Many voting machines already have known ACE exploits already (I distinctly remember a while back some CS students demonstrated a 'modern' voting machine playing PAC-Man without modifying any of the hardware at all), and those that have network access or other accessible peripheral connections are inherently insecure, period.If you have physical access then the machine is yours to do with as
you please.
Thinking of ATMs or voting machines that is a bold statement :-)
This isn't a legal ruling, it's a simple statement of fact, if someone has physical access to a system, they effectively have root access, period. While this is not probably what the above comment was directly referring to, it is an established fact.
Thinking of mobile phones it depends on your jurisdiction.
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature