This site is satire. Data may be incomplete, links may break, scores are opinions. Verify at Congress.gov before citing us in your dissertation.

Leg day: Fri → Fri (19d) Recess

Frequently Asked Questions

150 Questions, Answered Honestly

What VoteChain is, what it isn’t, what’s solved, and what’s still open — in plain English

150 Total
118 Answered
32 Open

The Basics

12

What VoteChain is, what it does, and what it does not do.

What is VoteChain?
VoteChain is a proposed voter verification and ballot integrity system for U.S. federal elections. It uses cryptographic proofs — not trust in any single person or agency — to confirm that voters are eligible, that each vote is counted exactly once, and that nobody can tamper with the record after the fact.
Is VoteChain a voting machine?
No. VoteChain is a verification and audit layer that sits alongside existing election infrastructure. It does not replace ballot casting or counting equipment. A companion protocol called the Election Web Protocol (EWP) handles ballot integrity — the chain of custody from cast to tally.
Has VoteChain been used in a real election?
No. VoteChain is a technical blueprint, not a deployed system. It has not been certified by any election authority. The performance and security numbers in the design documents are targets, not proven results. A working proof-of-concept demo runs entirely in your browser for educational purposes.
Why use a blockchain instead of a normal database?
A normal database has an administrator who can change or delete records. A blockchain distributes the ledger across 74 independent nodes — operated by federal agencies, all 50 states, independent auditors, and congressional oversight bodies. Altering a record would require corrupting a majority of nodes across multiple categories, which is computationally infeasible.
Is this like Bitcoin or cryptocurrency?
No. VoteChain uses a permissioned consortium blockchain with no tokens, no mining, no gas fees, and no speculation. Only authorized government and oversight entities can operate nodes. It borrows the tamper-resistance properties of blockchain technology without the economics.
What problem does VoteChain solve?
Today, the U.S. has 50 different voter ID systems, fraud detection that takes weeks, and contested results that erode public trust. VoteChain aims to answer four questions with mathematical certainty: Is this person a citizen? Are they eligible here? Are they alive and present? Have they already voted?
Do I need to understand cryptography to use VoteChain?
No. For voters, the experience is simple: enroll once, then tap your phone or card at the polls. All the cryptography happens behind the scenes. You never see a hash, a proof, or a blockchain address.
What are the "Five Pillars" of verification?
Every verification checks five things: (1) Citizenship — confirmed via government databases at enrollment. (2) Eligibility — registered in the right jurisdiction. (3) Liveness — the person is alive and physically present. (4) Uniqueness — they have not already voted in this election. (5) Chain of custody — the verification device itself has not been tampered with.
What is the Election Web Protocol (EWP)?
EWP is the companion protocol that handles ballot integrity — ensuring every ballot is encrypted, recorded on a public bulletin board, included in the tally, and counted correctly. It provides the cryptographic chain of custody from the moment you cast your vote to the final count.
Who controls VoteChain?
No single entity. Consensus requires agreement from at least 3 of 4 node categories (federal, state, auditor, oversight), and at least one independent category must always be in the approving set. No political party, branch of government, or state can unilaterally control the system.
What happens to my current voter registration?
Your state voter registration remains in place. VoteChain links your cryptographic credential to your registration using encrypted state storage. On-chain, only a hashed jurisdiction linkage is recorded — not your name or address.
Can I still vote with a paper ballot?
Yes. VoteChain is a verification layer, not a ballot format. How you mark your choices — paper, touchscreen, or accessible device — is a separate decision. The EWP ballot integrity protocol works with both electronic and paper-based casting systems.

Privacy & Surveillance

12 2 open

How VoteChain protects your identity and prevents government tracking.

Can the government see how I voted?
No. VoteChain verifies eligibility and ballot issuance only. Ballot selection is handled by a completely separate system (the Election Web Protocol). The two are architecturally separated — VoteChain literally cannot reveal how you voted because it never has that information.
Is my name stored on the blockchain?
No. No personally identifiable information (PII) is stored on-chain — ever. The blockchain only stores cryptographic attestations tied to your Decentralized Identifier (DID), which is a random-looking string of letters and numbers that is not linked to your real identity on-chain.
What are zero-knowledge proofs and why do they matter?
A zero-knowledge proof lets VoteChain confirm "this person is eligible and hasn't voted yet" without revealing who they are. It is a mathematical way of proving a statement is true without showing any of the underlying data. Poll workers see a green light or red light — nothing else.
Could someone correlate my identity by tracking when and where I voted?
The system mitigates this: verification records use polling-place hashes (not addresses), and timestamps are rounded to 15-minute windows on-chain. Linking a DID to a real person requires court-ordered access to the encrypted state PII vault.
What if a node operator reads my verification data?
All verification data is encrypted in transit and at rest. Node operators see encrypted blobs, not cleartext. They can confirm the ledger is consistent without being able to read individual records.
Can VoteChain data be subpoenaed for political targeting?
DIDs are pseudonymous. Linking a DID to a real person requires a court order to access the state PII vault. The proposed legislation explicitly prohibits using VoteChain data for non-election purposes — including immigration enforcement, law enforcement, and commercial use.
Where is my biometric data stored?
If you choose the biometric path, your template is stored only on your personal device or secure card — never in a central database, never on the blockchain. At the polls, only a "match: yes/no" result is produced. The raw biometric never leaves your device.
What happens to my data after an election?
On-chain verification records are permanent (that is the whole point of the audit trail). Enrollment PII in the encrypted vault is purged 10 years after your last verification. Biometric templates remain under your control on your device until you delete them.
Could a future government misuse the system for mass surveillance?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

