Questions? Write to 11chooses@siv.org
Based on official State Voter File
71,526 registered voters in the district, as of March '25
Withheld voters: 10,925
Published cryptographic commitments ("merkle hash trees") for 62k active-voters list, 62k auth tokens generated, & 35k rows letter mailmerge data
At a high-level, it allows us to prove-if-challenged, in an unforgeable way, the specific Voter Roll files used.
It also enables the ability to prove individual lines, in a privacy-protecting way, without needing to reveal the whole file.
If those challenged lines are chosen using random sampling, proving just a few dozen can imply overwhelming odds the whole file is legitimate.
This allows keeping vote selections private, even from the server. It is analogous to the "End-to-End" privacy found in Signal Messenger. More info
Mailers began arriving: Thurs 12/4
Voter receives their vote invitation via postal mail



Voters can enter the URL and unique Voter Code manually or scan the QR code to access the vote page.

For fairness, the order of the candidates is randomized on each page load.
No app installs needed — everything runs in the browser.
Voters are invited to add an email address for easier contact if there are issues processing their vote.
This is strictly for administrative purposes only.
Never shared or used for marketing.
The voting software automatically stores the voter's private verification info on their own device, in the browser they use to vote.

For privacy reasons, it never leaves the voter's device.
In case your mailer didn't arrive, was lost, or you need to cancel your first vote, you can still cast a Provisional Ballot via 11.siv.org/vote.
In person voting & support is also available: 11chooses.com/#in-person.
Read more about Authentication Options—verifying your identity and eligibility— here.
Example:


Using their unique Verification Number. More info
The full list of anonymized votes are published one-by-one. See example image above, in Results Published section.
This allows everyone to easily re-tally the votes themselves, rather than tallying happening only behind closed doors.
Take a random sample of voters from the voter roll, contact them to confirm they did legitimately vote— without asking them how they voted.
Voters can use a second device to check their vote was recorded correctly. By viewing the full list of anonymized votes and looking for their Verification Number, voters can confirm their cast vote appears correctly. Voters can repeat this check on multiple devices with different malware profiles (like Android vs iPhone) for added confidence against any individual device compromise.
For full-paper checks, not requiring trust in any devices at all: The full list of votes can be printed and displayed at public locations, or brought to voters by auditors.