{"id":33142,"date":"2020-02-04T15:08:00","date_gmt":"2020-02-04T15:08:00","guid":{"rendered":"http:\/\/4b527830-e03c-47c0-af32-b3e41a3359c3"},"modified":"2020-02-04T15:08:00","modified_gmt":"2020-02-04T15:08:00","slug":"blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/","title":{"rendered":"Blockchain elections: How Bitcoin tech could secure your vote &#8211; and save democracy"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2016\/12\/12\/353e2b3c-635e-4b8f-a1c6-adcf414a8d8f\/thumbnail\/770x578\/2ca234e2a7c350005312d3c36933f888\/istock-472227510.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>As technology reaches into every aspect of our lives, interest in the use of electronic voting in elections has been increasing, as this &#8212; its backers claim &#8212; can make votes more secure and quicker to count.<\/p>\n<p>But while this might seem as simple as updating the old paper process for the modern age, this shift to electronic voting has not been without problems.<\/p>\n<p>Security researchers have uncovered a number of vulnerabilities <a href=\"https:\/\/www.cnet.com\/news\/campaign-2018-voting-machines-are-vulnerable-to-hacking\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">in electronic voting machines used throughout the US<\/a>, while the idea of mobile application-based voting comes with concerns about verifying voters and fears of election fraud. As a result, some have suggested <a href=\"http:\/\/www.europarl.europa.eu\/RegData\/etudes\/ATAG\/2016\/581918\/EPRS_ATA(2016)581918_EN.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">the use of of blockchain-based voting<\/a> as a solution.<\/p>\n<p>The idea is that by using blockchain &#8212; a decentralised distributed ledger technology that records transactions in a way that means they can&#8217;t be altered without the agreement of all parties &#8212; it becomes much harder to tamper with electronic votes.<\/p>\n<p>While blockchain is most famously used to record&nbsp;<a href=\"https:\/\/www.cnet.com\/how-to\/what-is-bitcoin\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">bitcoin transactions<\/a>, it has also been tested in areas including&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/australian-department-of-health-using-blockchain-for-medical-research-records\/\">storing medical records<\/a>,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/jewelry-consortium-to-use-ibm-blockchain-technology-to-verify-authenticate-diamonds-engagement-rings\/\">authenticating physical transactions<\/a>&nbsp;and more.<\/p>\n<p>During 2017 and 2018, there were&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/could-blockchain-be-the-missing-link-in-electronic-voting\/\">several examples of blockchain being tested in election systems<\/a>, with varying results, and governments and local authorities around the world have continued to test the technology during the past year.<\/p>\n<p>The city of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zug\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Zug<\/a>&nbsp;&#8212; known as Switzerland&#8217;s &#8216;Crypto Valley&#8217; &#8212; tested a blockchain-based e-vote last summer, which saw 220 citizens with a registered digital ID eligible to vote on the platform built by <a href=\"https:\/\/www.luxoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Luxoft<\/a> and <a href=\"https:\/\/www.hslu.ch\/en\/lucerne-school-of-information-technology\/research\/topics\/blockchain-und-smart-contracts\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Hochschule Luzern&#8217;s Blockchain Lab<\/a>.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Following the trial, a survey of residents of Zug found that four in five welcomed the use of e-voting in the city &#8212; although there was division over whether blockchain improves the security of electronic voting or makes it more of a challenge. Just 21% said they believed blockchain technology made electronic voting more secure, while 16% said they had security concerns.<\/p>\n<p>A number of citizens also wished to continue to have the option to vote by traditional mail until further progress is made with e-voting.<\/p>\n<h2>Security issues<\/h2>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">Innovation<\/span><\/h3>\n<\/div>\n<p>One of the key benefits put forward by blockchain voting advocates is that it helps secure electronic voting from tampering, hacking and other outside interference. However, there have been a number of instances where blockchain-based voting systems have been found to contain security flaws.<\/p>\n<p>In August, a security researcher <a href=\"https:\/\/www.zdnet.com\/article\/moscows-blockchain-voting-system-cracked-a-month-before-election\/\">found a critical vulnerability in the Ethereum-based voting system<\/a> set to be used in the Moscow City Duma election. In the worst-case scenario, the vulnerability could reveal the votes cast by individuals using the system, which was developed by the Moscow Department of Information Technology. On being informed of the issue, the department said it would fix the vulnerability ahead of the vote.&nbsp;<\/p>\n<p>With the 2020 US Presidential election looming, electronic voting and election security is high on the agenda. As the US prepares for Vote 2020, there have been some limited trials of blockchain-based voting at a local level, with counties in West Virginia among those testing the technology.<\/p>\n<p>Participants in the trial &#8212; mostly military personnel deployed overseas &#8212; used a mobile blockchain app developed by a company called <a href=\"https:\/\/voatz.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Voatz<\/a>.<\/p>\n<p>After downloading the app from the Google Play Store or Apple&#8217;s App Store, users had to provide their phone number and an eight-digit code, alongside verifying themselves with photographic ID and facial recognition technology.<\/p>\n<p>Once active, the users can send electronic votes through the app, verifying their identity with facial recognition of fingerprint scanning. Nearly 150 users across 24 counties used the Voatz blockchain app during the midterm elections last year.<\/p>\n<p>Following the election,&nbsp;<a href=\"https:\/\/sos.wv.gov\/news\/Pages\/10-2-2019-A.aspx\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">it was revealed<\/a> that someone had attempted to gain unauthorised access to the system &#8212; although no votes were viewed, altered or impacted. Since then, <a href=\"https:\/\/www.wyden.senate.gov\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Senator Ron Wyden<\/a> has written to the Department of Defense to call for the Pentagon to audit Voatz, citing concerns that the app doesn&#8217;t do enough to protect against outside interference.&nbsp;<a href=\"https:\/\/blog.voatz.com\/?p=1133\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">In a statement<\/a>, Voatz said it hasn&#8217;t been contacted by Senator Wyden and that it would welcome any audit.