This is a legitimate concern. The architecture is designed to make misuse structurally difficult: PII is off-chain, DIDs are pseudonymous, multi-party consensus prevents unilateral access, and legislation prohibits non-election use. However, no technical system can fully prevent political misuse if laws change. Ongoing independent oversight and public auditing are the long-term safeguards.
Can I opt out of VoteChain entirely?
The design mandates VoteChain for federal election verification, but provisional ballot rights are always preserved. If you cannot or will not enroll, you can still vote via the existing provisional ballot process under HAVA. Your vote would be adjudicated through a tracked workflow.
How does the receipt system avoid proving how I voted?
Cast receipts contain only a bulletin board leaf hash, a signed tree head, and a VoteChain anchor — none of which reveal ballot content. Even if you share your receipt with someone, they cannot determine your vote selections from it. Threshold decryption ensures no single party can decrypt an individual ballot.
What stops the government from tracking IP addresses of remote voters?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

For remote voting (Mode 3, which is gated and not yet approved), the design requires an OHTTP or equivalent proxy layer to prevent gateway operators from correlating IP addresses with voters. However, this is an unsolved gate criterion — independent traffic-analysis audits must validate it before any remote deployment.

Security & Hacking

12 2 open

How VoteChain defends against nation-states, insiders, and hackers.

What if a nation-state attacks the blockchain?
Nodes are geographically distributed across the country, use hardware security modules (HSMs) for key storage, run on separate networks, and have DDoS protection with air-gapped backup nodes. Compromising the system would require corrupting a majority of nodes across multiple independent categories — federal, state, auditor, and oversight.
What if a single node is hacked?
A compromised node is reduced to observer status. The other nodes continue consensus without it. The affected operator has 24 hours to bring a backup node online. No single node compromise can alter the ledger because consensus requires multi-category agreement.
What if someone hacks a poll worker's device?
Every verification device has its own cryptographic identity (device DID) stored in a hardware security module. If a device is compromised, its attestations are revoked, all verifications it performed are flagged for review, and backup hardware is deployed. The Benaloh challenge also lets voters audit their encrypted ballot independently.
Can quantum computers break VoteChain?
VoteChain specifies post-quantum cryptographic algorithms (following NIST PQC standards published in 2024) for all new key generation, plus a migration plan for existing keys. This is a long-term threat, not an immediate one, but the architecture is designed for cryptographic agility.
What if someone steals my credential?
Your credential requires liveness verification at the polls — either a biometric scan on your device or a PIN/passphrase plus your device/card plus poll worker attestation. A stolen credential alone is not enough because the thief cannot pass the liveness check.
Who does the security testing?
The plan requires annual red team exercises by at least two independent firms, a continuous bug bounty program with rewards up to $500K for critical vulnerabilities, and a pre-election stress test 60 days before each federal election simulating 2x expected load. Results are published publicly.
What is the Benaloh challenge?
A cast-as-intended verification mechanism. Before casting, you can "challenge" the device to prove it encrypted your actual selections correctly. A challenged ballot is spoiled (not counted) and the encryption is revealed for verification. You can then re-encrypt and cast or challenge again. A cheating device cannot predict which ballots will be challenged.
What happens if the entire network goes down on election day?
Polling devices cache the last known chain state and continue verifications in "optimistic mode." Provisional ballots are always available. Post-election reconciliation resolves any discrepancies. The incident command structure has a runbook for this exact scenario with a 30-minute workaround activation target.
Can a rogue enrollment authority create fake voters?
Credential issuance uses threshold signing — at least 2 of 3 independent enrollment authorities must co-sign any credential. A single compromised authority cannot mint valid credentials alone. Enrollment anomaly detection also watches for patterns like burst registrations from a single address.
What if multiple enrollment authorities collude?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

