Securing Your Vote: A Digital Process

The CDBI system is simple, secure, and uses established government protocols to ensure your identity is verified and your ballot is encrypted and recorded immutably.

CDBI Secure Voting Terminal Securing Canadian Democracy

Welcome to C.D.B.I.

The first step in secure digital voting begins with your mailed **Access Code**.

Placeholder image of a secure envelope

Scroll down to see the steps in detail.

1. Mailed Access Code Verification

To start, you receive a **unique, one-time Access Code** in the mail, similar to how the CRA communicates essential documents. At the digital voting station, you either scan this code or manually enter the key into the secure tablet. This immediately links your session to your registration without requiring a full public ID number initially.

This two-factor process prevents anyone who doesn't possess the physical code from starting a voting session in your name. **Possession is verification.**

2. Government Identity Validation (SIN)

After the code is accepted, the system must confirm your identity. In line with **Canadian government standards (similar to CRA login)**, the system prompts for the **Social Insurance Number (SIN)**. This is purely for validation; your SIN is **never** stored or linked to your final encrypted ballot.

Upon successful SIN validation, the system generates your disposable **Votekey**—a private, non-reversible cryptographic key that will encrypt your ballot and guarantee its anonymity.

3. Candidate and Party Selection

Once identity is verified and the Votekey is generated, you are securely logged into the election. The screen presents the official list of candidates and parties for your riding. The interface is designed for simplicity and accessibility, making your selection clear and unambiguous.

The C.D.B.I. UI is designed for maximum clarity, minimizing errors and ensuring all citizens, regardless of technical ability, can cast their vote easily.

4. Final Review and Encryption

A dedicated screen provides a final, **unambiguous summary** of your selections. You must confirm your choice before the vote is cast. The moment you press 'Confirm,' your choices are immediately and irrevocably **encrypted** using the unique Votekey, permanently decoupling the vote content from your verified identity.

This is the critical step where **anonymity is guaranteed**. The system now possesses an encrypted ballot, not a traceable identity.

5. Immutable Blockchain Receipt & Exit

The encrypted ballot is committed to the public, verifiable blockchain. The system issues an **optional, printable receipt** containing a **Blockchain Verification Hash**. This hash is proof that your vote exists on the chain. You can use any public ledger explorer to confirm its presence, ensuring **transparency** and **auditability**.

Once the receipt is issued and you exit the session, the Votekey is destroyed. The vote is permanently recorded and you are done.