods used for testing the security of these applications are untold to prevent malicious activities.
Laws are framed for supervising such acts using the application for the illegal entry. Security researched always goes against the law that enforces the risk involved in violating the Computer Fraud and Abuse Act (CFAA). This law came into existence in 1986, soon after the development of the digital mediums. It’s noted that this law also restricts the users in sharing the password to others, which are considered as the CFAA violation. Security researchers who have worked on finding the flaws in the mobile voting application have requested the supreme court to protect their work from the CFAA.
On briefing, which took place in July,8,2020 researchers made a statement to the supreme court that to discover security vulnerabilities hidden in the digital system requires accessing the computer system in an unanticipated manner framed by the development company on a frequent trail to bring out the hidden bugs in the system. Department of Homeland Security requested the hackers to find the error which predicted to occur during the election process. In the past, voting machine vendors have expressed their uncertainty over the voting machine, which holds a software program that helps the authorities in calculating the registered voters. To put an end to these kinds of unanswered questions major election vendor ES&S came forward and started giving room for the hackers to carry forward their penetration testing on voting machines.