If the required threshold of issuers collude and stay within the voter roll ceiling, the attack succeeds cryptographically — the system cannot distinguish forged credentials from legitimate ones. This is a known residual risk mitigated by operational controls: independent issuer selection, legal deterrence, audit trails, and post-election statistical analysis.
What if someone tampers with the bulletin board?
The bulletin board is an append-only Merkle log. Independent monitors (at least 3 operators from at least 2 different organizations) continuously check signed tree heads, consistency proofs, and VoteChain anchors. If the BB shows different histories to different observers, monitors detect the inconsistency and alert.
How is the system protected against insider threats?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

No single operator can alter records. Consensus requires multi-category agreement (federal + state + auditor + oversight). All operator actions are logged on-chain. Smart contract updates require multi-party approval with a 30-day public comment period for non-emergency changes. This is an area where governance design is as important as cryptography.

Voter Experience

11 1 open

What enrollment and election day actually look and feel like.

How do I enroll in VoteChain?
Enrollment happens once (or once per decade for re-verification). You provide your name, date of birth, and identifiers at any enrollment location — DMV, library, community center, post office, or via a mobile enrollment van. The system verifies your identity through government databases, not by looking at a card. Target time: under 30 minutes.
Do I need a government-issued photo ID to enroll?
No. The system verifies identity through multi-source database matching — SSA, USCIS, state vital records, and passport records. A positive match from any 2 of 4 sources constitutes verification. No enrollment channel requires you to already have a photo ID.
What does election day verification look like?
You tap your phone or secure card at the polls. A quick liveness check confirms you are present (biometric scan or PIN entry). The system runs a zero-knowledge proof in the background. The poll worker sees a green light within seconds. Total target: under 60 seconds.
What if I lose my phone or card before election day?
Recovery is available at designated enrollment offices using Shamir secret sharing — a cryptographic technique that splits your recovery key across multiple designated agents. If recovery is not completed in time, you can still vote with a provisional ballot using the existing HAVA process.
What if I get flagged at the polls?
You still cast a provisional ballot. Your case enters a tracked adjudication workflow with notice, status updates, and appeal pathways. The system defaults to provisional handling whenever data is uncertain — it never silently denies anyone the right to vote.
Do I have to use a fingerprint scanner?
No. Biometrics are optional. A non-biometric path — PIN or passphrase plus your device or card plus poll worker attestation — is always available with equal legal standing, the same wait-time targets, and the same ballot access.
How do I verify my vote was counted?
After casting, you receive a receipt containing a bulletin board hash and a VoteChain anchor. You can independently verify that your encrypted ballot appears on the public bulletin board. Tally proofs let anyone confirm the published count matches the recorded ballots — all without revealing individual votes.
What if I am homeless and have no address?
You can use a shelter address or county election office address for enrollment. Residency is not required for federal elections. Mobile enrollment units and community partner organizations provide support for voters without stable housing.
What happens in same-day registration states?
Same-day registrants cannot complete full enrollment on the spot. The proposed solution is a rapid-enrollment track (target: under 10 minutes) with reduced verification, plus a provisional ballot that is upgraded to regular once full verification completes.
Can I enroll online?
You can start the process online (pre-enrollment) and complete it in-person for the liveness-method setup step. Fully remote enrollment is not supported in version 1 because liveness verification requires a physical presence at least once.
What happens if the verification device at my polling place breaks?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

The immediate switch is to the non-biometric path or a backup device. If all devices fail, provisional ballots are issued under the existing HAVA process. Incident command runbooks specify a 30-minute workaround activation target.

Fraud Detection

11 1 open

How VoteChain catches fraud in real time and resolves false positives.

