Academic Development Approach

At Assembly Voting, we strive to continuously improve and increase the quality and value of everything we do. This includes our approach to software development and the principles and methodologies we follow to support this.

Transparency and Open Source: Our Guiding Principles

In a world where technology can often be opaque, we stand firmly against all forms of ‘black boxing.’ Transparency is not just a buzzword for us; it’s a guiding principle. Our election software is end-to-end verifiable, down to the smallest details. Our technology stack is built on well-known open-source software like Linux, MariaDB, Nginx, Redis, and Ruby On Rails. These platforms are not only reliable but are also frequently updated to address security concerns, ensuring that we are always at the forefront of secure technological practices.

Assembly Voting-developer coding

Transparency and Open Source: Our Guiding Principles

Assembly Voting-developer coding

In a world where technology can often be opaque, we stand firmly against all forms of ‘black boxing.’ Transparency is not just a buzzword for us; it’s a guiding principle. Our election software is end-to-end verifiable, down to the smallest details. Our technology stack is built on well-known open-source software like Linux, MariaDB, Nginx, Redis, and Ruby On Rails. These platforms are not only reliable but are also frequently updated to address security concerns, ensuring that we are always at the forefront of secure technological practices.

Assembly Voting-development code on screen

Cryptographic Security: Trust Through Technology

Security is more than just a feature; it’s a promise. Our election software employs some of the best-known open-source cryptographic algorithms, all available for public inspection. The Trustee Ceremony is a critical operation where the decryption ability is distributed among several independent entities. This distributed trust model introduces a very high level of safety, ensuring that no single individual can compromise the integrity of the election process.

Test-Driven Development: Ensuring Quality and Security

Quality and security are non-negotiables for us. To maintain our reputation for high election security and user-friendly interfaces, we adhere to a test-driven development model. Every new feature or modification is accompanied by rigorous testing. Our Continuous Integration/Deployment pipeline executes these tests, along with a range of static tests, whenever code is committed. This meticulous approach minimizes the risk of introducing bugs and ensures that our software meets the highest standards, even in a fast-paced development environment.

Assembly Voting-team meeting

Test-Driven Development: Ensuring Quality and Security

Quality and security are non-negotiables for us. To maintain our reputation for high election security and user-friendly interfaces, we adhere to a test-driven development model. Every new feature or modification is accompanied by rigorous testing. Our Continuous Integration/Deployment pipeline executes these tests, along with a range of static tests, whenever code is committed. This meticulous approach minimizes the risk of introducing bugs and ensures that our software meets the highest standards, even in a fast-paced development environment.

Cryptographic Security: Trust Through Technology

Assembly Voting-team meeting

Security is more than just a feature; it’s a promise. Our election software employs some of the best-known open-source cryptographic algorithms, all available for public inspection. The Trustee Ceremony is a critical operation where the decryption ability is distributed among several independent entities. This distributed trust model introduces a very high level of safety, ensuring that no single individual can compromise the integrity of the election process.

Scroll to Top