Securing data in a server is a hard task where even the most powerful companies fail. The problem disapeears if there is no sensible data to safeguard.
Voters join automatically to form independent clusters of voters. Every cluster makes an independent voting. The result from every cluster is signed by every voter and stored in the server. Nobody can falsify the results without knowing the private key from every voter. Even organizers and we, the creators of the software, are unable to do it.
|Paper ballots||Centralized online voting||Igloovote|
In an election important economic interests can be involved. The greater the interests involved, the bigger the resources that attackers could involve. the bigger the resources from the attackers, the bigger the resources needed to defense against possible attacks. In an election that makes use of Igloovote, the attackers know the maximum they can achieve is cancelling or invalidating the election. They can't falsify results and so, no reward is possible
Given that security doesn't rely on persons supervising the process, a lot of expenses are unnecesary compared to other voting methods. Because of the low rewards to possible attackers, safeguard resources only need to focus on maintaining the infrastructure operative.
If you want to organize an election, you only need to provide us the census and the list of available options to vote. The voters will make use of the already available infrastructure, including our servers, data visualization software, and our apps for Android and iOS.
It works on any modern browser, including desktop computers, smartphones and tablets. If you want to use it in mobile devices you can also make use of our Android and iOS apps that make easier to operate in these platforms
Thanks to the fact that you don't need to involve specialized professionals following an strict protocol, like it happens with other methods, the time needed to organize an election is severely reduced.