How does VoteChain catch someone voting twice?
Each voter generates a one-time nullifier — a cryptographic token derived from their identity and the election ID. Before any ballot is issued, the system checks the shared national ledger for that nullifier. If it already exists, the second attempt is instantly flagged and routed to a provisional ballot.
How does VoteChain catch dead people voting?
The system subscribes to continuous death record feeds — SSA Death Master File, state vital records, and hospital/coroner reports. When a death record matches an enrolled voter, a revocation is written to the blockchain within 48 hours. Any future attempt to use that credential is flagged instantly.
Can VoteChain detect someone voting in two different states?
Yes. Because the blockchain is shared across all states, the nullifier check is cross-jurisdictional. If someone votes in Pennsylvania at 8 AM and tries to vote in New Jersey at 2 PM, the second attempt is caught instantly with cryptographic evidence.
What is "geographic impossibility detection"?
If the same credential is used at two polling places closer together in time than physically possible, the system flags it as a geographic impossibility. The second attempt is routed to provisional handling with preserved evidence including timestamps, locations, and device attestations.
What kinds of fraud patterns does VoteChain watch for?
Beyond individual fraud, VoteChain monitors for organized patterns: burst registrations from a single address, a single device verifying unusually many voters, votes from closed polling places at odd hours, mass credential revocations, and statistically unusual verification pass rates at specific locations.
What happens when a flag is raised?
Every flag has a lifecycle: detection → assignment to an oversight team → investigation → resolution with documented legal basis. The voter receives notice and can appeal. No flag permanently blacklists a voter — each has a tracked adjudication workflow.
What about false positives? Will innocent people get flagged?
Any fraud detection system produces some false positives. The critical design choice is that every flagged voter still gets a provisional ballot. VoteChain's cryptographic nullifier system reduces name/DOB-collision false positives compared to current post-election cross-matching, but operational review is still required for every flag.
How fast is fraud detection compared to the current system?
Current systems detect most fraud weeks or months after an election via audits and tip lines. VoteChain operates in two windows: cryptographic checks (nullifier conflicts, invalid signatures) in seconds, and data-feed checks (death records, judicial updates, anomaly patterns) in minutes to hours.
Can an official secretly alter fraud flags after the fact?
No. Every fraud flag, case-state transition, and resolution is immutable on the blockchain. An official cannot delete or modify a flag without it being visible to every node operator and auditor. The evidence chain is cryptographically sealed.
How does VoteChain detect enrollment fraud?
The system watches for fraudulent enrollment patterns: synthetic identity signals, address clustering (50+ enrollments from one address), and enrollment rate anomalies. Credential issuance requires threshold co-signing by multiple independent authorities to prevent single-point forgery.
What is the long-term fraud detection accuracy target?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

The design targets are cryptographic conflict flags in under 30 seconds and asynchronous risk flags in under 24 hours. However, actual accuracy metrics will only be measurable after real pilot elections. The false-positive rate for statistical anomaly detection is still an area requiring calibration.

Accessibility & Equity

11 2 open

How VoteChain works for everyone, not just the tech-savvy.

Do I need a smartphone?
No. Free secure cards are provided at enrollment for voters without phones. These NFC-enabled cards with a secure element work just like tapping a phone. In-person assisted verification is always available.
Do I need internet access?
No. Polling place devices handle all network connectivity. As a voter, you only need your card or phone — the device does everything else. You do not need a data plan, Wi-Fi access, or any internet connection of your own.
Is there a fee to enroll, get a card, or replace a lost one?
No fees, ever. Enrollment is free. Secure cards are free. Device replacement is free. This is a constitutional requirement — the 24th Amendment prohibits conditioning voting on payment, and the design takes that literally.
How does VoteChain serve voters with disabilities?
The design requires audio guidance, large text, and tactile card support for blind or low-vision voters, plus seated-height kiosks. Screen reader compatibility is mandatory. The non-biometric path accommodates voters who cannot use fingerprint or iris scanners due to disability.
What about voters who do not speak English?
Enrollment interfaces must support all Section 203-required languages (as mandated by the Voting Rights Act), and polling devices must support the top 15 U.S. languages. Local nonprofits and multilingual volunteers provide additional assistance.
How does VoteChain reach rural voters?
Mobile enrollment units (buses and vans) travel to underserved areas. Enrollment by mail is available with in-person liveness-method setup at the nearest post office. The system does not require broadband or urban infrastructure.
What about elderly voters who are not comfortable with technology?
Assisted enrollment is available with trained volunteers who walk voters through each step. Election day verification can be as simple as tapping a card — no screens to navigate. Community partners provide phone help lines and "come-to-you" onboarding support.
What if I am incarcerated but legally eligible to vote?
Mobile enrollment units visit correctional facilities, and state eligibility rules are enforced by smart contract. If you are eligible to vote under your state's laws, VoteChain provides in-facility enrollment and verification.
How does VoteChain track whether it is actually equitable?
The system must track enrollment rates, wait times, failure rates, and provisional ballot rates by demographic group. If any group has an enrollment rate more than 5% below the national average, the responsible jurisdiction must publish a remediation plan within 30 days.
Can the ZKP proof generation run on a cheap phone?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Zero-knowledge proof generation is computationally expensive. The design offloads the heavy computation to the polling place device — your phone or card provides the signing key, and the device computes the proof. You do not need an expensive phone.
How will VoteChain work with tribal nations?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Tribal IDs and governance structures are unique. The design calls for dedicated engagement with tribal governments and recognizing tribal enrollment authorities as first-class system participants. However, the specific integration model has not been defined yet and requires direct tribal consultation.

Cost & Funding

10 1 open

What VoteChain costs and how it compares to current election spending.

