Protocol for Remediating Compromised Votes
If a voter detects a tampered vote — whether using Verification #, a 2nd-Device Check, or during a Risk Limiting Audit — election administrators have the ability to invalidate the vote and permit the voter to submit a new one.
This process necessitates written documentation, in which the voter explicitly requests their vote to be revoked, ensuring a comprehensive audit trail. The remediation process can be conducted in person, via mail, or through other communication channels. The specific details will vary depending on the election requirements. SIV can accommodate and adapt to the necessary protocols.
In the rare circumstance where a vote must be invalidated after it has already been submitted and accepted, SIV prioritizes security and transparency.
Everyone will be able to see that the original encrypted vote was invalidated, ensuring voters can have confidence that legitimate submitted votes cannot be secretly removed.
The list of votes is backed by a Merkle Tree (opens in a new tab), a powerful cryptographic data structure similar to a blockchain, but faster, environmentally-friendly, and requiring no cryptocurrency.