Michael A. Specter 👻
banner
mikespecter.com
Michael A. Specter 👻
@mikespecter.com
| Assistant Professor, CS @ Georgia Tech |
| Research Scientist @ Google |
| Prev: PhD in EECS from MIT |
| mikespecter.com |
I’m begging here: elections officials should be proactively asking for help from security researchers in calls like this.

Analysis should be done, and the system should be public before announcing adoption.

Doing it this way forces bad press that I don’t want to give. It’s bad for democracy.
November 13, 2025 at 4:55 PM
In any case this system should have been published before a launch was announced.

If I take a look and find vulnerabilities, will Alaska stop the deployment? Can they? Or would doing so cause too much harm and reputational risk?
November 13, 2025 at 4:55 PM
Second, for elections, an attacker’s goal might be different than just causing a secret change in outcome

Perhaps it’s stopping a certain population from voting.

Or the goal may be causing chaos and weakening trust. E.g. What would happen if the system were just knocked offline on Election Day?
November 13, 2025 at 4:55 PM
The article also quotes, unchallenged, Estonia’s election director: “can you compromise it in such a way that the monitoring you’ve got in place wouldn’t detect it”

First, vulns often would not have been detectable. Whatever this system is, it’s likely got flaws. Most deployed systems do.
November 13, 2025 at 4:55 PM
I am aware of no advances in “cloud technology” that fix inherent problems in internet voting.

“Paper backups” also fail to fix much of anything—a malicious or broken into system can ignore the voter’s selections and print whatever it wants.
November 13, 2025 at 4:55 PM
This includes Estonia’s system, as quoted in the article.

estoniaevoting.org
Independent Report on E-voting in Estonia | A security analysis of Estonia's Internet voting system by international e-voting experts.
estoniaevoting.org
November 13, 2025 at 4:55 PM
Time and again, Internet voting in practice has been shown to introduce significant vulnerabilities in elections.

To my count, there have been five systems piloted in real world elections.

Once researchers examined them, all have had significant flaws that would overturn the election.
November 13, 2025 at 4:55 PM
“Security experts say that while nothing on the internet can be completely impenetrable from hacking, advances in cloud-based technology, as well as linking mobile voting to a paper backup system, could help alleviate some of the concerns”

This is incorrect, and no security expert was quoted.
November 13, 2025 at 4:55 PM
October 2, 2025 at 10:37 PM
“We use the UK form “factorise” here in place of the US variants “factorize” or “factor” in order to avoid the 40%
tariff on the US term.”
October 2, 2025 at 10:36 PM
“...We refer to an abacus as “an abacus” rather than a digital computer, despite the fact that it relies on digital manipulation to effect its computations. Finally, we refer to a dog as “a dog” because even the most strenuous mental gymnastics can’t really make it sound like it’s a computer.”
October 2, 2025 at 10:36 PM
Hey all!

This research is from my group at Georgia Tech, our paper with technical details is here: mikespecter.com/assets/pdf/t...
mikespecter.com
September 30, 2025 at 3:27 AM
Oh, and subsequent reporting in the verge, with comments from @evacide.bsky.social

www.theverge.com/news/787836/...
Tile’s lack of encryption could make tracker owners vulnerable to stalking
Its anti-stalking features are reportedly too easy to circumvent.
www.theverge.com
September 30, 2025 at 3:23 AM
Thanks Sarah!
September 29, 2025 at 4:43 PM
Here’s a link to the full paper!
mikespecter.com/assets/pdf/t...
mikespecter.com
September 29, 2025 at 4:42 PM
Thanks!
September 29, 2025 at 2:55 PM
BTW, the lead author is Akshaya Kumar, a fantastic PhD student at GT: akumar805.github.io
Akshaya Kumar
akumar805.github.io
September 29, 2025 at 1:53 PM
Excellent article! Also, for those interested in the nerdy details, check out the paper here:

bsky.app/profile/did:...
Today, my research group @ Georgia Tech released a paper on vulnerabilities in Tile --- the second largest device finding network after Apple's AirTags.

You can read about it in Wired, reporting by @kimzetter.bsky.social!
www.wired.com/story/tile-t...
September 29, 2025 at 1:48 PM
- Tile's servers can track all users at all times, acting as a mass surveillance network
- Tile's anti-theft mode turns off stalking alerts, which is itself easily circumvented
- Tile's design makes it possible for RF adversaries to stalk users

Full paper: mikespecter.com/assets/pdf/t...
mikespecter.com
September 29, 2025 at 1:45 PM