{"id":526,"date":"2026-01-29T05:34:34","date_gmt":"2026-01-29T05:34:34","guid":{"rendered":"https:\/\/squareright.com\/?p=526"},"modified":"2026-01-31T02:26:14","modified_gmt":"2026-01-31T02:26:14","slug":"a-blueprint-for-a-better-voting-system","status":"publish","type":"post","link":"https:\/\/squareright.com\/?p=526","title":{"rendered":"A Blueprint for a Better Voting System"},"content":{"rendered":"\n<p class=\"has-medium-font-size\"><strong>Why Our Voting System Cannot Prove Its Own Integrity<\/strong><\/p>\n\n\n\n<p>Every democratic election depends on one simple rule:<\/p>\n\n\n\n<p><strong>Each eligible citizen may vote once \u2014 and only once \u2014 in each contest.<\/strong><\/p>\n\n\n\n<p>Our current voting system cannot prove that rule was followed.<\/p>\n\n\n\n<p>Before an election even begins, there is no authoritative answer to a basic question:<\/p>\n\n\n\n<p><strong>Exactly how many people are eligible to vote in this election?<\/strong><\/p>\n\n\n\n<p>Eligibility information is scattered across agencies and states that operate independently. No single system produces a final, auditable count of eligible voters. As a result, voting begins without a fixed limit. Ballots are cast before the maximum number of legitimate votes is known.<\/p>\n\n\n\n<p>What follows is a system built on procedures and trust:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>voter rolls<\/li>\n\n\n\n<li>signatures<\/li>\n\n\n\n<li>audits<\/li>\n\n\n\n<li>recounts<\/li>\n\n\n\n<li>explanations after the fact<\/li>\n<\/ul>\n\n\n\n<p>These methods can reduce error, but they cannot <strong>guarantee<\/strong> outcomes. They cannot mathematically prevent duplicate voting. They cannot make fake or excess votes impossible. They can only attempt to detect problems later \u2014 and ask the public to trust the result.<\/p>\n\n\n\n<p>It is a <strong>design problem<\/strong>.<\/p>\n\n\n\n<p>Traditional databases and oversight systems cannot fix this because they rely on administrators and policy decisions. Limits are enforced by rules people are expected to follow, not by math. Records can be altered. Audits require insider access. The public is never shown proof that violations could not occur.<\/p>\n\n\n\n<p>Cryptographic shared ledgers exist for one reason:<\/p>\n\n\n\n<p><strong>To enforce strict limits in systems where trust alone is not enough.<\/strong><\/p>\n\n\n\n<p>They allow rules to be enforced automatically and visibly:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>exactly <em>N<\/em> voting units can exist<\/li>\n\n\n\n<li>each unit can be used once<\/li>\n\n\n\n<li>no additional votes can be created<\/li>\n\n\n\n<li>totals can be verified by anyone<\/li>\n\n\n\n<li>individual votes remain secret<\/li>\n<\/ul>\n\n\n\n<p>Voting is, at its core, the controlled issuance and use of voting power. Cryptographic shared ledgers are uniquely capable of enforcing that control \u2014 regardless of how uncomfortable or unfamiliar the technology may seem.<\/p>\n\n\n\n<p>Avoiding this technology does not protect democracy.<br>It preserves a system that cannot prove its own legitimacy.<\/p>\n\n\n\n<p>This paper presents a voting system that makes it mathematically impossible to exceed the number of eligible voters, to vote more than once, or to alter results without detection \u2014 while preserving ballot secrecy, accessibility, and state autonomy.<\/p>\n\n\n\n<p>In simplest terms, think of &#8220;crypto&#8221;.  Only a set number of coins are minted.  Voters can only have one coin to send to one candidates wallet.  Whatever candidate ends up with the most coins is unarguably the winner.  The rules are verifiable and as secure as crypto itself.<\/p>\n\n\n\n<p>It does not change who is allowed to vote.<br>It does not require online voting.<br>It does not ask the public to trust the system.<\/p>\n\n\n\n<p><strong>It just proves a better system.<\/strong> <\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Enforcing Democratic Limits with Cryptographic Shared Ledgers<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Executive Summary<\/h2>\n\n\n\n<p>The United States voting system relies on procedures, institutional trust, and post-election reconciliation to ensure fair outcomes. While these methods have historically functioned, they suffer from a fundamental limitation: <strong>they cannot prove that only eligible voters voted, or that each voter voted only once<\/strong>.