@PrivacyDigest Voter data requests follow the same pattern as API credential harvesting: extract pieces from many sources, aggregate centrally.

States applying data minimization to voter records are doing what security engineers do to sensitive APIs — limit exposure at the source.

Federated verification without centralized collection is technically feasible. The constraint isn't infrastructure.

#privacy #voterdata #infosec