The lines are long for early voting at every polling location in Fort Bend County early Tuesday, but it’s not just because of the increased turnout.
County officials are working to fix a technical glitch that prevented the polls from opening at their scheduled time of 8 a.m.
County leaders said the machines didn’t have today’s date programmed so they wouldn’t work when the polls opened.
“They were not programmed to start this morning. And that had to be reprogrammed,” Fort Bend County District Attorney Brian Middleton said.
He said they are investigating whether it was intentional, but said it could be because they’re using “state-of-the-art machines” for only the second time.
The delays came on the first day of early voting.
“I was extremely disappointed with the technical issues,” In a tweet just after 9 a.m., County Judge KP George. “Those who are responsible will be held accountable. In an era voter where suppression is real, I will authorize a full investigation and call for accountability.”
INTERACTIVE MAP: Where you can vote early in Fort Bend County
Many voters from Sugar Land to Missouri City told KHOU 11 they lined up extra early to vote and stood in line for nearly two hours before being told the polls were not opening on time.
My friend Marlon in Fort Bend county just waited 7 HOURS in line to vote due to avoidable technical errors that forced many to leave before casting their ballots. Join me in supporting Fort Bend county judge @JudgeKPGeorge’s effort to extend voting hours to make up for lost time. pic.twitter.com/P1BPs9P7ag
— Beto O’Rourke (@BetoORourke) October 13, 2020
Beto O’Rourke tweeted photos of an elderly man with a
The popular LGBT+ hook-up app Grindr has fixed a glaring security flaw that allowed hackers to take over any account if they knew the user’s registered email address, TechCrunch reports.
Wassime Bouimadaghene, a French security researcher, originally uncovered the vulnerability in September. But after he shared his discovery with Grindr and was met with radio silence, he decided to team up with Australian security expert Troy Hunt, a regional director at Microsoft and the creator of the world’s largest database of stolen usernames and passwords, Have I Been Pwned?, to draw attention to an issue that put Grindr’s more than 3 million daily active users at risk.
Hunt shared these findings with the outlet and on his website Friday, explaining that the problem stemmed from Grindr’s process for letting users reset their passwords. Like many social media sites, Grindr uses account password reset tokens, a single-use, machine-generated code to verify that the person requesting a new password is the owner of the account. When a user asks to change their password, Grindr sends them an email with a link containing the token that, once clicked, lets them reset their password and regain access to their account.
However, Bouimadaghene discovered a serious issue with Grindr’s password reset page: Instead of solely sending the password reset token to a user’s email, Grindr also leaked it to the browser. “That meant anyone could trigger the password reset who had knowledge of a user’s registered email address, and collect the password reset token from the browser if they knew where to look,” TechCrunch reports.
In short, just by knowing the email address a user had associated with their Grindr account, a hacker could easily create their own clickable