<\/p>\n\n\n\n<p>This paper proposes a technically achievable solution that replaces procedural trust with <strong>verifiable limits<\/strong>, using cryptographic shared ledgers and fixed-issuance voting tokens. These mechanisms\u2014already used to enforce strict limits in adversarial environments\u2014make it possible to mathematically guarantee one-person-one-vote while preserving ballot secrecy, accessibility, and public auditability.<\/p>\n\n\n\n<p>This proposal does <strong>not<\/strong> change who is eligible to vote, does <strong>not<\/strong> eliminate secret ballots, and does <strong>not<\/strong> require public online voting. It upgrades the enforcement model of elections from trust-based procedures to proof-based constraints.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">1. The Fundamental Failure of the Current Voting System<\/h2>\n\n\n\n<p>Modern U.S. elections cannot conclusively answer three basic questions:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>How many people were eligible to vote in this election?<\/li>\n\n\n\n<li>How many votes could possibly exist?<\/li>\n\n\n\n<li>Did any individual vote more than once?<\/li>\n<\/ol>\n\n\n\n<p>Current systems rely on voter rolls, poll books, signature verification, audits, and recounts. These are <strong>procedural controls<\/strong>. They reduce error, but they do not enforce hard limits.<\/p>\n\n\n\n<p>In an environment of polarization and declining institutional trust, outcomes that rely on \u201ctrust us\u201d explanations lose legitimacy. This is a <strong>limit-enforcement problem<\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">2. Why Traditional Databases and Audits Cannot Solve This<\/h2>\n\n\n\n<p>Traditional databases are controlled by administrators. Even with oversight:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>records can be altered<\/li>\n\n\n\n<li>limits are enforced by policy, not math<\/li>\n\n\n\n<li>audits require insider access<\/li>\n\n\n\n<li>the public cannot independently verify enforcement<\/li>\n<\/ul>\n\n\n\n<p>A system that depends on trusted administrators cannot provide public proof that rules were never violated. To fix this, enforcement must be automatic, visible, and independent of institutional trust.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">3. Why Cryptographic Shared Ledgers Are Necessary<\/h2>\n\n\n\n<p>Cryptographic shared ledgers (often called blockchains) were designed to answer one question:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>How do you enforce strict rules and fixed limits without trusting a central authority?<\/p>\n<\/blockquote>\n\n\n\n<p>They provide four properties no other system provides together:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Fixed issuance<\/strong> \u2014 exactly <em>N<\/em> units can exist<\/li>\n\n\n\n<li><strong>Single-use enforcement<\/strong> \u2014 units cannot be reused<\/li>\n\n\n\n<li><strong>Public verification<\/strong> \u2014 anyone can audit totals<\/li>\n\n\n\n<li><strong>Rule immutability<\/strong> \u2014 rules cannot be quietly changed<\/li>\n<\/ol>\n\n\n\n<p>Voting is fundamentally the issuance, limitation, and consumption of voting authority. Cryptographic shared ledgers are uniquely suited to this task.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">4. Problem #1 \u2014 Citizenship Matters<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">The problem<\/h3>\n\n\n\n<p>There is no authoritative nationwide answer to the question:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cExactly how many people are eligible to vote in this election?\u201d<\/p>\n<\/blockquote>\n\n\n\n<p>Eligibility information is fragmented across agencies and states. Voter registration relies heavily on self-attestation, and disputes often occur after voting begins.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The solution<\/h3>\n\n\n\n<p>Create a <strong>narrowly scoped federal voter-eligibility authority<\/strong> whose sole function is to produce a final eligibility snapshot for federal elections.<\/p>\n\n\n\n<p>Constraints:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>it does not grant citizenship<\/li>\n\n\n\n<li>it records determinations made by existing authorities<\/li>\n\n\n\n<li>it provides notice, correction, and appeal<\/li>\n\n\n\n<li>it is legally barred from unrelated uses<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Why this fixes the problem<\/h3>\n\n\n\n<p>It produces a <strong>fixed, auditable number of eligible voters before voting begins<\/strong>, enabling all downstream enforcement.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">5. Anti-Surveillance Guarantees (Critical Safeguard)<\/h2>\n\n\n\n<p>This system must not become surveillance infrastructure.