How we keep your data safe
Every login requires multi-factor authentication which incorporates a facial scan, fingerprint, security question, phone and email code confirmation, and much more to verify and authenticate users.
Every vote received will be cross-referenced on our decentralized distributed blockchain network. Our servers confirm the voter’s ID before allowing the vote to be cast.
All votes cast run through our top-tier encryption protocol. Turning the vote into an untranslatable, un-hackable, and unchangeable code on our blockchain.
To ensure secure & anonymous mobile voting, our top grade software is developed in house with no third party services in our application.
Keep the same image unless you can think of a better one. “Once votes are received, the anonymous data can never be destroyed, tampered with, edited, or deleted in any way. All data is transparent and auditable.