MIT Wasn’t Only One Auditing Voatz – Homeland Security Did Too, With Fewer Concerns

The Department of Homeland Security (DHS) found a number of security vulnerabilities in Voatz’s technical infrastructure during a cybersecurity audit of the mobile voting app vendor’s Boston headquarters, according to a newly declassified report obtained by CoinDesk.

However, the DHS report, conducted by a Hunt and Incident Response Team with the department’s Cybersecurity and Infrastructure Security Agency (CISA) also determined Voatz had no active threats on its network during the week-long operation, conducted in September. It developed a series of recommendations to further boost Voatz’s security. Voatz has since addressed those recommendations.

The CISA report was shared with CoinDesk hours after a technical paper by MIT researchers claimed to detail a number of major vulnerabilities in the Medici-backed Voatz’s app, including allegations the app leaves voters’ identities open to adversaries and that ballots can be altered.

Related: Meet the Crypto Angel Investor Running for Congress in Nevada

The MIT report, published Thursday by graduate students Michael Specter and James Koppel and principal research scientist Daniel Weitzner, further alleges the app has limited transparency, a claim also raised by a number of security researchers.

“Our findings serve as a concrete illustration of the common wisdom against Internet voting, and of the importance of transparency to the legitimacy of elections,” the MIT researchers said in the report.

However, the CISA audit, which focuses less on the app itself and more on Voatz’s internal network and servers, draws a different conclusion. The DHS investigators wrote that while they found some issues that could pose future concerns to Voatz’s networks, overall the team “commends Voatz for their proactive measures” in monitoring for potential threats.

The two reports paint contrasting pictures of how the company, whose app has been used in pilot programs and live elections in West Virginia, Colorado and Utah, approaches voting security. Further, at least one election official overseeing the Voatz app rollout believes the MIT study is missing data in its evaluation.

Related: Overstock CEO: Crypto Investments Are Ready for Prime Time

The MIT researchers did not return a request for comment by press time.

MIT findings

The MIT report relies on a reverse engineering of the Voatz app and reimplemented “clean room” server, according to the researchers, who did not interact with Voatz’s live servers or its purported blockchain back end.

They found privacy vulnerabilities and a wealth of potential avenues for attack in the app. Adversaries could infer user vote choice, corrupt the audit trail and even change what appeared on the ballot, the researchers said.