প্ৰতিটো Election ৰ পিছতেই আমি এটা কথা বহুত শুনো— "EVM Hack হৈ গৈছে!" political debates আৰু public discussions ত এইটো এটা hot topic. কিন্তু, এয়া সঁচাকৈয়ে সম্ভৱ নে? Can EVM really be hacked? নে এইটো কেৱল এটা political myth? আজি আমি ইয়াৰ আঁৰৰ scientific আৰু strictly technical truth টো জানিম।
What is EVM (Electronic Voting Machine)?
EVM বা Electronic Voting Machine হৈছে এটা standalone digital device যিটো ভাৰতৰ voting process ত ব্যৱহাৰ কৰা হয়। ইয়াত মূলতঃ দুটা unit থাকে: Control Unit (CU) যিটো Presiding Officer ৰ ওচৰত থাকে, আৰু Ballot Unit (BU) যিটো voter-এ vote দিবলৈ ব্যৱহাৰ কৰে।
How EVM Works (Basic Architecture)
ইয়াৰ architecture টো একেবাৰে simple ৰখা হৈছে। Voter-এ যেতিয়া Ballot Unit ত নিজৰ পচন্দৰ প্ৰাৰ্থীৰ বুটামটো টিপে, তেতিয়া এটা signal Control Unit লৈ যায় আৰু vote টো internal memory ত register হয়। ইয়াত কোনো complex operating system (যেনে Windows বা Android) নাথাকে।
Why People Think EVM is Hacked
মানুহে কিয় ভাবে যে EVM hack হ'ব পাৰে? Logic টো simple— আজিকালি smartphones, bank accounts, ba supercomputers hack হৈ যায়। গতিকে মানুহে ভাবে যে EVM এটা সাধাৰণ মেচিন, ইয়াক hack কৰাটো কোনো ডাঙৰ কথা নহয়। It's mostly a psychological doubt. কিন্তু smartphone আৰু EVM ৰ মাজত এটা ডাঙৰ technical পাৰ্থক্য আছে।
The Technical Reality: An Air-Gapped System
আটাইতকৈ ডাঙৰ truth টো হৈছে, EVM এটা air-gapped system. ইয়াৰ মানে হ'ল EVM-ত কোনো ধৰণৰ Internet, Wi-Fi, Bluetooth বা wireless network connection নাথাকে। যিহেতু network connection নাই, গতিকে কোনো hacker-এ দূৰৰ পৰা (remotely) EVM-ত virus বা malware সুমুৱাই hack কৰাটো mathematically আৰু physically impossible।
Firmware and Hardware Security
EVM ৰ ভিতৰত ব্যৱহাৰ কৰা microcontroller chip টো হৈছে OTP, অৰ্থাৎ 'One Time Programmable'। ইয়াৰ মানে হ'ল, manufacturer-এ machine টো বনাওঁতে যিটো software code এবাৰ burn কৰে, তাক পিছত কেতিয়াও rewrite, update বা modify কৰিব নোৱাৰি। So, software level manipulation is permanently blocked.
Physical Security Layers
ভাৰতৰ নতুন M3 generation EVM বোৰত "Tamper Detect" mechanism থাকে। যদি কোনোবাই ৰাতি মনে মনে EVM টোৰ cover বা screws খুলি chip টো সলনি কৰিবলৈ চেষ্টা কৰে, মেচিনটো লগে লগে 'Dead' বা 'Safe Mode'-লৈ গুচি যায়। It locks itself down permanently. তাৰ পিছত সেই মেচিনটোত আৰু ভোট দিব নোৱাৰি।
Possible Vulnerabilities (Honest Analysis)
Strictly cybersecurity perspective-ৰ পৰা চালে, 100% security বুলি একো বস্তু নাই। Theoretically, যদি কোনোবাই মেচিনটো physical access পায় আৰু original chip টো উলিয়াই এটা pre-programmed duplicate chip সুমুৱাই দিয়ে (hardware replacement), তেতিয়া manipulaton হ'ব পাৰে। কিন্তু, strict administrative protocols, election ৰ আগত কৰা "Mock Polls", আৰু candidate ৰ প্ৰতিনিধিৰ সন্মুখত machine seal কৰা ব্যৱস্থাৰ কাৰণে real-world scenario ত এইটো practical নহয়।
VVPAT Explanation
Security আৰু transparency বঢ়াবৰ কাৰণে আজি কালি EVM ৰ লগত VVPAT (Voter Verifiable Paper Audit Trail) ব্যৱহাৰ কৰা হয়। আপুনি vote দিয়াৰ পিছত 7 seconds ৰ কাৰণে এটা paper slip দেখা যায় য'ত প্ৰাৰ্থীৰ নাম থাকে। ইয়াৰ ফলত digital vote ৰ লগতে এটা physical paper verification-ও থাকে, যিটো election commission-এ পিছত tally কৰিব পাৰে।
Final Verdict & Conclusion
So, final conclusion কি? EVM system technically বহুত বেছি secure। Internet নথকা (air-gapped), OS নথকা, আৰু One Time Programmable chip ব্যৱহাৰ কৰাৰ কাৰণে remote hacking একেবাৰে impossible।
Political debates চলি থাকিব, কিন্তু strictly scientific আৰু hardware level architecture ৰ মাজেৰে চালে, mass scale-ত EVM manipulation is a myth. ভাৰতীয় EVM ৰ security ইয়াৰ simplicity ৰ মাজতেই লুকাই আছে।
After every election, we hear one phrase constantly: "The EVMs have been hacked!" It's a hot topic in political debates and public discussions. But is this actually possible? Can EVMs really be hacked? Or is it just a political myth? Today, we will uncover the scientific and strictly technical truth behind this system.
