The SIV Protocol makes voting fast & easy, while ensuring an auditable voter roll, end-to-end voter verifiability, and strong privacy.

Even if the worst actors are in charge of election infrastructure, anyone can verify whether the election was run fairly or not.

Screenshot of SIV Vote UI

BACKGROUND

SIV is already being used for impactful elections, having elected legislators and executives at the local, state, and national levels.

There are thousands more election administrators around the world, searching for truly secure, easy-to-use ways to allow citizens to vote and make their voices heard.

But the bar for security is incredibly high.

The threat model is adversarial Nation States, willing to expend military-sized budgets to seek any advantage available.

We invite you to play a role in evaluating and strengthening democracy for millions of people around the world.

Can you find novel ways to ....?

1) Vote multiple times
2) Change someone else's vote, without detection
3) Destroy a vote already confirmed submitted
4) Learn how someone voted, without their help
5) Learn other personal info about voters
Bonus: Convince us of major score updates to docs.siv.org/compare
We are especially interested in attacks against the SIV Protocol, not just the current implementation.

Found a vulnerability?

Submit it to the public repo: github.com/siv-org/siv/issues

Or email: hack@siv.org

Hacking Resources

Signup for future updates