<\/p>\n\n\n\n<p>Mandatory guarantees:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Purpose limitation:<\/strong> eligibility determination for federal elections only<\/li>\n\n\n\n<li><strong>Data minimization:<\/strong> eligibility status and minimal identity binding only<\/li>\n\n\n\n<li><strong>Legal firewalls:<\/strong> explicit prohibition on use for law enforcement, immigration enforcement, taxation, benefits enforcement, or intelligence collection<\/li>\n\n\n\n<li><strong>Penalties:<\/strong> criminal penalties and civil liability for misuse<\/li>\n\n\n\n<li><strong>Transparency:<\/strong> public access logs, audit reports, and change records<\/li>\n<\/ul>\n\n\n\n<p>The system makes <strong>vote limits public<\/strong>, not <strong>citizen behavior public<\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">6. Problem #2 \u2014 One Person, One Vote<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">The problem<\/h3>\n\n\n\n<p>Current systems cannot mathematically prevent double voting. They rely on procedures and detection after the fact.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The solution<\/h3>\n\n\n\n<p>Replace procedural enforcement with <strong>fixed issuance of voting authority<\/strong>.<\/p>\n\n\n\n<p>For each election:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Take the eligibility snapshot (<em>N<\/em> voters)<\/li>\n\n\n\n<li>Issue <strong>exactly <em>N<\/em> voting tokens<\/strong><\/li>\n\n\n\n<li>Enforce by ledger rules:\n<ul class=\"wp-block-list\">\n<li>no additional tokens can exist<\/li>\n\n\n\n<li>each token can be used once<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Why this fixes the problem<\/h3>\n\n\n\n<p>It becomes mathematically impossible to cast more votes than eligible voters or to vote more than once.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">7. Problem #3 \u2014 Real Elections Have Multiple Contests<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">The problem<\/h3>\n\n\n\n<p>Elections involve many independent decisions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The solution<\/h3>\n\n\n\n<p>Use <strong>contest-scoped voting tokens<\/strong>.<\/p>\n\n\n\n<p>For each contest:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>issue one token per eligible voter<\/li>\n\n\n\n<li>cryptographically bind the token to that contest<\/li>\n\n\n\n<li>allow it to be used once<\/li>\n\n\n\n<li>expire it after the election<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Why this fixes the problem<\/h3>\n\n\n\n<p>It enforces one-person-one-vote <strong>per contest<\/strong>, mirrors real ballots, and simplifies auditing.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">8. Federal-Only Baseline and State Autonomy<\/h2>\n\n\n\n<p>This proposal applies to <strong>federal elections only<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>States retain control over election administration<\/li>\n\n\n\n<li>States retain residency and registration rules<\/li>\n\n\n\n<li>States may opt in for state or local contests<\/li>\n\n\n\n<li>Federal funding supports federal standards without coercion<\/li>\n<\/ul>\n\n\n\n<p>This is a <strong>verification layer<\/strong>, not a federal takeover.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">9. Problem #4 \u2014 Secure Distribution of Voting Power<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">The problem<\/h3>\n\n\n\n<p>Voting fails if credentials are lost, stolen, or unrecoverable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The solution<\/h3>\n\n\n\n<p>Separate <strong>voting power<\/strong> from <strong>voting access<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Voting power exists as tokens in a ledger-backed wallet<\/li>\n\n\n\n<li>Access is provided via:\n<ul class=\"wp-block-list\">\n<li>voter card<\/li>\n\n\n\n<li>in-person terminal<\/li>\n\n\n\n<li>optional digital access<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Lost access can be revoked and reissued without increasing voting power.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">10. How Voting Works in Practice: Machines, Cards, and Digital Access<\/h2>\n\n\n\n<p>Voting is intentionally familiar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">In-person terminals<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hardened, single-purpose devices (similar to ATMs or ballot-marking devices)<\/li>\n\n\n\n<li>Display only eligible contests<\/li>\n\n\n\n<li>Accept selections and submit voting tokens<\/li>\n\n\n\n<li>Can operate offline and settle later<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Voter cards<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Authenticate voters and sign actions<\/li>\n\n\n\n<li>Do not store votes<\/li>\n\n\n\n<li>Do not expose private keys<\/li>\n\n\n\n<li>Can be revoked and replaced safely<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Digital access (optional)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Uses the same ledger rules<\/li>\n\n\n\n<li>Requires stronger authentication<\/li>\n\n\n\n<li>Not required for participation<\/li>\n<\/ul>\n\n\n\n<p>No voter sees tokens or cryptography. The ledger enforces limits invisibly.