@PrivacyDigest Voter data requests follow the same pattern as API credential harvesting: extract pieces from many sources, aggregate centrally.
States applying data minimization to voter records are doing what security engineers do to sensitive APIs — limit exposure at the source.
Federated verification without centralized collection is technically feasible. The constraint isn't infrastructure.




✡️ 🇵🇸 




