Tell us your situation and a consultant will contact you in no time.
Contact us atSecurity
State of the art
State of the art
CIATAA
If you have read the basics in the previous section, then you already know that CIATAA stands for the 6 pillars of information security for online voting technologies. Below, we explain how we secure each of these 6 pillars at Kuorum. The security levels we describe below correspond to the state of the art in online voting and are used in private electoral processes around the world.
Confidentiality
In Kuorum we use cryptography to ensure that no one, not even us, has access to the information of the votes cast with our technology. For this we use, among other mechanisms: End-to-end encryption, encryption in transit and at rest, asymmetric key encryption and a Zero-trust architecture. If you want to know more, you can contact our engineering team.
Integrity
No one is capable of altering the results of a vote. This is what in electoral jargon is called avoiding the fraud. For this we use: Digital signature, immutable logs and Distributed Ledger Technologies (DLT).
Availability
We ensure our customers full service availability under peak loads thanks to our scalable architecture based on micro and nano services. In addition, we perform penetration tests and emulate disaster scenarios on a regular basis.
Authenticity
Also known in computer jargon as "non-repudiation". The way we identify voters is key. With Kuorum's technology, it is the administrators of each ballot who choose the level of identification security they require for their ballots. Our most demanding customers apply multi-factor authentication (MFA).
Traceability
Also known as auditability or end-to-end verifiability . This is to ensure that the voter and/or an auditor can attest to what has occurred in the process; of course, respecting the condition of anonymity.
Anonymity
Not all voting using our technology requires an anonymous vote. But, for those that do, we apply homomorphic asymmetric cryptography and mixing.
State of the art
CIATAA
If you have read the basics in the previous section, then you already know that CIATAA stands for the 6 pillars of information security for online voting technologies. Below, we explain how we secure each of these 6 pillars at Kuorum. The security levels we describe below correspond to the state of the art in online voting and are used in private electoral processes around the world.
Confidentiality
In Kuorum we use cryptography to ensure that no one, not even us, has access to the information of the votes cast with our technology. For this we use, among other mechanisms: End-to-end encryption, encryption in transit and at rest, asymmetric key encryption and a Zero-trust architecture. If you want to know more, you can contact our engineering team.
Integrity
No one is capable of altering the results of a vote. This is what in electoral jargon is called avoiding the fraud. For this we use: Digital signature, immutable logs and Distributed Ledger Technologies (DLT).
Availability
We ensure our customers full service availability under peak loads thanks to our scalable architecture based on micro and nano services. In addition, we perform penetration tests and emulate disaster scenarios on a regular basis.
Authenticity
Also known in computer jargon as "non-repudiation". The way we identify voters is key. With Kuorum's technology, it is the administrators of each ballot who choose the level of identification security they require for their ballots. Our most demanding customers apply multi-factor authentication (MFA).
Traceability
Also known as auditability or end-to-end verifiability . This is to ensure that the voter and/or an auditor can attest to what has occurred in the process; of course, respecting the condition of anonymity.
Anonymity
Not all voting using our technology requires an anonymous vote. But, for those that do, we apply homomorphic asymmetric cryptography and mixing.
Connect it with your favorite tools
Integrate with leading video conferencing tools to offer your remote constituents a seamless experience. Compatible with all platforms, such as Zoom, Teams, Webex and many more.







Make collective decisions in a simple way
At Kuorum we help people around the world make collective decisions that matter. Tell us your goals and we'll tell you how we can help.