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">11. Can Voting Machines Be Manipulated?<\/h2>\n\n\n\n<p><strong>Yes.<\/strong><br>And that is precisely why this system does <strong>not<\/strong> trust machines with enforcement.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The key design assumption<\/h3>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Voting machines are assumed to be imperfect and potentially compromised.<\/strong><\/p>\n<\/blockquote>\n\n\n\n<p>The system is designed so that <strong>machine failure cannot break election integrity<\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">What a compromised machine <em>cannot<\/em> do<\/h3>\n\n\n\n<p>A compromised machine <strong>cannot<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>create extra votes<\/li>\n\n\n\n<li>allow someone to vote twice<\/li>\n\n\n\n<li>exceed the number of issued voting tokens<\/li>\n\n\n\n<li>silently change totals without detection<\/li>\n<\/ul>\n\n\n\n<p>Why?<br>Because every vote requires a <strong>valid, unused, contest-scoped voting token<\/strong>, and the ledger enforces those limits independently of the machine.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">What a compromised machine <em>could<\/em> try to do<\/h3>\n\n\n\n<p>A compromised machine might attempt to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>mis-display choices<\/li>\n\n\n\n<li>disrupt voting locally<\/li>\n\n\n\n<li>cause inconvenience or denial of service<\/li>\n<\/ul>\n\n\n\n<p>These are serious issues\u2014but they are <strong>localized, detectable, and recoverable<\/strong>, not systemic.<\/p>\n\n\n\n<p>They do <strong>not<\/strong> allow:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>mass ballot stuffing<\/li>\n\n\n\n<li>invisible double voting<\/li>\n\n\n\n<li>outcome manipulation at scale<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Detection, containment, and recovery<\/h3>\n\n\n\n<p>If a machine is compromised:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>anomalies appear as rejected or mismatched tokens<\/li>\n\n\n\n<li>damage is limited to that machine or location<\/li>\n\n\n\n<li>affected votes can be reviewed or re-cast<\/li>\n\n\n\n<li>the ledger\u2019s public record exposes inconsistencies<\/li>\n<\/ul>\n\n\n\n<p>This turns machine attacks into <strong>operational incidents<\/strong>, not election-breaking events.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Why this is safer than current systems<\/h3>\n\n\n\n<p>Today:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>machines both record votes <em>and<\/em> enforce limits<\/li>\n\n\n\n<li>if you distrust machines, you distrust the election<\/li>\n<\/ul>\n\n\n\n<p>Here:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>machines are interfaces<\/li>\n\n\n\n<li>the ledger enforces limits<\/li>\n\n\n\n<li>trust is placed in math and public verification<\/li>\n<\/ul>\n\n\n\n<p><strong>This is the same model used in modern financial systems.<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">12. Problem #5 \u2014 Transparency Without Surveillance<\/h2>\n\n\n\n<p>Anyone can verify:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>how many tokens were issued<\/li>\n\n\n\n<li>how many were used<\/li>\n\n\n\n<li>final tallies<\/li>\n<\/ul>\n\n\n\n<p>No one can see:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>who voted<\/li>\n\n\n\n<li>how any individual voted<\/li>\n<\/ul>\n\n\n\n<p>Transparency applies to <strong>limits and totals<\/strong>, not identities.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">13. Problem #6 \u2014 Coercion and Vote Buying<\/h2>\n\n\n\n<p>To prevent coercion:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>voting tokens are consumed on use<\/li>\n\n\n\n<li>no receipt proves a specific choice<\/li>\n\n\n\n<li>optional revote models allow correction before close<\/li>\n<\/ul>\n\n\n\n<p>Without proof, vote buying and coercion become unenforceable.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">14. Accessibility and Recovery Guarantees<\/h2>\n\n\n\n<p>This system must not disenfranchise.