{"id":26349,"date":"2019-03-25T03:49:00","date_gmt":"2019-03-25T03:49:00","guid":{"rendered":"http:\/\/0de114b8-ad53-4414-a115-90bb4b3e463f"},"modified":"2019-03-25T03:49:00","modified_gmt":"2019-03-25T03:49:00","slug":"nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/","title":{"rendered":"NSW Electoral Commission claims it is safe from second SwissVote flaw"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2018\/04\/12\/2028e792-3522-47d5-aceb-c687b41b26a7\/thumbnail\/770x578\/ee7d1f0ed6a94c083741e31e84e9d119\/election-vote-carousel620.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The New South Wales Electoral Commission (NSWEC) has released a statement in response to a group of researchers detailing a <a href=\"https:\/\/pursuit.unimelb.edu.au\/articles\/what-a-second-flaw-in-switzerland-s-svote-means-for-nsw-s-ivote\" target=\"_blank\" rel=\"noopener noreferrer\">second flaw<\/a> in the electronic voting system it uses, saying it is confident it has not been affected.<\/p>\n<p>Security researchers Sarah Jamie Lewis, Olivier Pereira, and Vanessa Teague described the new flaw that could allow vote tampering in the Swiss Internet voting system, which is the same system used by NSWEC.<\/p>\n<p>The researchers, who earlier this month <a href=\"https:\/\/www.zdnet.com\/article\/nsw-electoral-commission-claims-physical-separation-mitigates-swiss-voting-flaw\/\">found a flaw<\/a> in the proof the SwissPost system uses to prevent electoral fraud, have discovered another method that could be exploited to result in a tampered election outcome.<\/p>\n<p>&#8220;We have recently discovered a second, independent method by which a proof mechanism in sVote could be subverted to prove an election outcome that has actually been manipulated,&#8221; they wrote.<\/p>\n<p>The second flaw follows the first, which was essentially a trapdoor &#8212; a flaw in the mixnet component that shuffles votes in an effort to remove the ability to link votes to individual electors.<\/p>\n<p>According to the researchers, the SwissPost system offers one form of verifiability, called complete verifiability, which means that any manipulation should be detectable unless all but one part of the system colludes to cheat.<\/p>\n<p>&#8220;In the SwissPost system, encrypted electronic votes are shuffled to protect individual vote privacy. Each server shuffling votes is supposed to prove that the set of input votes it gets correspond exactly to the differently-encrypted votes it outputs,&#8221; they continued.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The next step after shuffling, the researchers explained, is decrypting the votes. But the cryptographic construct in place for the Swissvote System, a zero knowledge proof, has now been highlighted by the researchers as &#8220;not sound&#8221;.<\/p>\n<p>&#8220;Our research has found that this proof is not sound. It&#8217;s possible to generate a proof that passes verification, but changes the contents of the encrypted vote,&#8221; they said. &#8220;It&#8217;s a little like leaving the ballot box observable all through polling day, yet somehow managing to slip different votes into the count.&#8221;<\/p>\n<p>After hearing of the second flaw, NSWEC said its system has not been affected.<\/p>\n<p>&#8220;Based on its assessment of the information supplied by these academics, the NSW Electoral Commission is confident that the new issue they describe in the Swiss Post system is not relevant to the iVote system,&#8221; the state government entity said.<\/p>\n<p>It also previously claimed it was unaffected by the first flaw because its mixnet was not connected to any systems and was &#8220;securely housed&#8221; at the NSWEC.<\/p>\n<p>NSWEC said a patch addressing the first issue has been installed.<\/p>\n<p>The Commission said on Saturday that over 207,000 people had used iVote for the NSW state election.<\/p>\n<p>The researchers took the opportunity to highlight that it only became aware of the issues potentially affecting the iVote system thanks to the code used by the Swiss system being made available.<\/p>\n<p>&#8220;It&#8217;s lucky that a problem in iVote could be discovered by inspecting the Swiss code, because the iVote code is available only under very restrictive terms that would not have allowed us to analyse the code and publish our findings promptly,&#8221; they wrote.<\/p>\n<p>&#8220;Open, public review is important even for systems that are intended to be verifiable, because the voters and candidates need to be convinced that it will not seem to verify something that is wrong. Otherwise, the risk of undetectable electoral fraud remains, because of the risk that the verification mechanism itself might be manipulated.&#8221;<\/p>\n<p>Teague later on Monday highlighted that it is illegal for a voter registered in NSW to be educated on how their voting system works.&nbsp;<\/p>\n<p>&#8220;I wonder how many NSW voters realise it&#8217;s a crime for someone to tell them the details of how their voting system works. Do you go to jail for publishing the Swiss code if it happens to overlap with iVote? This law serves vendor interests at the expense of NSW democracy,&#8221; she <a href=\"https:\/\/twitter.com\/VTeagueAus\/status\/1110027010363940865\" target=\"_blank\" rel=\"noopener noreferrer\">wrote in a tweet<\/a>.<\/p>\n<p>The researcher pointed to a the NSW <em>Electoral Act 2017<\/em>, under section 159: Secrecy relating to technology assisted voting that states:&nbsp;<\/p>\n<blockquote readability=\"12\">\n<p>A person must not disclose to any other person any source code or other computer software that relates to technology assisted voting under the approved procedures, except in accordance with the approved procedures or in accordance with any arrangement entered into by the person with the Electoral Commissioner.<\/p>\n<p>Maximum penalty: 200 penalty units or imprisonment for 2 years, or both. &nbsp;<\/p>\n<\/blockquote>\n<p>In 2015, Teague was part of a team that discovered iVote was&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/nsw-ivote-vulnerability-overstated\/\">susceptible to the FREAK vulnerability<\/a>.<\/p>\n<p><em><strong>Updated Monday March 25 at 4.50pm AEDT:<\/strong> Added tweet from Vanessa Teague and detail from the NSW Electoral Act.<\/em><\/p>\n<h3>RELATED COVERAGE<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers have found another flaw in the SwissVote system, while the NSW Electoral Commission is once again confident the issue is not relevant to the iVote system.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26350,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-26349","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NSW Electoral Commission claims it is safe from second SwissVote flaw 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NSW Electoral Commission claims it is safe from second SwissVote flaw 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-25T03:49:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"NSW Electoral Commission claims it is safe from second SwissVote flaw\",\"datePublished\":\"2019-03-25T03:49:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/\"},\"wordCount\":784,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/\",\"name\":\"NSW Electoral Commission claims it is safe from second SwissVote flaw 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw.jpg\",\"datePublished\":\"2019-03-25T03:49:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NSW Electoral Commission claims it is safe from second SwissVote flaw\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NSW Electoral Commission claims it is safe from second SwissVote flaw 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/","og_locale":"en_US","og_type":"article","og_title":"NSW Electoral Commission claims it is safe from second SwissVote flaw 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-25T03:49:00+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"NSW Electoral Commission claims it is safe from second SwissVote flaw","datePublished":"2019-03-25T03:49:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/"},"wordCount":784,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/","url":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/","name":"NSW Electoral Commission claims it is safe from second SwissVote flaw 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw.jpg","datePublished":"2019-03-25T03:49:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"NSW Electoral Commission claims it is safe from second SwissVote flaw"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26349"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26349\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26350"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}