• 1 Post
  • 18 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle










  • When I think of “stuffing” I think of people creating wholly illegitimate ballots, which does not seem to be what happened here.

    That’s exactly what ballot stuffing is and why what these folks are charged with is not ballot stuffing:

    https://ballotpedia.org/Ballot_stuffing

    Ballot stuffing or ballot box stuffing is a form of electoral fraud in which a greater number of ballots are cast than the number of people who legitimately voted. The term refers generally to the act of casting illegal votes or submitting more than one ballot per voter when only one ballot per voter is permitted.[1]

    If the absentee ballots they handled were either fabricated or if the voters they were from already voted, then yes it would be “ballot stuffing” but I didn’t see that in the article. Just “mishandling”.

    Still best that absentee ballots are handled properly as to show the voter hasn’t voted in person.





  • Do a search for you server OS + STIG

    Then, for each service you’re hosting on that server, do a search for:

    Service/Program name + STIG/Benchmark

    There’s tons of work already done by the vendors in conjunction with the DoD (and CIS) to create lists of potential vulnerable settings that can be corrected before deploying the server.

    Along with this, you can usually find scripts and/or Ansible playbooks that will do most of the hardening for you. Though it’s a good Idea to understand what you do and do not need done.