Skip to main content
  1. Home
  2. Computing
  3. Web
  4. News

No one is taking the blame for leaking the registration info of 191 million US voters

Add as a preferred source on Google

Someone left 300 gigabytes of voter registration data sitting out on the Web, and no one seems to want to take responsibility for it. The database includes the voter registration information for over 191 million American voters, and is ripe for abuse by scammers, marketers, and basically anyone who wants the personal address and phone number of anyone registered to vote.

Included in the user data is sensitive information like names, addresses, political affiliation, phone numbers, voting records, and email address, depending on how much you provided when you registered to vote. Thankfully, it doesn’t include Social Security numbers or other information that’s useful for identity theft, but is still useful to scammers and telemarketers, who can’t normally use voter databases for marketing purposes.

Recommended Videos

The data was found by a white hat hacker, Chris Vickery, who says the database is still available for download, although he obviously doesn’t detail how to go about finding it. Vickery includes a redacted screenshot with his own information from the database in the report on Databreach.net. The report blames a misconfigured database for the malfunction.

Granted, the information included in the database isn’t necessarily confidential depending on what state you’re in. While some states put strict regulations on access and use, other states make the information a matter of public record. Regardless, there are companies that charge top dollar for access to that information who will surely be unhappy with its availability for free.

More importantly, none of the major campaign database providers have stepped forward to claim the database. And until someone does, it’s going to remain out on the open Web for anyone to download and use however they like. There are obvious security risks associated with addresses tied to name, religion, and ethnicity in a single database, and Vickery has also notified the proper authorities to attempt to have it removed.

Brad Bourque
Brad Bourque is a native Portlander, devout nerd, and craft beer enthusiast. He studied creative writing at Willamette…
The Mac Pro is dead at Apple, and I’ll miss the cheese-grater powerhouse
RIP Mac Pro. The Mac Studio is taking the throne, and we're okay with that.
Electronics, Computer, Pc

Apple has officially discontinued the Mac Pro. It’s been removed from Apple’s website, and Apple has confirmed to 9to5Mac that there are no plans to release a future version. The buy page now redirects to Apple’s Mac homepage, where the Mac Pro no longer exists.

Why did Apple kill the Mac Pro?

Read more
March Madness, Revisited: The AI Model Did Well. But Mad Things Still Happen
Stills from NCAA games.

(NOTE: This article is part of an ongoing series documenting an experiment with using AI to fill the NCAA brackets and see how it fares against years of human experience. The original article is as follows.)

A week ago, I wrote about entering an NCAA tournament pool with a more disciplined process than I usually use.

Read more
A simple coding mistake is exposing API keys across thousands of websites
Security gaps that are easier to miss than you think
Computer, Electronics, Laptop

After analyzing 10 million webpages, researchers have found thousands of websites accidentally exposing sensitive API credentials, including keys linked to major services like Amazon Web Services, Stripe, and OpenAI.

This is a serious issue because APIs act as the backbone of the apps we use today. They allow websites to connect to services like payments, cloud storage, and AI tools, but they rely on digital keys to stay secure. Once exposed, API keys can allow anyone to interact with those services with malicious intent.

Read more