The issue isn't this device. It's said that if you have physical access to a device, you can compromise it. The post discusses what could happen if someone has access to the computers that do central tabulation. If an attacker already has access, it doesn't matter if they have one of these or not.
Comments