For Elections That Unite™

SECURE.

TRANSPARENT.

ACCESSIBLE.

Redo Voting is an apolitical, non-partisan organization with a zero-tolerance policy regarding special interest involvement with or funding for our method on any level or in any form. We passionately believe that to provide an effective, trusted, and objective election method, there must be no outside involvement or influence on our methods, technology, or outcomes. As an organization, we do not care who wins any election; only that elections are conducted with the highest standards of accessibility, security, and transparency, and that the results are accepted as valid and accurate by all involved and interested parties.

PROBLEM: DOES MY VOTE COUNT?

 

Political contention has spread from the campaign trail to the ballot box, and people are increasingly losing confidence in our election process.

Each side claims the other is cheating the method, but no one can provide conclusively indisputable proof.

Our current method are cumbersome, all votes are not always counted (e.g., absentee ballots and military ballots). Sometimes, election outcomes are not known for weeks because a lack of confirmed chain-of-custody integrity creates space for doubt.

Secretaries of State are besieged and not equipped to provide the transparency demanded.

Is there a solution both sides can agree upon that can bring confidence and integrity back to our elections? The answer is a resounding YES!

 

SOLUTION: REDO VOTING. YOUR VOTE WILL ALWAYS COUNT!

The world’s first automated, completely auditable, digitally secure, large-scale voting method. Click the STARS below to learn more.

SECURITY

In the most direct terms, Redo Voting is a mashup of existing secure document technology used by state lotteries, combined with government-level encryption, resulting in a voting method that is paper based, but uses a web browser for data entry.

Our security protects privacy, ensures that voters are physically safe, protected from intimidation, harassment, or harm, and that their legitimate individual votes are delivered and tabulated as cast in a timely, accurate, and legally defined manner.

ACCESSIBILITY

Accessibility ensures that every registered voter has uncomplicated access to legally exercise their right to vote in local, state, and federal elections without unreasonable difficulty.

There are two sides to the accessibility argument. One side claims that making ballot access too easy dilutes security and allows illegitimate votes to be injected into the process. The other side claims that systematic efforts to restrict ballot access in the name of security has the effect of disenfranchising and intimidating important subsets of legitimate voters.

AUDITABLE

Redo Voting allows for third parties to audit the election in real time and to perform their own tallies of the decrypted results. This ensures full transparency and auditability, as the encrypted election data cannot be viewed without the encryption key.

Because the encryption of a voter’s individual ballot is tied directly to the QR code in their possession, seen only by their eyes, they and only they can use that QR code to confirm their vote was submitted as cast. This ensures the reliability of the system from the beginning of the process when the voter acquires their ballot access card into perpetuity, as a voter has perpetual exclusive access to their personal ballot.

CONFIDENCE

Confidence is a combination of auditability, transparency, and reliability, ensuring that there is a clearly observable, unobstructed path from the point where a vote is cast to where it is tabulated, resulting in a verified artifact from each voting transaction. Ensuring that the process for casting and tabulating votes is well understood and the rules clearly followed. Ensuring that final vote tabulation is completely trustworthy and accurate.

SCALABLE

Every Redo ballot is processed in exactly the same way as every other Redo ballot, with exactly the same security and transparency applied to each one. There is no batch processing of voter transactions. Each individually encrypted transaction moves directly from the voter to a trusted digital repository on a .gov server. Any election can be scaled from three voter transactions (only because there is really no point to an election with one or two voters) to as many voter transactions as a trusted digital repository can accommodate. With cloud computing, the size of a trusted digital repository is infinite.

UN-HACKABLE

Given enough computing power and time, theoretically, everything is hackable. However, to hack into even one voter transaction encrypted with SHA-512-bit encryption, you would need the computing power of a modern nation state and more time than the universe has been in existence to be successful.

The un-hackable claim rests on two important aspects. First, the use of QR codes for access. QR Codes cannot be hacked, but it is possible to replace a QR Code by another or to create a QR Code that will redirect to malicious content. Because distribution-controlled scratch-off ballot access cards contain QR codes that will never have been seen before they are used, that possibility drops off dramatically.