How much would VoteChain cost?
The baseline estimate is roughly $870 million one-time and $375 million per year. More realistic "expected" scenarios, accounting for federal IT delivery risk and legacy system modernization, range from $2–2.8 billion one-time and $500–700 million per year.
How does that compare to what we already spend on elections?
One commonly cited estimate places 2020 U.S. election administration spending at roughly $4.1 billion across all jurisdictions. VoteChain's annual cost represents roughly 9% (baseline) to 12–22% (expected/high-risk) of that existing spend.
What is the cost per voter?
Approximately $8.30 per enrolled voter per year (assuming 150 million enrolled), or about $5.60 per verified vote (assuming 67% turnout). For context, a single contested election recount costs $3–10 million or more per state.
What is the biggest cost driver?
Staffing is the largest ongoing expense at an estimated $150 million per year — enrollment workers, oversight teams, operations staff, help desk, and election-week surge capacity. Hardware and software development are large one-time costs.
Who pays for it?
The proposed model distributes costs across federal and state budgets, similar to how election infrastructure is funded today. Federal legislation would appropriate initial funding and establish ongoing cost-sharing formulas.
Are the cost estimates reliable?
Honestly, the baseline model assumes substantial reuse of existing government infrastructure and minimal API modernization overruns. Given known federal IT delivery risk, the "expected" scenario ($2–2.8B) is more realistic. A high-risk scenario reaching $3–4 billion accounts for multi-year legacy system remediation and procurement delays.
How much does the security program cost?
The security budget is estimated at $20 million per year — covering red team exercises, bug bounty program (up to $500K per critical vulnerability), audits, and pre-election stress tests. This is described as "non-negotiable."
How much do the secure cards cost?
Approximately $3 per card including the NFC chip and secure element, with a total estimated budget of $150 million one-time and $30 million per year for replacements and new enrollments.
Does VoteChain save money anywhere?
Potentially. A system that reduces contested election outcomes by even 10% could save tens of millions in recount and legal challenge costs per cycle. Faster fraud detection may also reduce post-election litigation. However, these savings are speculative and not yet proven.
What are the biggest cost risks?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

The primary risk drivers are: legacy system integration (government APIs may need major modernization), state-by-state implementation variance, hardware lifecycle replacement logistics, 24/7 support staffing, and security hardening costs that grow as the threat landscape evolves.

The Technology (Explained Simply)

12 1 open

How the cryptography and blockchain work, in plain English.

What is a "permissioned blockchain"?
Unlike public blockchains (Bitcoin, Ethereum) where anyone can participate, a permissioned blockchain only allows authorized entities to operate nodes. In VoteChain, these are federal agencies, state election offices, independent auditors, and oversight bodies. This provides tamper-resistance without the slowness and openness of public chains.
What is a Decentralized Identifier (DID)?
A DID is like a digital passport number that you control. It is a cryptographic key pair — a public part registered on the blockchain and a private part stored on your device or card. Unlike a Social Security number, your DID cannot be used to look up your name, address, or any personal information.
What is a nullifier?
A nullifier is a one-time code mathematically derived from your identity and a specific election. It proves you voted without revealing who you are. Once used, it cannot be reused — so if someone tries to vote twice with the same identity, the duplicate nullifier is caught instantly.
What is a "zero-knowledge proof" in simple terms?
Imagine proving you are old enough to enter a bar without showing your ID. A zero-knowledge proof lets VoteChain confirm "this person meets all five verification requirements" without the system learning who they are, where they live, or how old they are.
What is "threshold decryption"?
Encrypted ballots can only be decrypted when a minimum number of independent trustees (called a "threshold") combine their secret keys. No single trustee — and no single government agency — can decrypt any individual ballot. This is what protects ballot secrecy.
What is an HSM?
A Hardware Security Module — a tamper-resistant physical device that stores cryptographic keys. Every VoteChain node and verification device uses one. Even if someone physically steals a server, the keys inside the HSM are protected against extraction.
How fast is VoteChain?
Target throughput is 10,000+ transactions per second with block finality in under 3 seconds. For comparison, Bitcoin handles about 7 TPS and Ethereum about 30 TPS. A permissioned chain can be much faster because it does not need energy-intensive mining.
What is a "Merkle log" or "bulletin board"?
A Merkle log is an append-only public ledger where new entries can be added but nothing can be deleted or changed. It is structured as a tree of hashes so that anyone can efficiently verify that a specific entry exists. The bulletin board is where encrypted ballots are published for independent verification.
What does "consensus" mean in this context?
Consensus is the process by which the 74 nodes agree on what gets written to the blockchain. VoteChain uses a Byzantine Fault Tolerant (BFT) consensus that requires 3 of 4 node categories to approve, with at least one independent category always in the mix. This means no single faction can control what gets recorded.
What blockchain framework would VoteChain use?
The recommendation is Hyperledger Fabric or a similar permissioned framework. Hyperledger Fabric is production-proven in supply chain, finance, and healthcare. However, the specific framework selection is an open question — a competitive 90-day evaluation of top candidates is proposed.
Which ZKP system would be used?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

