1. Standalone Devices:
EVMs are not connected to the internet or any other network, which eliminates the risk of remote hacking.
Also they don't have a radio frequency (RF) to respond to Bluetooth; they are not even connected to a power socket.
EVM and VVPAT run on their own battery/ power-packs supplied by Bharat Electronics Limited / Electronics Corporation of India Limited.
2. Physical Security:
Tampering with EVMs requires physical access. The machines are sealed and stored securely, with strict protocols in place to prevent unauthorized access.
3. Randomization:
The distribution of EVMs is randomized, making it difficult to predict which machine will be used in which constituency. This further complicates any attempts at tampering.
4. One-Time Programmable Chips:
EVMs use one-time programmable chips, which means the software cannot be altered once it is programmed.
5. Independent Units:
EVMs consist of two units - the Balloting Unit (BU) and the Control Unit (CU). These units are connected only on the day of polling, and any tampering with one unit would make it incompatible with the other.
These measures collectively ensure that Indian EVMs are secure and tamper-proof, providing a reliable method for conducting elections.
********
• Key differences between US & Indian EVMs:
1. Connectivity:
Indian EVMs are designed to be tamper-proof with no network connectivity, while US EVMs have varying levels of security and some are networked making it vulnerable.
2. Standardization:
India uses a standardized EVM system nationwide, whereas the US has a decentralized approach with various types of machines
and managed separately by state election authorities.
*******
Comments
Post a Comment