PATENTED TECHNOLOGY

Redo Voting has applied for both domestic and international patents on the Redo Voting process. The process applies two established secure technologies, SHA-2 encryption and QR codes. The SHA-2 family of algorithms are patented under U.S. patent 6829355, which is released under a royalty-free license. There are no copyright or patent restrictions on QR codes. It is the combination of these two technologies creating a secure, un-hackable multi-use tabulation platform that is patented.

TRANSPARENCY

The entire Redo Voting method is open to the public and verifiable before, during, and after an election. That is what true TRANSPARENCY looks like.

By the paper Ballot allowing data entry using a pc or mobile phone browser, we provide all browser standards for ADA and other compliance.

SOLUTION: WITH REDO VOTING, YOUR VOTE WILL COUNT!

The world’s first automated, completely auditable, digitally secure, large-scale voting system. Here is a Sample Ballot Card. Clicking on the tabs to learn more.

SECURITY

In the most direct terms, Redo Voting is a mashup of existing secure document technology used by state lotteries, combined with government-level encryption, resulting in a voting system that is paper based, but uses a web browser for data entry.

Our security protects privacy, ensures that voters are physically safe, protected from intimidation, harassment, or harm, and that their legitimate individual votes are delivered and tabulated as cast in a timely, accurate, and legally defined manner. CONTINUE READING

TRANSPARENCY

The entire Redo Voting system is open to the public and verifiable before, during, and after an election. That is what true TRANSPARENCY looks like.

By the paper Ballot allowing data entry using a pc or mobile phone browser, we provide all browser standards for ADA and other compliance.

PATENTED TECHNOLOGY

Redo Voting has applied for both domestic and international patents on the Redo Voting process. The process applies two established secure technologies, SHA-2 encryption and QR codes. The SHA-2 family of algorithms are patented under U.S. patent 6829355, which is released under a royalty-free license. There are no copyright or patent restrictions on QR codes. It is the combination of these two technologies creating a secure, un-hackable multi-use tabulation platform that is patented.
CONTINUE READING

AUDITABLE

Redo Voting allows for third parties to audit the election in real time and to perform their own tallies of the decrypted results. This ensures full transparency and auditability, as the encrypted election data cannot be viewed without the encryption key.

Because the encryption of a voter’s individual ballot is tied directly to the QR code in their possession, seen only by their eyes, they and only they can use that QR code to confirm their vote was submitted as cast. This ensures the reliability of the system from the beginning of the process when the voter acquires their ballot access card into perpetuity, as a voter has perpetual exclusive access to their personal ballot.

CONFIDENCE

Confidence is a combination of auditability, transparency, and reliability, ensuring that there is a clearly observable, unobstructed path from the point where a vote is cast to where it is tabulated, resulting in a verified artifact from each voting transaction. Ensuring that the process for casting and tabulating votes is well understood and the rules clearly followed. Ensuring that final vote tabulation is completely trustworthy and accurate.

SCALABLE

Every Redo ballot is processed in exactly the same way as every other Redo ballot, with exactly the same security and transparency applied to each one. There is no batch processing of voter transactions. Each individually encrypted transaction moves directly from the voter to a trusted digital repository on a .gov server. Any election can be scaled from three voter transactions (only because there is really no point to an election with one or two voters) to as many voter transactions as a trusted digital repository can accommodate. With cloud computing, the size of a trusted digital repository is infinite.

ACCESSIBILITY

Accessibility ensures that every registered voter has uncomplicated access to legally exercise their right to vote in local, state, and federal elections without unreasonable difficulty.

There are two sides to the accessibility argument. One side claims that making ballot access too easy dilutes security and allows illegitimate votes to be injected into the process. The other side claims that systematic efforts to restrict ballot access in the name of security has the effect of disenfranchising and intimidating important subsets of legitimate voters. CONTINUE READING

UN-HACKABLE

Given enough computing power and time, theoretically, everything is hackable. However, to hack into even one voter transaction encrypted with SHA-512-bit encryption, you would need the computing power of a modern nation state and more time than the universe has been in existence to be successful.

The un-hackable claim rests on two important aspects. First, the use of QR codes for access. QR Codes cannot be hacked, but it is possible to replace a QR Code by another or to create a QR Code that will redirect to malicious content. Because distribution-controlled scratch-off ballot access cards contain QR codes that will never have been seen before they are used, that possibility drops off dramatically. CONTINUE READING

VOTING METHOD COMPARISON

 

REDO VOTING is the first fully automated, completely auditable, digitally secure, large-scale voting method in the world. It combines modern digital cryptography and data management technologies with secure paper documents/ballots to ensure an end-to-end, unbreakable chain-of-custody.

