{"id":10995,"date":"2018-08-28T23:20:44","date_gmt":"2018-08-28T23:20:44","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/"},"modified":"2018-08-28T23:20:44","modified_gmt":"2018-08-28T23:20:44","slug":"voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/","title":{"rendered":"Voting machine maker claims hacking competitions a &#8216;green light&#8217; for foreign hackers"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/08\/13\/hacking1.jpg?x=1200&amp;y=794\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Voting machine vendor ES&amp;S says it did not cooperate with the Voting Village hacking competition at DEF CON because it worried the event posed a national security risk.<\/p>\n<p>This according to a letter the company sent to four US senators in response to inquiries about why the company was dismissive of the event and <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/08\/13\/defcon_election_vote_hacking\/\">its findings<\/a> of huge security holes in many of the systems state and local governments use to record and tally votes.<\/p>\n<p>Among the vendors singled out was ES&amp;S, sparking Senators Kamala Harris (D-CA), Mark Warner (D-VA), Susan Collins (R-ME) and James Lankford (R-OK) to express concern that ES&amp;S wasn\u2019t serious about security.<\/p>\n<p>\u201cWe are disheartened that ES&amp;S chose to dismiss these demonstrations as unrealistic nd that your company is not supportive of independent testing,\u201d <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.harris.senate.gov\/imo\/media\/doc\/August%2022%202018%20-%20Letter%20to%20ESS.pdf\">the letter<\/a> [PDF] reads.<\/p>\n<p>\u201cWe believe that independent testing is one of the most effective ways to understand and address potential cybersecurity risks.\u201d<\/p>\n<h3 class=\"crosshead\"><span>Nothing to see here, move along<\/span><\/h3>\n<p>Earlier this week, ES&amp;S provided the senate with a <a target=\"_blank\" href=\"https:\/\/regmedia.co.uk\/2018\/08\/28\/essresponseletter.pdf\">response letter<\/a> [PDF] arguing that, while it is happy to work with outside researchers, it feels the DEF CON competition was doing more harm than good.<\/p>\n<p>\u201cAll informed observers and participants in protecting America agree that our nation\u2019s critical infrastructure is under attack by nation-states, cybercriminals, and professional and amateur hackers. That\u2019s why forums open to anonymous hackers must be viewed with caution, as they may be a green light for foreign intelligence operatives who attend for purposes of corporate and international espionage,\u201d ES&amp;S said.<\/p>\n<p>\u201cWe believe that exposing technology in these kinds of environments makes hacking elections easier, not harder, and we suspect that our adversaries are paying very close attention.\u201d<\/p>\n<p>Security researchers, however, aren\u2019t buying it. Among those to blast the letter was Voting Village co-founder and Princeton University Professor Matt Blaze, who issued a scathing rebuttal on Twitter.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\" readability=\"7.025641025641\">\n<p lang=\"en\" dir=\"ltr\">We bought a bunch of surplus voting machines on eBay and put them in a room. I believe many of our foreign adversaries already have eBay capability, so perhaps it would be prudent to use election equipment that can withstand eBay-based threats. <a href=\"https:\/\/t.co\/SYsVEH2etX\">https:\/\/t.co\/SYsVEH2etX<\/a><\/p>\n<p>\u2014 matt blaze (@mattblaze) <a href=\"https:\/\/twitter.com\/mattblaze\/status\/1034097380810018816?ref_src=twsrc%5Etfw\">August 27, 2018<\/a><\/p><\/blockquote>\n<p>Rob Joyce, the former head of the NSA&#8217;s elite Tailored Access Operations hacking squad (and <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/01\/22\/rob_joyce_hacking\/\">noted Christmas light enthusiast<\/a>) took to his persoanl Twitter feed to back Blaze up and expressed support for the hackers whose loyalty was questioned by ES&amp;S.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\" readability=\"9.4565217391304\">\n<p lang=\"en\" dir=\"ltr\">Ignorance of insecurity does not get you security. We need to examine voting machines, SCADA systems, IOT and other important items in our lives. The investigation of these devices by the hacker community is a service, not a threat.<\/p>\n<p>\u2014 Rob Joyce (@RGB_Lights) <a href=\"https:\/\/twitter.com\/RGB_Lights\/status\/1034416417708363776?ref_src=twsrc%5Etfw\">August 28, 2018<\/a><\/p><\/blockquote>\n<p>The exchange threatens to overshadow a larger security effort <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/08\/27\/security_roundup\/\">ES&amp;S kicked off<\/a> last week to improve both its hardware and system security as well as its reputation in the infosec space by better integrating with both government cybersecurity agencies and private research operations.<\/p>\n<p>This embarrassing exchange is, to say the least, particularly bad timing for the vendor. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1787\/-6625\/following-bottomlines-journey-to-the-hybrid-cloud?td=wptl1787\">Following Bottomline\u2019s journey to the Hybrid Cloud<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/08\/28\/voting_machine_hacking\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NSA code cracker says no, hackers performing a service Voting machine vendor ES&amp;S says it did not cooperate with the Voting Village hacking competition at DEF CON because it worried the event posed a national security risk.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":10996,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-10995","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Voting machine maker claims hacking competitions a &#039;green light&#039; for foreign hackers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Voting machine maker claims hacking competitions a &#039;green light&#039; for foreign hackers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-28T23:20:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"794\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Voting machine maker claims hacking competitions a &#8216;green light&#8217; for foreign hackers\",\"datePublished\":\"2018-08-28T23:20:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/\"},\"wordCount\":545,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/\",\"name\":\"Voting machine maker claims hacking competitions a 'green light' for foreign hackers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers.jpg\",\"datePublished\":\"2018-08-28T23:20:44+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers.jpg\",\"width\":1200,\"height\":794},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Voting machine maker claims hacking competitions a &#8216;green light&#8217; for foreign hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Voting machine maker claims hacking competitions a 'green light' for foreign hackers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Voting machine maker claims hacking competitions a 'green light' for foreign hackers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-28T23:20:44+00:00","og_image":[{"width":1200,"height":794,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Voting machine maker claims hacking competitions a &#8216;green light&#8217; for foreign hackers","datePublished":"2018-08-28T23:20:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/"},"wordCount":545,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/","url":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/","name":"Voting machine maker claims hacking competitions a 'green light' for foreign hackers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers.jpg","datePublished":"2018-08-28T23:20:44+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers.jpg","width":1200,"height":794},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-claims-hacking-competitions-a-green-light-for-foreign-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Voting machine maker claims hacking competitions a &#8216;green light&#8217; for foreign hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=10995"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10995\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/10996"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=10995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=10995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=10995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}