Truth in Voting.
You have the right to know how your vote is counted. Our patented process to give you complete access to the same software that is running on the voting systems. Printers, scanners and tabulators are all published on our website. Anyone is free to download and review the code from end to end to ensure there is no possibility of abuse or fraud.
All you need to do is point any smart phone camera at the QR code provided on the scanner or ballot marking device and you'll be taken immediatly to our web site where you can down the code for your own review. We even give you the "fingerprint" of the software running on the scanner from the scanner in real time so you can know our software is what we claim it is, right down the last keystroke.
We have a patented process where we track the serial number of each and every ballot from the moment it is printed until final tabulation. While the voter is never associated with their ballot to maintain voter privacy, our print on demand system generates a new unique serial number for each ballot printed. This number is recorded again when the ballot is scanned for processing and the tabulation process verifies that each official ballot printed and scanned is indeed a true and unique ballot.
By using this chain of custody method for every legitimate ballot, we ensure that the vote is true and correct.
We've eliminated fraudulent ballots and the removed the ability to double count legal ballots with this patented process. Every legal vote gets counted once and only once.
At Veritas Voting, we strongly believe in end to end security for all aspects of the voting process. From system configuration, vote processing and system control before, durning and after the election.
We use the highest levels of FIPS compliant security to ensure all software tamper resistant to the fullest extent possible.
Beyond encryption, we strongly believe that security through obscurity is no security at all. This is another reason we make all of our code available to the public. The more people that review the code, the less chance there is chance there is for errors or fraud to occur.
Our system never allow for any type of network access of any kind. There are no wireless ethernet or Bluetooth adapters installed. The wired ethernet port is filled with epoxy after the initial configuration is performed and before shipping from our facility. The only exposed port is a physically locked USB port that requires several layers of authentication to access.