Our voting primitives use thresholded encrypted execution: private ballots, verifiable tallying, and no single key (or person) required for the result to be recovered.
Our voting primitives use thresholded encrypted execution: private ballots, verifiable tallying, and no single key (or person) required for the result to be recovered.
No trusted coordinator.
Technical overview: blog.enclave.gg/aragon-encla...
No trusted coordinator.
Technical overview: blog.enclave.gg/aragon-encla...
A small example of what’s possible when privacy + proof coexist: blog.enclave.gg/crisp-privat...
A small example of what’s possible when privacy + proof coexist: blog.enclave.gg/crisp-privat...