It's Not Safe Yet: Online Voting in Practice
This talk presents a security analysis of two major U.S. internet voting systems, Voatz and Democracy Live, demonstrating that both are vulnerable to remote, scalable attacks. The research highlights critical flaws in their cryptographic implementations, including the use of insecure key derivation and predictable ciphertext sizes that leak voter selections. The speaker emphasizes that these systems fail to meet standard security requirements like end-to-end verifiability and receipt-freeness, and that vendor hostility often hinders independent security research.
Why Your Mobile Voting App is Just a Data-Leaking Wrapper
TLDR: Recent security research into high-stakes U.S. internet voting systems like Voatz and Democracy Live reveals critical cryptographic failures that allow for remote, scalable attacks. By analyzing mobile app traffic and reverse-engineering obfuscated binaries, researchers demonstrated that these platforms fail to provide basic security guarantees like end-to-end verifiability or receipt-freeness. For security professionals, this research serves as a stark reminder that adding a blockchain layer to a broken architecture does nothing to mitigate fundamental flaws in authentication and data handling.
Security researchers often talk about the "black box" of proprietary software, but rarely do we get to see what happens when that box is tasked with the most sensitive operation in a democracy: casting a vote. The research presented at DEF CON 2025 regarding internet voting systems used in U.S. federal elections is a masterclass in why "security through obscurity" and "blockchain-washing" are not just ineffective, but dangerous. When you strip away the marketing, these systems are essentially mobile apps and web portals that handle PII and ballot data with less rigor than a standard banking application.
The Anatomy of a Failed Cryptographic Protocol
The core issue with these systems is not just a single bug, but a fundamental misunderstanding of how to build a secure, verifiable protocol. In the case of the Voatz mobile app, the researchers found that the application used a custom, proprietary cryptographic protocol that was essentially a wrapper around standard TLS.
The app generated 100 ECDSA key pairs, discarded 99 of them, and kept the 57th key for reasons that appear to be purely for obfuscation rather than security. This is a classic example of cryptographic failures where developers attempt to "roll their own" security logic instead of relying on established, peer-reviewed primitives.
Even worse, the application performed encryption before compression. Because the ciphertext size remained proportional to the plaintext size, an adversary performing network sniffing with tcpdump or Wireshark could easily distinguish between different ballot selections based on packet length. This side-channel leakage effectively destroys the secrecy of the ballot, allowing an attacker to deanonymize voters and their choices in real-time.
When Obfuscation Becomes a Barrier to Research
Reverse-engineering these applications was not a trivial task. The vendors employed heavy program obfuscation, which, as the researchers noted, was aggressive enough to crash IDA Pro during analysis. This is a common tactic used to deter independent security audits. When a vendor makes it physically impossible to analyze their code, they are not protecting their intellectual property; they are hiding their technical debt.
The legal landscape surrounding this research is equally concerning. The Computer Fraud and Abuse Act (CFAA) has historically been used to threaten researchers who uncover these types of vulnerabilities. The Van Buren v. United States case was a pivotal moment for the security community, as it helped clarify that accessing a system in a way that violates a terms-of-service agreement does not necessarily constitute a federal crime. This legal protection is vital for the public interest, as it allows researchers to perform the necessary work of identifying flaws in systems that impact millions of people.
The Reality of "Critical Infrastructure"
These systems are often marketed as "critical infrastructure," a designation that vendors use to deflect criticism by claiming that any attempt to audit their code is an attack on national security. This is a convenient shield. If you are a pentester or a bug bounty hunter, you will likely encounter this "critical infrastructure" defense whenever you find a vulnerability in a system that a company wants to keep off-limits.
The impact of these vulnerabilities is severe. Because these systems lack end-to-end verifiability, there is no way for a voter to confirm that their vote was recorded as cast or counted as intended. If an attacker controls the voter's device—which is trivial given the lack of robust malware detection—they can alter the ballot before it is even encrypted.
Defensive Takeaways for the Field
For those working on the defensive side, the lesson is clear: you cannot secure a system by adding layers of complexity on top of a flawed foundation. If your authentication mechanism relies on a 8-digit numeric PIN that is stored on-disk, no amount of hardware-backed key storage will save you from a brute-force attack if the attacker gains forensic access to the device.
Defenders must prioritize transparency and open-source cryptographic standards. If a system cannot be audited by the public, it should not be used for public elections. We need to move away from the "deploy, research, press, fix" cycle that currently defines the industry. Instead, we should be pushing for systems that are designed to be broken, analyzed, and improved from day one.
If you are an election official or a developer working on these systems, stop trying to hide behind NDAs and legal threats. The only way to build trust in a digital voting system is to invite the community to break it. If your system can't survive a week of scrutiny at a conference like DEF CON, it certainly won't survive a motivated, state-sponsored adversary.
Vulnerability Classes
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference

The Fortress Island of Voting System Physical Security

It's Not Safe Yet: Online Voting in Practice

Is End-to-End Verifiability a Magic Bullet for Internet Voting?
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Hacking Apple's USB-C Port Controller

