Professional Documents
Culture Documents
Precision Voting Systems Pitch - EDIT 10-22-21
Precision Voting Systems Pitch - EDIT 10-22-21
Between the national elections of 2016 and 2020, public perception of election integrity has fallen to an
alarmingly low level of trust. Traditional balloting methods are consistently questioned, and the arena of
ideas abandoned in favor of partisan accusations of irregularities and fraud. Public officials are vilified,
inflamed factions inspired to violence, and in the eyes of the world America is no different than any
other agitated realm calling itself a republic.
It cannot be this way. Absolute integrity, as well as the incorruptible perception of integrity, must be the
standard.
Precision Voting Systems provides a secure, online voting application that removes delays in tabulation,
allows for absentee ballots and military ballots to be cast in real time, detects and stops any
irregularities in real time, and is 100% auditable both forensically and in real time.
100% secure and protected voting can be done from a phone application or computer without fear of
the voter or system being compromised or any credible accusation of fraud or irregularity.
The system can be tailored to encompass any and all balloting activity from local to national elections
with a facility for state level Secretary of State offices to adjudicate provisional ballots in real time.
Precision Voting Systems can interface with a state’s voter registration records and refer any
irregularities to the Sec State office, while protecting the integrity and privacy of every individual’s vote.
No more accusations of electoral fraud. No more accusations of voter suppression. No more drawn-out
ballot counts or recounts (polls close at 7:00, results delivered to SecState at 7:05). The will of the
people is accurately and immediately reflected when the polls close. No more riots or protesting over
election results. No more property damage, no more carnage. Only transparent popular sovereignty and
completely peaceful transition of power.
Precision Voting Systems removes politics from the courtroom and incendiary street rage and returns
it to the arena of ideas.
Precision Voting Systems does not use inner-source or open-source coding. Precision Voting Systems
coding is patented and proprietary, and the software platform itself is available only on election days.
The simplicity of the system also serves as a defense. The user interface is point and click, so the back-
end is not accessible outside of Stratum Zero. Because the code is not accessible, the business logic of
the system is protected.
No system is un-hackable, but Precision Voting Systems’s defense array exceeds any current human
hacking capability. Suppose a hacker successfully locates the needle in the haystack, accesses the
Precision Voting Systems code, and attempts to make changes in the business logic. The system
immediately detects the attempt and ghosts the entire program to a different internet protocol on an
entirely different and infinite cloud infrastructure. The software may be hosted in any of nearly 80 data
centers across the continental United States, each with 30,000 to 80,000 physical servers, and each of
those physical servers can generate up to 500 virtual servers. While theoretically possible, the chances
of even locating the haystack again are astronomical.
Data is at rest when it is stored on a hard drive. In this relatively secure state, information is primarily
protected by conventional perimeter-based defenses such as firewalls and anti-virus programs.
However, Stratum Zero understands that these barriers are not impenetrable. This is why we have
constructed additional layers of defense to protect sensitive data from intruders in the extraordinarily
unlikely event that the network is compromised, and any data at rest is containerized and deleted once
votes are recorded.
Data in use is more vulnerable than data at rest because, by definition, it must be accessible to those
who need it. Of course, the more people and devices that have access to the data, the greater the risk
that it will end up in the wrong hands at some point. Stratum Zero employs access control measures as
tightly as possible incorporate token authentication to ensure that users are not hiding behind stolen
identities. We also track and report any suspicious activity detected, diagnose potential threats, and
proactively improve security.
Data is at its most vulnerable when it is in motion. Stratum Zero ensures that votes remain confidential
by transmitting them through an encryption platform that fully integrates with Precision Voting Systems.