The candidates are Groth16, PLONK, and STARKs, each with different tradeoffs for proof size, generation time, and setup requirements. The specific choice is an open question requiring benchmark testing under realistic election-day load simulations.
What is "post-quantum cryptography"?
Current encryption could theoretically be broken by future quantum computers. Post-quantum cryptography uses mathematical problems that are believed to be hard even for quantum computers. VoteChain specifies NIST PQC standards (published 2024) for new keys, with a migration plan for existing keys.

Coercion & Vote Buying

10 2 open

Can someone force you to vote a certain way or sell your vote?

Can someone force me to vote a certain way?
At a polling place (Mode 1), coercion resistance works the same as today — privacy booths, poll worker oversight, and controlled access. The EWP does not change this; it adds cryptographic verification after the ballot is cast. The hard problem is remote voting.
What about coercion in remote voting?
Unsupervised remote voting (Mode 3) is where coercion becomes a protocol-level concern — the voter is at home or work, possibly under observation. No protocol can fully solve this. VoteChain defines mitigations, not magic. Mode 3 is gated and cannot deploy until coercion controls are independently validated.
What is "revoting" and how does it help?
If enabled, voters can cast multiple times, with only the last valid cast before polls close being counted. If someone forces you to vote under observation, you can later re-cast privately. This reduces coercion but does not eliminate it — a coercer could monitor you until polls close.
Can I go to a polling place to override a remote vote?
Yes. An in-person override allows a verified in-person ballot to replace any remote cast, with an on-chain audit trail. This provides a guaranteed escape path for coerced voters — even if someone forced your remote vote, you can nullify it in person.
Can I prove to someone how I voted?
No. The receipt only proves your encrypted ballot was included on the bulletin board — it does not reveal your selections. Even if you share your receipt with a coercer, they cannot determine how you voted. This "receipt-freeness" is a fundamental design invariant across all deployment modes.
Could someone buy votes through VoteChain?
Vote buying requires the buyer to verify how you voted. VoteChain makes this structurally difficult: receipts do not reveal selections, threshold decryption prevents individual ballot decryption, and revoting allows you to change your vote after being "paid." However, no system can completely prevent all forms of vote buying.
Is remote voting actually safe enough to deploy?
Not yet. Mode 3 (unsupervised remote) has seven hard gate criteria that must all be independently cleared before deployment — including coercion mitigation, network privacy, client integrity, phishing defense, and equity parity. None have been cleared. Modes 1 (polling place) and 2 (supervised) deploy first.
What stops someone from selling their credential?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

The credential requires liveness verification — biometric or multi-factor authentication — at the point of voting. Selling your credential is like selling a key that requires your fingerprint to use. However, in a remote voting scenario, this protection is weaker because the seller could authenticate remotely.
How does VoteChain handle domestic abuse situations?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

In-person voting (Mode 1) provides the same physical separation from an abuser as today's polling places. The in-person override allows a coerced voter to nullify a forced remote vote. However, domestic coercion in remote voting environments remains a fundamentally difficult problem that technology alone cannot fully solve.
Why not just skip remote voting entirely?
That is a legitimate position. VoteChain's Mode 1 (polling place) and Mode 2 (supervised) are designed to work without Mode 3. Remote voting is gated specifically because the design acknowledges it may never be safe enough. Modes 1 and 2 do not wait for Mode 3.

Overseas & Military Voters

8 1 open

How VoteChain serves UOCAVA voters deployed around the world.

