{"id":37024,"date":"2020-09-08T17:59:32","date_gmt":"2020-09-08T17:59:32","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31552\/Online-Voting-Vendor-Voatz-Urges-Supreme-Court-To-Limit-Security-Research.html"},"modified":"2020-09-08T17:59:32","modified_gmt":"2020-09-08T17:59:32","slug":"online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/","title":{"rendered":"Online Voting Vendor Voatz Urges Supreme Court To Limit Security Research"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/09\/security-lock-computer-cyber-800x533.jpg\" alt=\"Online voting vendor Voatz urges Supreme Court to limit security research\"><figcaption class=\"caption\">\n<div class=\"caption-credit\">Traitov | Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a title=\"68 posters participating, including story author\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/tech-policy\/2020\/09\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">87<\/span> <span class=\"visually-hidden\"> with 68 posters participating, including story author<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p> <!-- cache hit 1679:single\/related:554c668e8933638fac34c2f2eae8fe5f --><!-- empty --><\/p>\n<p>The Supreme Court is considering whether to adopt a broad reading of the Computer Fraud and Abuse Act that critics say could criminalize some types of independent security research and create legal uncertainty for many security researchers. Voatz, an online voting vendor whose software was <a href=\"https:\/\/arstechnica.com\/tech-policy\/2018\/08\/experts-criticize-west-virginias-plan-for-smartphone-voting\/\">used by West Virginia<\/a> for overseas military voters in the 2018 election, argues that this wouldn&#8217;t be a problem.<\/p>\n<p>&#8220;Necessary research and testing can be performed by authorized parties,&#8221; <a href=\"https:\/\/www.supremecourt.gov\/DocketPDF\/19\/19-783\/153062\/20200903122434600_Voatz%20Amicus%20Brief.pdf\">Voatz writes<\/a> in an <em>amicus<\/em> brief to the Supreme Court. &#8220;Voatz\u2019s own security experience provides a helpful illustration of the benefits of authorized security research, and also shows how unauthorized research and public dissemination of unvalidated or theoretical security vulnerabilities can actually cause harmful effects.&#8221;<\/p>\n<p>As it happens, we covered a recent conflict between Voatz and an independent security researcher in last <a href=\"https:\/\/arstechnica.com\/tech-policy\/2020\/09\/why-experts-are-overwhelmingly-skeptical-of-online-voting\/\">Thursday&#8217;s deep dive<\/a> on online voting. And others involved in that altercation did not see it the way Voatz did.<\/p>\n<p>The &#8220;unauthorized research&#8221; Voatz complains about includes a February research paper from MIT that exposed serious security problems with the Voatz app. The lead author of the MIT study, Michael Specter, <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/specter\">presented his findings<\/a> at the prestigious, peer-reviewed Usenix Security Conference last month. And the Voatz Supreme Court brief doesn&#8217;t mention that the problems identified by the MIT team were largely <a href=\"https:\/\/blog.trailofbits.com\/2020\/03\/13\/our-full-report-on-the-voatz-mobile-voting-platform\/\">confirmed by a computer security firm called Trail of Bits<\/a> that Voatz itself hired to vet its software.<\/p>\n<p>Voatz&#8217;s decision to prolong its spat with the MIT team by weighing in on an unrelated Supreme Court case is something of a head-scratcher. The MIT team only analyzed Voatz&#8217;s Android app, not its servers. So it&#8217;s hard to see how they could have possibly violated the CFAA.<\/p>\n<p>In a statement to Ars, Voatz said it was &#8220;compelled&#8221; to file an amicus brief to the Supreme Court because it was mentioned in <a href=\"https:\/\/www.supremecourt.gov\/DocketPDF\/19\/19-783\/147214\/20200708124706913_19-783%20Amici%20Brief.pdf\">another amicus brief<\/a> in the same case. Voatz said that this earlier brief, signed by Specter and a number of other security researchers, had some factual inaccuracies the company wanted to correct.<\/p>\n<p>But Voatz also claimed that its own experience showed that independent security research was unhelpful and even counterproductive. Others argue the Voatz story shows just the opposite: that independent software analysis is essential to uncovering security problems that companies themselves might prefer to keep under wraps.<\/p>\n<p>&#8220;I think if you look at the history of security research, the vast majority I guess is what they would consider unauthorized,&#8221; Specter told Ars in a Friday phone interview. &#8220;Independent security research is important, and if you put terms and conditions on what security researchers can look at and do, you&#8217;re inherently limiting their ability to provide solid research and advice to consumers and the market about these products.<\/p>\n<p>&#8220;I vehemently do not agree&#8221; with Voatz&#8217;s take, Specter added.<\/p>\n<h2>Blurred lines<\/h2>\n<p>The amicus briefs were filed in a Supreme Court case that has nothing to do with online voting and isn&#8217;t specifically about security research. The case arose after a Georgia police officer named Nathan Van Buren was caught taking a bribe to look up confidential information in a police database. The man paying the bribe had met a woman at a strip club and wanted to confirm that she was not an undercover cop before pursuing a sexual\u2014and presumably commercial\u2014relationship with her.