-
Are the electoral roll and the ballot box kept separate?
Yes. The distributed system structure used by POLYAS operates the electoral roll on one server, while the ballot box is operated independently on a different server.
-
Are the servers operated by POLYAS?
Online elections conducted with POLYAS are by default hosted in data centers in the EU and in compliance with GDPR. Our Self-Service has the option to book hosting on the Open Telekom Cloud (OTC). The OTC platform is operated exclusively in the German data centers of the Telekom AG. OTC (and T-Systems as the provider) have…
-
Are the servers operated in Germany?
By default, the POLYAS servers are located in Europe. However, it is possible that the servers are operated in Germany. Please contact us in advance.
-
Can the certification report or the certificate be viewed publicly?
You are welcome to view the certification report and the certificate at this public link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifikation/Reporte/Reporte08/0862a_pdf.pdf?__blob=publicationFile&v=2.
-
Can you name the ISO27001 certificates of your service providers?
The certificates of our service providers can be found here: Hetzner: https://www.hetzner.de/unternehmen/zertifizierung, https://www.hetzner.de/pdf/FOX_Zertifikat_de.pdf Open Telekom Cloud: https://open-telekom-cloud.com/de/sicherheit/datenschutz-compliance,…
-
Do the POLYAS servers operate in a demilitarized zone (DMZ)?
Yes. The web server that provides the application can be accessed from the Internet and is located behind a firewall in a demilitarized zone. This protects it against attack from the Internet.
-
Do you perform hacker tests or security audits, and do you close security vulnerabilities?
Yes. At POLYAS, penetration tests are performed every year by independent partners (Physikalisch-Technische Bundesanstalt, ISICO GmbH and Micromata GmbH). Any security loopholes identified are closed. Reports can be viewed on request, but some parts of it need to be blacked out to avoid disclosing product secrets.
-
How are votes that have been cast encrypted in the database?
The current version CORE 2.5.0 encrypts each vote cast with a random AES128 key, and this is encrypted with the public key of the ballot box. Only during the counting is the private key of the ballot box used to restore the random AES keys and thus to decrypt the votes. RSA is used as the asymmetrical encryption method,…
-
How does POLYAS ensure that online voting is secure?
The voting software POLYAS CORE 2.5.0 meets the requirements of the international Protection Profile for secure online voting products according to the Common Criteria and is based on the electoral principles anchored in German Basic Law (universal, secret, free, equal, direct). The voting software POLYAS CORE 2.5.0 is a…
-
How does POLYAS ensure that there are no votes in the ballot box when the election starts?
After the end of the election, the election logs show the time at which the ballot box server was started and whether it was empty at that time.