Can military members stationed overseas use VoteChain?
Yes. VoteChain explicitly supports UOCAVA voters (active-duty uniformed services, eligible family members, and U.S. citizens overseas). Enrollment happens at embassies, consulates, and military installations with supervised liveness-method setup.
How does overseas enrollment work?
UOCAVA-compliant enrollment is available at consulates, embassies, and military bases. The liveness method is set up in-person at the facility. The system then integrates with existing absentee ballot request and return processes rather than replacing them.
What about submarines or deployed ships with no internet?
Mode 2 (supervised remote) supports satellite or delayed-sync for deployed and shipboard environments. Verification can queue locally on supervised devices and sync when connectivity is available, with post-sync reconciliation.
What if my verification status is uncertain at ballot return deadline?
VoteChain verification status must never suppress a lawful UOCAVA ballot request. If verification is uncertain, the ballot is routed to provisional adjudication with priority review and a deadline-aware triage queue tied to the state's specific FWAB/ballot return deadline.
Can I recover a lost credential from overseas?
Yes. Recovery channels include embassy and consular support, military command assistance, and a proposed 24/7 global voter support operation. The recovery process uses the same Shamir secret sharing mechanism, with identity re-verification at the facility.
Are overseas voters second-class citizens in VoteChain?
The design explicitly requires parity. UOCAVA voters get dedicated enrollment paths, supervised voting environments (Mode 2), recovery support, and deadline-aware adjudication. The myth-vs-fact table directly rebuts the claim that overseas voters are an afterthought.
How are absentee ballot deadlines harmonized across states?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Each state has different UOCAVA ballot return deadlines. The system proposes building a state-by-state deadline matrix with machine-readable cutoff rules and deadline-aware triage queues. However, the specific harmonization model is still an open question.
What time zone support exists for overseas voters?
The proposed 24/7 global voter support operation would staff help channels across time zones and languages. Election-week staffing multipliers ensure coverage during peak periods. The minimum staffing model is still being defined.

Deployment & Timeline

8 1 open

When and how VoteChain would be rolled out.

How long would it take to build VoteChain?
The design separates rapid validation from production readiness. A proof of concept could be built in 1–6 months. Production hardening takes 6–24 months. Live pilots in 3–5 jurisdictions would run from months 24–36. Full federal rollout targets months 36–60.
What has to happen before a single voter uses VoteChain?
Congressional authorization, standards body creation (NIST/EAC/CISA), privacy impact assessment, procurement, a full POC with mock election, production hardening with repeated security testing, and independent readiness assessment. This is years of work before live pilots.
When would the first real election use VoteChain?
The timeline targets a first federal election with VoteChain verification at months 56–60 (roughly 5 years from authorization). This is aggressive — federal IT projects frequently exceed timelines. The design acknowledges this and separates rapid POC from the harder production phases.
Would it be deployed everywhere at once?
No. Deployment is phased, state by state. After pilot elections in 3–5 diverse jurisdictions, states onboard incrementally from months 36–52. The national enrollment target is 80% by months 44–56. Fallback to existing methods continues during transition.
What is the enrollment target?
The Phase 2 pilot targets 50%+ enrollment in pilot areas. The Phase 3 national target is 80% enrollment. Expansion is supported by free enrollment, mobile units, community partner organizations, and voter education campaigns.
What happens if the POC fails?
The Phase 1 POC ends with a public exit report documenting measured limits, risks, and go/no-go criteria for hardening. If results do not meet targets, the program publishes transparent findings and either remediates or halts. This is designed to be an honest evaluation, not a rubber stamp.
Can states opt out?
For federal elections, the design proposes a federal participation requirement. For state and local elections, adoption remains entirely optional — a state legislative choice. Enforcement mechanisms for non-compliant states are still an open governance question.
Is this timeline realistic?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Honestly, it is aggressive. Federal IT projects regularly exceed timelines and budgets. The design tries to mitigate this by separating the rapid POC (months) from production hardening (years), but political dynamics, procurement delays, and legacy system integration are real risks.

Open Questions & Honest Gaps

15 15 open

Things VoteChain does not yet have answers for. Listed honestly.

Which specific blockchain framework should VoteChain use?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Hyperledger Fabric is recommended, but Hyperledger Besu and custom solutions are candidates. The proposal calls for a competitive 90-day evaluation with proof-of-concept from the top 3 candidates. The choice affects throughput, consensus mechanics, and long-term maintainability.
Which zero-knowledge proof system performs best at election scale?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Groth16, PLONK, and STARKs each have different tradeoffs for proof size, generation time, and trusted setup requirements. Real benchmarks under election-day load are needed before a decision. This is not a theoretical question — it affects whether verification takes 5 seconds or 60.
Can 50 different judicial eligibility regimes be codified in smart contracts?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Each state has unique rules about felony disenfranchisement, restoration, pardons, and election-crime disqualifiers. The proposal suggests working with NCSL and state courts to create an open-source, statute-versioned rules library. This is a legal and political challenge as much as a technical one.
What happens if a state misses its implementation deadline?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

The enforcement mechanism is undefined. Options include statutory funding conditions, waiver policies for emergencies, and federal backstop operations. But the political reality of forcing non-cooperative states to comply is not something a technical design can solve.
Can same-day registrants enroll fast enough?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Full enrollment is designed to take under 30 minutes. Same-day registrants need it in under 10. The proposed rapid-enrollment track reduces verification and issues a provisional ballot, but this path has not been tested with real users in real conditions.
Can a $50 phone generate zero-knowledge proofs?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Probably not fast enough. The design offloads computation to the polling place device, but this solution has not been validated. Proof generation is computationally expensive and could create bottlenecks on election day if polling-place hardware is insufficient.
How should smart contract updates be governed?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