<\/p>\n\n\n\n<p>Minimum guarantees:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>no smartphone requirement<\/li>\n\n\n\n<li>multiple voting channels<\/li>\n\n\n\n<li>same-day local credential recovery<\/li>\n\n\n\n<li>emergency provisional pathways<\/li>\n\n\n\n<li>assistive voting without revealing choices<\/li>\n<\/ul>\n\n\n\n<p>A system that cannot recover voters at scale is not a voting system.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">15. Governance, Upgrades, and Abuse Resistance<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>No single operator or vendor controls the system<\/li>\n\n\n\n<li>Validators are multi-institutional and multi-branch<\/li>\n\n\n\n<li>Election rules are frozen before voting begins<\/li>\n\n\n\n<li>Upgrades occur only between elections<\/li>\n\n\n\n<li>Changes require public notice, audits, and approval<\/li>\n<\/ul>\n\n\n\n<p>No rules may change during an election.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">16. Operational Resilience and Continuity<\/h2>\n\n\n\n<p>The system must tolerate failure.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>offline-capable precinct voting<\/li>\n\n\n\n<li>delayed settlement to the ledger<\/li>\n\n\n\n<li>redundant communication paths<\/li>\n\n\n\n<li>controlled paper fallback for extreme scenarios<\/li>\n\n\n\n<li>public incident reporting and after-action reviews<\/li>\n<\/ul>\n\n\n\n<p>Failure must not create extra votes or invalidate limits.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">17. What This System Does Not Do<\/h2>\n\n\n\n<p>It does <strong>not<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>change who may vote<\/li>\n\n\n\n<li>eliminate state administration<\/li>\n\n\n\n<li>require online voting<\/li>\n\n\n\n<li>reveal individual votes<\/li>\n\n\n\n<li>tie voting to money or speculation<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Conclusion<\/h2>\n\n\n\n<p>Democracy\u2019s core rule is simple:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Each eligible person may vote once, and only once, in each contest.<\/p>\n<\/blockquote>\n\n\n\n<p>That rule cannot be enforced by procedures alone.<br>It <strong>can<\/strong> be enforced by cryptographic shared ledgers with fixed-issuance voting tokens.<\/p>\n\n\n\n<p>This system assumes machines can fail\u2014and ensures failure cannot break democracy.<\/p>\n\n\n\n<p>It replaces &#8220;trust us&#8221; with proof.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>\u2014 <em>Matthew Hunt<\/em><br>Founder &amp; Systems Architect<br><em>Square Right, Inc.<\/em>  <\/p>\n\n\n\n<p>Read more <a href=\"https:\/\/squareright.com\/?page_id=71\" type=\"page\" id=\"71\">Posts. <\/a> Learn more at our <a href=\"https:\/\/squareright.com\/\" type=\"page\" id=\"69\">Home Page.<\/a><br>Support us by <a href=\"https:\/\/squareright.com\/?page_id=7\" type=\"page\" id=\"7\">buying a sticker.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The legitimacy of elections depends on enforcing simple limits \u2014 yet our current systems cannot prove those limits were ever upheld. This paper presents a verifiable blueprint for a voting system that replaces trust with proof, ensuring eligibility, preventing duplicate votes, and restoring confidence through transparent, enforceable design.<\/p>\n","protected":false},"author":1,"featured_media":527,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[23],"tags":[43,28,40,42,41,39],"class_list":["post-526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-posts","tag-cryptographic-ledgers","tag-democracy","tag-election","tag-governance","tag-public-trust","tag-voting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Blueprint for a Better Voting System -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/squareright.com\/?p=526\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Blueprint for a Better Voting System -\" \/>\n<meta property=\"og:description\" content=\"The legitimacy of elections depends on enforcing simple limits \u2014 yet our current systems cannot prove those limits were ever upheld. This paper presents a verifiable blueprint for a voting system that replaces trust with proof, ensuring eligibility, preventing duplicate votes, and restoring confidence through transparent, enforceable design.