
Security isn't just a feature - it's the foundation of democracy. We employ defense-in-depth strategies to ensure that every vote is verifiable, anonymous, and immutable.
We enforce a strict cryptographic decoupling of voters from their ballots. While we verifyeligibility to vote, the contents of the vote are encrypted in a way that makes it mathematically impossible to trace a specific choice back to a specific individual. Your voice is counted; your identity is protected.
Our platform is hosted on SOC 2 Type II compliant infrastructure. The network is protected by enterprise-grade DDoS mitigation and Web Application Firewalls (WAF), inspecting traffic at the edge.
Data is encrypted in transit using TLS 1.3 and at rest using AES-256. Sensitive fields, including ballot choices, are encrypted at the application layer before storage, ensuring that even a database compromise would yield no readable voting data.
We utilize high-entropy magic links for passwordless authentication, eliminating the risk of compromised passwords. Access logic is protected by granular Role-Based Access Control (RBAC) and strict, IP-aware rate limiting to prevent brute-force attacks.
Every administrative action - from creating an election to viewing results - is persistently logged with actor attribution. These strict audit trails allow for complete transparency and accountability for election organizers.
Security posture last reviewed: March 16, 2026