REDO VOTING reduces the need for early voting, eliminates delays in tabulation, and allows for legal ballots (including absentee / military ballots) to be cast in real-time via a secure browser.

It detects and stops irregularities, is forensically auditable, and produces accurate results, all in real-time.

REDO VOTING provides 100% mathematical validation of every ballot.

 

THE ONLY WAY TO SECURE OUR VOTING PROCESS

 

Current processes cannot compare to REDO VOTING’s process security.

Hand-Fed Ballots

See that paper ballot being hand-fed into that machine? That is a problem. It is not a secure document and has no chain-of-custody. There is no way to determine whether or not it is a legitimate vote in an initial tally or hand recount.

Absentee Ballots

Absentee balloting is just as fallible. The number of envelopes around the vote is irrelevant if there is no observable, confirmed chain-of-custody. You should be sent a ballot that is YOURS, and your vote should be submitted as a secure document protected from tampering and misallocation.

Securely Printed

REDO VOTING ballots are printed by the same professionals that state lotteries have relied upon for 30 years to print $80 BILLION in tickets each year. If there was a way to hack this method, it would have happened by now.

Securely Delivered

Securely delivered by the same professionals that state lotteries rely upon to deliver BILLIONS of state lottery tickets each year. Every ballot is digitally tracked from the printer, right up to when you cast your vote.

REDO VOTING’s ballot is cryptographically assigned to YOU and only you. It is digitally tracked from the printer to the place you pick it up, and issued to you as a secure document with the same digital identification check used for purchasing cigarettes or alcohol. No one but you can use your registration when you pick up your ballot. Additionally, no person or computer program can EVER connect you to your vote once cast because one-way encryption disassociates your identity from your ballot. The method only knows that your vote is cast from a legitimate registration, and it goes directly to your state’s repository.

FREQUENTLY ASKED QUESTIONS 

Q: How do I scan a QR Code?

 

A: You simply open the camera on your phone just like you’re taking a picture and point the phone camera at the QR Code. The camera app will then present a button to follow the link to a web browser page. It does not matter which web browser your phone uses.

Q: How secure is a QR code? Can a QR code be hacked?

 

A:  Hacking a QR code would mean that the action triggered when it was scanned would have been modified through manipulation. This is not possible because it is the arrangement of the small square modules by which the data is encoded that determines this action. To change this action, one would have to change the arrangement of the modules after it was printed out.

It is possible to replace a QR code with another or to create a QR code that will redirect to malicious content, but because the individual user of the Redo Voting ballot card will be the only person to ever see the QR codes, hacking this ballot card would require the active cooperation of the voter. Even then, the only vote that could be “hacked” would be their own.

Q: How do I get a Ballot?

 

A: You visit any location that your local election officials have allowed to carry Ballots. This might include polling places, government buildings like court houses or the Department of Motor Vehicles etc.

Q: Isn’t 512-bit encryption easy to hack? I read that it can be hacked in a matter of hours.

 

A: There are several types of 512-bit encryption, some of which are vulnerable to hacking attacks. Redo Voting uses the most current secure hash technology available from the SHA family of cryptographic secure hash algorithms, compatible with a 512-bit variant. The hash algorithms are one-way, based on a non-linear function, and specifically designed to prevent decryption. The only possible method for cracking a SHA family bit encryption is to assume that the hash content is a password, recover a database of online passwords belonging to a specific voter, and compare the hash to that list.

Because there are no passwords used in the Redo Voting method, the encryption cannot be hacked by any means known to man.

Q: Un-hackable? How can you say your system is un-hackable? EVERYTHING IS HACKABLE!

 

A: That is true. Given enough computing power and time, theoretically, everything is hackable.

The un-hackable claim rests on two important aspects.

First, the use of QR codes for access. It is, of course, possible to spoof/replace a QR code with another or to create a QR code that will redirect to malicious content. However, because our secure ballots are distribution-controlled from the printer to your hands, the QR codes under the scratch materials have NEVER been seen before they are used by YOU. Trying to spoof a QR code that has never been seen would be akin to trying to accurately guess the exact weight of a rock on the first try when the size range is somewhere between a grain of sand and the sun.