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/squareright.com\/?p=526\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/recodethesystem\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-29T05:34:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-31T02:26:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"squareright\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RecodeTheSystem\" \/>\n<meta name=\"twitter:site\" content=\"@RecodeTheSystem\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"squareright\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/squareright.com\/?p=526#article\",\"isPartOf\":{\"@id\":\"https:\/\/squareright.com\/?p=526\"},\"author\":{\"name\":\"squareright\",\"@id\":\"https:\/\/squareright.com\/#\/schema\/person\/902eb2a85540645b7456d0a839e73cba\"},\"headline\":\"A Blueprint for a Better Voting System\",\"datePublished\":\"2026-01-29T05:34:34+00:00\",\"dateModified\":\"2026-01-31T02:26:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/squareright.com\/?p=526\"},\"wordCount\":1911,\"publisher\":{\"@id\":\"https:\/\/squareright.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/squareright.com\/?p=526#primaryimage\"},\"thumbnailUrl\":\"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003.png\",\"keywords\":[\"cryptographic ledgers\",\"Democracy\",\"election\",\"governance\",\"public trust\",\"voting\"],\"articleSection\":[\"Posts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/squareright.com\/?p=526\",\"url\":\"https:\/\/squareright.com\/?p=526\",\"name\":\"A Blueprint for a Better Voting System -\",\"isPartOf\":{\"@id\":\"https:\/\/squareright.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/squareright.com\/?p=526#primaryimage\"},\"image\":{\"@id\":\"https:\/\/squareright.com\/?p=526#primaryimage\"},\"thumbnailUrl\":\"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003.png\",\"datePublished\":\"2026-01-29T05:34:34+00:00\",\"dateModified\":\"2026-01-31T02:26:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/squareright.com\/?p=526#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/squareright.com\/?p=526\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/squareright.com\/?p=526#primaryimage\",\"url\":\"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003.png\",\"contentUrl\":\"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/squareright.com\/?p=526#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/squareright.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Blueprint for a Better Voting System\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/squareright.com\/#website\",\"url\":\"https:\/\/squareright.com\/\",\"name\":\"squareright.com\",\"description\":\"Building a better future.\",\"publisher\":{\"@id\":\"https:\/\/squareright.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/squareright.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/squareright.com\/#organization\",\"name\":\"Square Right\",\"url\":\"https:\/\/squareright.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/squareright.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/squareright.com\/wp-content\/uploads\/2025\/12\/cropped-Official-Logo-Words-on-side-Computer.png\",\"contentUrl\":\"https:\/\/squareright.com\/wp-content\/uploads\/2025\/12\/cropped-Official-Logo-Words-on-side-Computer.png\",\"width\":443,\"height\":120,\"caption\":\"Square Right\"},\"image\":{\"@id\":\"https:\/\/squareright.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/recodethesystem\/\",\"https:\/\/x.com\/RecodeTheSystem\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/squareright.com\/#\/schema\/person\/902eb2a85540645b7456d0a839e73cba\",\"name\":\"squareright\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/squareright.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/480cff33738c2f138d5bc03146ddb628bba9428e200e1ef13ddf2c2cad5a37cb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/480cff33738c2f138d5bc03146ddb628bba9428e200e1ef13ddf2c2cad5a37cb?s=96&d=mm&r=g\",\"caption\":\"squareright\"},\"sameAs\":[\"https:\/\/squareright.com\"],\"url\":\"https:\/\/squareright.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Blueprint for a Better Voting System -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/squareright.com\/?p=526","og_locale":"en_US","og_type":"article","og_title":"A Blueprint for a Better Voting System -","og_description":"The legitimacy of elections depends on enforcing simple limits \u2014 yet our current systems cannot prove those limits were ever upheld. This paper presents a verifiable blueprint for a voting system that replaces trust with proof, ensuring eligibility, preventing duplicate votes, and restoring confidence through transparent, enforceable design.","og_url":"https:\/\/squareright.com\/?p=526","article_publisher":"https:\/\/www.facebook.com\/recodethesystem\/","article_published_time":"2026-01-29T05:34:34+00:00","article_modified_time":"2026-01-31T02:26:14+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003.png","type":"image\/png"}],"author":"squareright","twitter_card":"summary_large_image","twitter_creator":"@RecodeTheSystem","twitter_site":"@RecodeTheSystem","twitter_misc":{"Written