<\/p>\n<p>Unfortunately for Van Buren, the other man was working with the FBI, which arrested Van Buren and charged him with a violation of the CFAA. The CFAA prohibits gaining unauthorized access to a computer system\u2014in other words, hacking\u2014but also prohibits &#8220;exceeding authorized access&#8221; to obtain data. Prosecutors argued that Van Buren &#8220;exceeded authorized access&#8221; when he looked up information about the woman from the strip club.<\/p>\n<p>But lawyers for Van Buren disputed that. They argued that his police login credentials authorized him to access any data in the database. Offering confidential information in exchange for a bribe may have been contrary to department policy and state law, they argued, but it didn&#8217;t &#8220;exceed authorized access&#8221; as far as the CFAA goes.<\/p>\n<p>It&#8217;s a distinction that has had big implications in other cases. For example, back in 2010, federal prosecutors <a href=\"https:\/\/www.eff.org\/cases\/u-s-v-lowson\">criminally charged<\/a> a business called Wiseguy Tickets for automating the purchase and resale of tickets from TicketMaster in violation of TicketMaster&#8217;s terms of service. After an <a href=\"https:\/\/www.courtlistener.com\/recap\/gov.uscourts.njd.237921.53.0.pdf\">initial ruling<\/a> went against the defendants, they accepted a plea agreement.<\/p>\n<p>In 2011, federal prosecutors <a href=\"https:\/\/arstechnica.com\/tech-policy\/2012\/09\/feds-go-overboard-in-prosecuting-information-activist\/\">charged activist Aaron Swartz<\/a> under the CFAA for mass downloading paywalled academic articles from the JSTOR database via the MIT network. Swartz was arguably authorized to access MIT&#8217;s network and the JSTOR articles, but the volume of downloads violated MIT and JSTOR&#8217;s policies. <a href=\"https:\/\/arstechnica.com\/tech-policy\/2013\/01\/internet-pioneer-and-information-activist-takes-his-own-life\/\">Swartz committed suicide<\/a> before the courts ruled on his case.<\/p>\n<p>More recently, LinkedIn sued a small analytics firm called hiQ under the CFAA for scraping data from LinkedIn&#8217;s website. Last year, the 9th Circuit Court of Appeals <a href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/09\/web-scraping-doesnt-violate-anti-hacking-law-appeals-court-rules\/\">ruled for hiQ<\/a>, holding that violating LinkedIn&#8217;s terms of service does not run afoul of the CFAA.<\/p>\n<p>But the 9th Circuit&#8217;s reading of the law isn&#8217;t shared by all of the other appeals courts. If the case had been heard in some of the other circuits, hiQ could have lost the case. That&#8217;s why the Supreme Court took the case: to bring some uniformity to a law that has been interpreted differently in different parts of the country.<\/p>\n<h2>The threat to independent security research<\/h2>\n<p>Critics of a broad reading of the CFAA&#8217;s &#8220;exceeds authorized access&#8221; language argue that it will effectively criminalize many violations of a product&#8217;s terms of use. This is a particular concern for security researchers because their work frequently puts them at odds with the official policies of the companies they are evaluating.<\/p>\n<p>Companies making digital devices and software often don&#8217;t appreciate having people expose flaws in their products. They frequently have terms of service that ban practices like website scraping and reverse engineering. If violating a product&#8217;s terms of service is a criminal act under the CFAA, then important computer security research techniques might become legally hazardous.<\/p>\n<p>The <a href=\"https:\/\/www.supremecourt.gov\/DocketPDF\/19\/19-783\/147214\/20200708124706913_19-783%20Amici%20Brief.pdf\">researchers&#8217; brief<\/a> cites few instances where security researchers have actually been prosecuted, but it mentions a number of cases where they were investigated by law enforcement or threatened with lawsuits by private companies. Some researchers also say they have shied away from certain types of research due to potential legal complications.<\/p>\n<h2>\u201cWe vehemently disagree with their argument\u201d<\/h2>\n<p>This is where Voatz came in. The researchers wrote that Voatz &#8220;reported a University of Michigan student to the FBI because the student conducted research into Voatz\u2019s mobile voting app for an undergraduate election security course.&#8221;<\/p>\n<p>In its own brief, Voatz disputes that, claiming that it merely reported suspicious activity to its customer\u2014West Virginia&#8217;s secretary of state\u2014and that the state notified the FBI. The student, whose name hasn&#8217;t become public, does not seem to have been charged with a crime. But authorities apparently did <a href=\"https:\/\/www.cnn.com\/2019\/10\/04\/politics\/fbi-voting-app-hack-investigation\/index.html\">obtain a warrant<\/a> to search a student&#8217;s phone in connection with the incident.<\/p>\n<p>In its own brief, Voatz cites the MIT study as another example of independent research gone wrong. Voatz claims that &#8220;once they had identified potential vulnerabilities, the MIT researchers demanded contact information for all of Voatz customers under threat of going immediately to the press.&#8221;<\/p>\n<p>Specter says that&#8217;s flatly untrue. He says he and his colleagues never asked Voatz for customers&#8217; contact information. Indeed, he says his team had no contact at all with Voatz in the months before releasing their paper. Instead, the researchers contacted the Department of Homeland Security&#8217;s Cybersecurity and Infrastructure Security Agency with details about their findings. If anyone tried to contact Voatz&#8217;s customers, Specter said, it would have been the&nbsp;CISA, not anyone at MIT.<\/p>\n<p>And while Voatz portrays official bug-bounty testing programs as a superior alternative to unauthorized security research, Specter says that Voatz&#8217;s bug bounty program wasn&#8217;t a viable option at the time Specter began its research.