<\/p>\n<p>But if the technology behind blockchain-based voting can be compromised, that raises questions about the security of a system that advocates claim can combat that very kind of fraud and interference.<\/p>\n<p>A user could go through all the required steps to authenticate themselves on their device, but if the back end has been compromised, then it&#8217;s all for nothing &#8212; because while it&#8217;s difficult to alter the blockchain, it&#8217;s not outright impossible.<\/p>\n<p>&#8220;There is no such thing as complete immutability &#8212; you&#8217;ll always be able to change something, it&#8217;s just a case of how difficult it is. But in the case of blockchain it&#8217;s very obvious when it happens, which is a deterrent,&#8221; says Martha Bennett, VP and principal analyst at Forrester.<\/p>\n<p>The nature of blockchain also creates issues that might not be compatible with the unique nature of elections, where the details of a transaction having taken place need to be registered, and the candidates need to know how many votes they&#8217;ve received, but the way in which voters have voted needs to be kept secret.<\/p>\n<p>&#8220;How do you make sure the votes are kept secret? You want the transparency of knowing who has been voted for, but at the same time you can&#8217;t have the voter&#8217;s identity being associated with a vote,&#8221; says Bennett. &#8220;I&#8217;m personally really skeptical that this is the right technology&#8221;.<\/p>\n<p>But, as demonstrated by the trials of blockchain-based voting, there is continued enthusiasm for the use of the technology in this way.<\/p>\n<h2>Enfranchisement via technology<\/h2>\n<p>While there are issues that need to be ironed out before it could go mainstream, some believe that the introduction of a new technology in this space could be the way to bring democracy into the 21st century &#8212; when people expect ease and convenience, to be able to do something at the tap of an app, rather than walking to a community centre to cast a vote.<\/p>\n<p>That element of convenience can bring benefits, in that it encourages more people to turn out and engage in the democratic process.<\/p>\n<p>&#8220;Every country which has trialled electronic or blockchain voting for real elections has had uptake increase enormously. It&#8217;s more convenient,&#8221; says David Galindo, senior lecturer in computer security at the University of Birmingham and lead cryptographer at AI and blockchain start-up <a href=\"https:\/\/fetch.ai\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Fetch.AI<\/a>.<\/p>\n<p>&#8220;Convenience plays such an important role in other parts of life &#8212; think how we&#8217;ve moved from cash-based payments to contactless payments, it&#8217;s all about convenience&#8221;.<\/p>\n<p>When cashless and contactless payments were first introduced there were fears around security, but because people started using products in this way, the banking industry had to work to make it secure.<\/p>\n<p><strong>SEE:&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/special-report-blockchain-in-business-where-are-we-now-and-predictions-for-the-next-decade\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\"><strong>Special report: Blockchain in business: Where are we now, and predictions for the next decade<\/strong><\/a><strong>&nbsp;(TechRepublic Premium)<\/strong><\/p>\n<p>The same could happen when blockchain-based voting becomes more widespread, as regulations will be needed about systems, apps and back ends &#8212; moves that will actively make the systems more secure by default.<\/p>\n<p>&#8220;When a country or a region does these trials of introducing online voting, what you see is a side effect. Because they have to rethink their processes and procedures and that actually brings an extra layer of compliance and thinking to the system,&#8221; Galindo explains.<\/p>\n<p>Voting is something which, in many countries, remains the same as it has been since ballots began over 200 years ago. In the UK, for example, it still involves putting a cross on a paper ballot. For Dr Galindo, that should be updated &#8212; and electronic voting provides the answer.<\/p>\n<p>&#8220;We can&#8217;t live in the 19th century &#8212; it&#8217;s the 21st century,&#8221; he says.<\/p>\n<h3>More on blockchain and voting<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/blockchain-elections-how-bitcoin-technology-could-secure-your-vote-and-save-democracy\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More governments have tested blockchain-based voting systems, but they haven&#8217;t been problem-free.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33143,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-33142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blockchain elections: How Bitcoin tech could secure your vote - and save democracy 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain elections: How Bitcoin tech could secure your vote - and save democracy 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-04T15:08:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Blockchain elections: How Bitcoin tech could secure your vote &#8211; and save democracy\",\"datePublished\":\"2020-02-04T15:08:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/\"},\"wordCount\":1320,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/\",\"name\":\"Blockchain elections: How Bitcoin tech could secure your vote - and save democracy 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy.jpg\",\"datePublished\":\"2020-02-04T15:08:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blockchain elections: How Bitcoin tech could secure your vote &#8211; and save democracy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blockchain elections: How Bitcoin tech could secure your vote - and save democracy 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/","og_locale":"en_US","og_type":"article","og_title":"Blockchain elections: How Bitcoin tech could secure your vote - and save democracy 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-02-04T15:08:00+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Blockchain elections: How Bitcoin tech could secure your vote &#8211; and save democracy","datePublished":"2020-02-04T15:08:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/"},"wordCount":1320,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/","url":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/","name":"Blockchain elections: How Bitcoin tech could secure your vote - and save democracy 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy.jpg","datePublished":"2020-02-04T15:08:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/blockchain-elections-how-bitcoin-tech-could-secure-your-vote-and-save-democracy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Blockchain elections: How Bitcoin tech could secure your vote &#8211; and save democracy"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33142"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33142\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33143"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}