by":"squareright","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/squareright.com\/?p=526#article","isPartOf":{"@id":"https:\/\/squareright.com\/?p=526"},"author":{"name":"squareright","@id":"https:\/\/squareright.com\/#\/schema\/person\/902eb2a85540645b7456d0a839e73cba"},"headline":"A Blueprint for a Better Voting System","datePublished":"2026-01-29T05:34:34+00:00","dateModified":"2026-01-31T02:26:14+00:00","mainEntityOfPage":{"@id":"https:\/\/squareright.com\/?p=526"},"wordCount":1911,"publisher":{"@id":"https:\/\/squareright.com\/#organization"},"image":{"@id":"https:\/\/squareright.com\/?p=526#primaryimage"},"thumbnailUrl":"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003.png","keywords":["cryptographic ledgers","Democracy","election","governance","public trust","voting"],"articleSection":["Posts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/squareright.com\/?p=526","url":"https:\/\/squareright.com\/?p=526","name":"A Blueprint for a Better Voting System -","isPartOf":{"@id":"https:\/\/squareright.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/squareright.com\/?p=526#primaryimage"},"image":{"@id":"https:\/\/squareright.com\/?p=526#primaryimage"},"thumbnailUrl":"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003.png","datePublished":"2026-01-29T05:34:34+00:00","dateModified":"2026-01-31T02:26:14+00:00","breadcrumb":{"@id":"https:\/\/squareright.com\/?p=526#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/squareright.com\/?p=526"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/squareright.com\/?p=526#primaryimage","url":"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003.png","contentUrl":"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/squareright.com\/?p=526#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/squareright.com\/"},{"@type":"ListItem","position":2,"name":"A Blueprint for a Better Voting System"}]},{"@type":"WebSite","@id":"https:\/\/squareright.com\/#website","url":"https:\/\/squareright.com\/","name":"squareright.com","description":"Building a better future.","publisher":{"@id":"https:\/\/squareright.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/squareright.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/squareright.com\/#organization","name":"Square Right","url":"https:\/\/squareright.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/squareright.com\/#\/schema\/logo\/image\/","url":"https:\/\/squareright.com\/wp-content\/uploads\/2025\/12\/cropped-Official-Logo-Words-on-side-Computer.png","contentUrl":"https:\/\/squareright.com\/wp-content\/uploads\/2025\/12\/cropped-Official-Logo-Words-on-side-Computer.png","width":443,"height":120,"caption":"Square Right"},"image":{"@id":"https:\/\/squareright.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/recodethesystem\/","https:\/\/x.com\/RecodeTheSystem"]},{"@type":"Person","@id":"https:\/\/squareright.com\/#\/schema\/person\/902eb2a85540645b7456d0a839e73cba","name":"squareright","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/squareright.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/480cff33738c2f138d5bc03146ddb628bba9428e200e1ef13ddf2c2cad5a37cb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/480cff33738c2f138d5bc03146ddb628bba9428e200e1ef13ddf2c2cad5a37cb?s=96&d=mm&r=g","caption":"squareright"},"sameAs":["https:\/\/squareright.com"],"url":"https:\/\/squareright.com\/?author=1"}]}},"featured_image_src":"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003-600x400.png","featured_image_src_square":"https:\/\/squareright.com\/wp-content\/uploads\/2026\/01\/Post-00003-600x600.png","author_info":{"display_name":"squareright","author_link":"https:\/\/squareright.com\/?author=1"},"_links":{"self":[{"href":"https:\/\/squareright.com\/index.php?rest_route=\/wp\/v2\/posts\/526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/squareright.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/squareright.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/squareright.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/squareright.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=526"}],"version-history":[{"count":0,"href":"https:\/\/squareright.com\/index.php?rest_route=\/wp\/v2\/posts\/526\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/squareright.com\/index.php?rest_route=\/wp\/v2\/media\/527"}],"wp:attachment":[{"href":"https:\/\/squareright.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/squareright.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/squareright.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}