October 14, 2024 at 10:35AM
With less than a month until the presidential election, the Trump campaign is investing in secure technology from Green Hills Software to prevent hacking. This includes unhackable phones and computers using the high-security Integrity-178B operating system, aimed at ensuring election integrity amid concerns over previous intrusions.
### Meeting Takeaways:
1. **Investment in Secure Technology**: The Trump campaign is proactively investing in secure technology to prevent hacking incidents ahead of the upcoming presidential elections.
2. **Collaboration with Green Hills Software**: The campaign has partnered with Green Hills Software, which has provided highly secure phones and computers designed to prevent data breaches.
3. **Operating System Features**:
– The devices utilize the Green Hills Integrity-178B operating system, known for its use in military aircraft like the B-2 bomber and F-35 fighter.
– This OS is one of the few commercially available systems certified to Evaluation Assurance Level 6, indicating a high level of security.
4. **Security Protocols**:
– The operating system is built with approximately 10,000 lines of code and undergoes rigorous penetration testing by a dedicated team.
– Green Hills Software maintains a strong code review process, investing heavily in security from the outset.
5. **Claims of Immutability**:
– Green Hills asserts its technology is immune to zero-click threats, such as those posed by the NSO group’s Pegasus software.
– The CEO, Dan O’Dowd, claims the devices are “unhackable.”
6. **Challenges and Concerns**:
– Despite the claims of robustness, some experts suggest no software can be completely secure from persistent threats.
– There is potential interest from the Green Hills team to extend their technology’s application to election systems to enhance their security.
7. **Emphasis on Election Security**: O’Dowd highlighted the need for the same security standards applied in military contexts to be utilized in electoral processes, reflecting concerns over the integrity of voting systems.
8. **Ongoing Vigilance Required**: As the election approaches, the practical efficacy of these security measures will be tested, given historical vulnerabilities in election systems.
These takeaways capture the essence of the meeting and the key points raised regarding technological security in the context of the upcoming presidential election.