This site is satire. Data may be incomplete, links may break, scores are opinions. Verify at Congress.gov before citing us in your dissertation.

Leg day: Fri → Fri (25d) Recess

Open Protocol

VoteChain

Cryptographic voter verification and ballot integrity for U.S. elections — replacing trust assumptions with mathematical proofs

Two protocols, one mission → 60 seconds

VoteChain is a two-layer protocol for election integrity. The verification layer answers “is this voter eligible?” using cryptographic credentials on a permissioned ledger — no PII on-chain, no biometric mandates. The ballot integrity layer (EWP) provides the chain of custody from cast to tally — encrypted ballots, append-only logs, and verifiable decryption proofs.

Everything here is published for transparency and critique. The POC runs entirely in your browser. The protocol documents are open for review.

Two-Layer Architecture

Layer 1: Verification

VoteChain PRD

  • 1. Citizen?
  • 2. Eligible (jurisdiction + election)?
  • 3. Alive / liveness satisfied?
  • 4. Already voted (nullifier uniqueness)?

Layer 2: Ballot Integrity

Election Web Protocol (EWP)

  • 1. Ballot encrypted (voter client)
  • 2. Recorded on bulletin board
  • 3. Included in tally set (Merkle proof)
  • 4. Counted correctly (verifiable decryption)

New

Field Report: Air-Gapped Runtime Demonstration

Detailed engineering results from the 5-machine public test-election cycle, including random spoils, per-session reset behavior, duplicate-vote rejection tests, and rogue-node detection simulations.

Read the field report