Secondly, each individual QR code contains a unique one-way secure hash algorithm (SHA) shared only by the other three QR codes on that ballot. SHA is a mathematical algorithm that converts an input string of an arbitrary length to an output string of a fixed length. Think of it as a universally unique value that cannot be reversed like normal encryption. The individual voter’s identity is cryptographically disassociated from their ballot when registration is confirmed. After that, the system recognizes only legitimate transactions for the activated ballot itself. The ballot is verified, secure, and irreversibly anonymous.

Given enough computing power and time, theoretically, everything is hackable. To hack into even one voter transaction encrypted with one-way SHA encryption, you would need the computing power of a modern nation state and more time than the universe has been in existence.

Q: What about absentee voting? How does that work?

 

A: Absentee voting can be conducted electronically and in real time. An absentee vote is requested online with verified registration. The requestor creates a personalized four-digit PIN to be associated with the ballot serial number on the scratch-off ballot access card mailed to them by the state. When the requestor accesses the voter registration/registration confirmation page with the first QR code, they must enter their four-digit PIN to continue the transaction. An absentee ballot may be cast securely in real time from anywhere on earth, but only by the voter who requested it. If an astronaut takes their scratch-off ballot access card with them, they can vote securely and in real time from space.

Q: So, you are saying that elections are now going to be electronic? Some people will never accept that!

 

A: No, we are not saying that. We are saying that our system is fully compliant with all state and federal election legislation and can be tailored to support 100% in person voting, 100% remote voting, or any combination of the two. We are also fully capable of seamlessly complementing any election system in existence.

Q: What if the ballot card is lost or destroyed?

 

A: Grab another one, repeat. Unlike a lottery scratch-off card, the ballot card has no intrinsic value until the first QR code is scanned and the card is associated with a specific voter registration. The system tracks fraud attempts cryptographically so multiple cast ballots cannot be tallied. In fact, this system can provide real time fraud tracking down to the precinct level during an election, both voting precincts and police precincts.

Q: Won’t my personal information be at risk if you use a digital repository on the cloud?

 

A: Your personal information would never be on the cloud; only your secure vote in the digital repository which, if you recall, cannot ever be traced back to you.

Q: What if the cloud is owned and operated by a foreign company who uses it to steal information and assets?

 

A: Unethical use of cloud services has occurred with both foreign and domestic companies. Even though the technology itself is secure, there is the potential for malevolent behavior by cloud operators. Breaking into a secure digital repository containing votes cast under the Redo Voting system, however, would be a monumental waste of time.   The results would already be public, so it would be like stealing yesterday’s newspaper. That is one of the huge advantages offered by the Redo Voting method.

Q: What about the elderly who have no access to technology?

 

A: You raise an important question. Although Redo Voting does provide more universal and complete voter access than any election system in existence, there are some people, like the elderly with technology access challenges, who will need additional assistance.

Another feature of Redo Voting is that the average cost per voter is about 40% lower than any other system available. This is a permanent cost-saving, because our system has no hardware replacement costs. Additionally, with 100% mathematically provable results, the costs of post-election litigation will evaporate. These permanent cost savings can be applied as a line item to the state social services budget for measures to address this gap in access.
Redo Voting is eager to partner with states to help them find effective social service based solutions.

Q: This method sounds incredible. Is there not any way to beat it?

 

A: Actually, there is a way. As mentioned before, Redo Voting is compatible with any voting method currently in use. If combined with a system that does not have an unbreakable, fully auditable chain of custody, however, there is the potential for someone to vote on the insecure system before voting on the Redo Voting method without being detected. For unassailably accurate, trustworthy results, use of the Redo Voting method alone is recommended.

Q: What about Russian interference? Can you stop that?

 

A: The Redo Voting puts a stop to any and all direct interference in the voting process, regardless of its source. Registration is secure. Submitting a ballot is secure. Tabulation is secure and results are mathematically provable.

We cannot stop social engineering, rumors on social media, conspiracy theories, or any rhetoric external to the voting process itself. Redo Voting fully supports freedom of speech, even when we do not agree with what is being said. We do not, will not, and cannot guarantee any election outcome; only that the outcome accurately reflects the will of the legitimately voting public.