The proposal requires multi-party approval (federal + state majority + auditor sign-off) with 30-day public comment for non-emergency changes. But the precise governance model — how to handle bug fixes, emergency patches, and rule changes — needs detailed specification.
How are naturalized citizens with incomplete USCIS records handled?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Legacy records from before digitization are inconsistent. The proposed path is sworn affidavit plus 3 supporting documents plus manual review, but this creates a slower, more burdensome path for a specific demographic — which raises equity concerns.
How do you keep the oversight board independent long-term?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

The proposal includes staggered terms, supermajority removal requirements, and an inspector general with independent authority. But no institutional design is immune to political capture over decades. This is a governance challenge, not a technology problem.
How does VoteChain integrate with tribal nations?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Tribal IDs and governance structures are unique. The design calls for dedicated engagement with tribal governments and treating tribal enrollment authorities as first-class participants. But no specific integration model has been proposed — this requires direct tribal consultation.
Is coercion resistance actually achievable for remote voting?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Maybe not fully. Revoting and in-person override reduce coercion but do not eliminate it. The EWP itself states that "no protocol can fully solve this" for uncontrolled environments. Mode 3 has seven hard gate criteria, and coercion mitigation effectiveness is one of them.
Can federal data sources (SSA, USCIS) actually meet reliability targets?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

This is a major integration risk. VoteChain depends on government APIs that may need significant modernization to meet uptime and latency targets. A formal API readiness audit is proposed but has not been conducted. The high-risk budget scenario accounts for this.
What is the acceptable trustee threshold for ballot decryption?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

The threshold "t" and total "n" for trustee key holders affect both security (collusion resistance) and operational complexity (key ceremony logistics, availability during tally). The right numbers depend on the governance model for federal vs. state elections.
What conformance tests are needed for independent implementations?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Without a published conformance suite and test vectors, interoperability between different implementations is aspirational. This must be resolved before any multi-vendor deployment — otherwise each vendor's system may produce incompatible results.
What minimum staffing model supports 24/7 global voter operations?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

VoteChain needs help desk coverage across all time zones and major languages, with surge capacity during elections. The baseline staffing model, partner surge contracts, and election-week multipliers have not been specified. This directly affects the cost model.

Comparison to Alternatives

8 1 open

How VoteChain compares to paper IDs, centralized databases, and other systems.

How does VoteChain compare to current paper ID checks?
Paper ID checks are simple but have weaknesses: fake IDs exist, fraud detection takes weeks, poll workers see your personal information, and 50 states have 50 different rules. VoteChain aims for faster fraud detection, stronger tamper resistance, and better privacy — but at higher cost and complexity.
Why not just build a centralized national voter database?
A central database creates a single point of failure. One hack, one compromised admin, or one corrupt official could alter records for millions of voters. VoteChain distributes the ledger across 74 independent nodes — compromising the system requires corrupting a majority across multiple categories.
How does VoteChain compare on privacy?
Paper ID checks: the poll worker sees your name and photo. Centralized database: the government sees everything. VoteChain: zero-knowledge proofs mean the poll worker sees only a green or red light, and no PII exists on the blockchain. VoteChain is architecturally the strongest on privacy.
How does VoteChain compare on cost?
Paper ID checks cost roughly $1–3 per vote. A centralized database would cost about $4. VoteChain costs about $5.60 per vote — the most expensive option. The justification is that the additional cost buys tamper-resistance, real-time fraud detection, and public auditability.
What about just improving post-election audits?
Better audits are valuable but catch fraud too late. By the time a post-election audit finds issues, invalid ballots may already be counted, results may already be certified, and remedies may be limited. VoteChain detects cryptographic conflicts in seconds, not weeks.
How does VoteChain compare to the SAVE Act approach?
The SAVE Act focuses on document-based citizenship verification at voting time. VoteChain's approach is "verify once with multiple databases, then use cryptographic credentials." The key difference: VoteChain aims to reduce voter burden rather than increase it, while still achieving stronger verification.
Could VoteChain ideas be combined with simpler approaches?
Yes. Some VoteChain components — like the real-time duplicate detection via nullifiers or the continuous death record monitoring — could be implemented without a full blockchain. The design is modular, and partial adoption of specific ideas is possible.
What system best handles the threat of a compromised insider?
Open

This is an open question. The answer below describes what is currently known. The highlighted area remains unsolved or requires further research.

Paper ID systems rely on the poll worker's judgment. A centralized database can be altered by its administrator. VoteChain's immutable multi-party ledger means a compromised official cannot alter records without detection. However, no system is immune to insider threats at the governance level — this remains an open challenge.