What is an EVM?
An EVM or Electronic Voting Machine is a standalone digital device used in the Indian voting process. It mainly consists of two components: the Control Unit (CU) which is kept with the Presiding Officer, and the Ballot Unit (BU) which the voter uses to cast their vote inside the voting compartment.
How EVM Works (Basic Architecture)
The architecture is intentionally kept very simple. When a voter presses the button next to their preferred candidate on the Ballot Unit, a signal is sent to the Control Unit, and the vote is securely registered in the internal memory. Unlike your phone or computer, it does not run on a complex operating system like Windows, Linux, or Android.
Why People Think EVMs Can Be Hacked
Why is there so much doubt? The logic seems simple—nowadays, smartphones, secure bank accounts, and even corporate servers get hacked. So, people assume that an EVM is just another electronic machine, making it easy to hack. It's mostly a psychological bias. However, there is a massive architectural difference between a modern smartphone and an EVM.
The Technical Reality: An Air-Gapped System
The most crucial fact is that the EVM is an air-gapped system. This means the EVM has absolutely no Internet, Wi-Fi, Bluetooth, or any wireless network receivers. Because there is zero network connectivity, it is mathematically and physically impossible for a hacker to remotely inject a virus or malware into the machine.
Firmware and Hardware Security
The microcontroller chip used inside the EVM is OTP, which stands for 'One Time Programmable'. This means the software code burned into the machine by the manufacturer during its creation can never be rewritten, updated, or modified later. Therefore, software-level manipulation via external code injection is permanently blocked by the hardware itself.
Physical Security Layers
India's newer M3 generation EVMs feature a robust "Tamper Detect" mechanism. If someone tries to secretly open the EVM's casing or remove screws to swap the internal chip, the machine immediately goes into a permanent 'Dead' or 'Safe Mode'. It completely locks down, and no further votes can be cast on that specific machine.
Possible Vulnerabilities (Honest Analysis)
From a strict cybersecurity perspective, 100% security does not exist. Theoretically, if someone gains prolonged physical access to the machine, successfully removes the original chip without triggering the tamper lock, and solders in a pre-programmed duplicate chip (hardware replacement), manipulation could occur. However, due to strict administrative protocols, public "Mock Polls" before the actual election, and the sealing of machines in front of political representatives, executing this in a real-world scenario is highly impractical.
The VVPAT Explanation
To enhance security and transparency, VVPAT (Voter Verifiable Paper Audit Trail) machines are now connected to EVMs. After you cast your vote digitally, a printed paper slip showing your chosen candidate's name and symbol appears behind a glass window for 7 seconds before dropping into a sealed box. This ensures that alongside the digital tally, there is a physical paper trail that the Election Commission can cross-verify.
Final Verdict & Conclusion
So, what is the final conclusion? The EVM system is technically highly secure. Because it is completely disconnected from the internet (air-gapped), lacks a vulnerable operating system, and utilizes One-Time Programmable chips, remote hacking is virtually impossible.
Political debates will inevitably continue, but looking through the lens of strict scientific and hardware-level architecture, mass-scale EVM manipulation is a myth. The true security of the Indian EVM lies in its brilliant simplicity.
0 Comments