<\/p>\n<p>The version of the Voatz app offered for security testing was supposed to connect to a test server, theoretically allowing researchers to observe the app in action and test the security of its network communications. But when the MIT team downloaded the test version of the app, it didn&#8217;t work. Further research led Specter to believe that the servers hadn&#8217;t been running at all.<\/p>\n<p>One of Voatz&#8217;s legal conditions also made Voatz&#8217;s official security testing program a non-starter for the MIT team. The program&#8217;s terms required researchers to give the company adequate time to patch a vulnerability before it is released publicly.<\/p>\n<p>&#8220;That sounds fine,&#8221; Specter told Ars, &#8220;but later they say in the same document [Voatz gets] to define what &#8216;reasonable time&#8217; means. Which effectively means they can take your research and say &#8216;we&#8217;re not going to patch that until this later date.'&#8221;<\/p>\n<p>Few people in the computer security community seem to agree with Voatz&#8217;s point of view. At the time the MIT team did its research, Voatz&#8217;s bug bounty program was administered by a popular security testing platform called HackerOne. But HackerOne took the unusual step of <a href=\"https:\/\/www.cyberscoop.com\/voatz-hackerone-bug-bounty-election-security\/\">severing ties with Voatz<\/a> the same month the MIT research came out.<\/p>\n<p>&#8220;After evaluating Voatz\u2019s pattern of interactions with the research community, we decided to terminate the program on the HackerOne platform,&#8221; <a href=\"https:\/\/www.cyberscoop.com\/voatz-hackerone-bug-bounty-election-security\/\">HackerOne said<\/a> in a March statement to CyberScoop. Cyberscoop said it was the first time HackerOne had done this in eight years.<\/p>\n<p>&#8220;We vehemently disagree with their argument&#8221; HackerOne CEO <a href=\"https:\/\/twitter.com\/martenmickos\/status\/1301612019909423106\">M\u00e5rten Mickos tweeted<\/a> on Thursday. Casey Ellis, the founder of Bugcrowd, another bug bounty platform mentioned in Voatz&#8217;s brief, <a href=\"https:\/\/twitter.com\/caseyjohnellis\/status\/1301637363731324930\">tweeted the same day<\/a> that the company &#8220;<span class=\"css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0\">does not agree with the tenets of the Voatz amicus brief.&#8221;<\/span><\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31552\/Online-Voting-Vendor-Voatz-Urges-Supreme-Court-To-Limit-Security-Research.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37025,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8910],"class_list":["post-37024","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusafraudflawcyberwar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Online Voting Vendor Voatz Urges Supreme Court To Limit Security Research 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online Voting Vendor Voatz Urges Supreme Court To Limit Security Research 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-08T17:59:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Online Voting Vendor Voatz Urges Supreme Court To Limit Security Research\",\"datePublished\":\"2020-09-08T17:59:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/\"},\"wordCount\":1673,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research.jpg\",\"keywords\":[\"headline,hacker,government,usa,fraud,flaw,cyberwar\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/\",\"name\":\"Online Voting Vendor Voatz Urges Supreme Court To Limit Security Research 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research.jpg\",\"datePublished\":\"2020-09-08T17:59:32+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,fraud,flaw,cyberwar\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentusafraudflawcyberwar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Online Voting Vendor Voatz Urges Supreme Court To Limit Security Research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Online Voting Vendor Voatz Urges Supreme Court To Limit Security Research 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/","og_locale":"en_US","og_type":"article","og_title":"Online Voting Vendor Voatz Urges Supreme Court To Limit Security Research 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-08T17:59:32+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Online Voting Vendor Voatz Urges Supreme Court To Limit Security Research","datePublished":"2020-09-08T17:59:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/"},"wordCount":1673,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research.jpg","keywords":["headline,hacker,government,usa,fraud,flaw,cyberwar"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/","url":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/","name":"Online Voting Vendor Voatz Urges Supreme Court To Limit Security Research 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research.jpg","datePublished":"2020-09-08T17:59:32+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/online-voting-vendor-voatz-urges-supreme-court-to-limit-security-research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,fraud,flaw,cyberwar","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusafraudflawcyberwar\/"},{"@type":"ListItem","position":3,"name":"Online Voting Vendor Voatz Urges Supreme Court To Limit Security Research"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37024"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37024\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37025"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}