


Distributed Architecture
Protects data from hackers and system outages
Consensus Algorithms
Computers work together to verify transactions and can lockdown any computer that behaves suspiciously
Cryptographically Secure
Uses Secure Hash Algorithm 256 (SHA-256)
Private Permissioned Network
Users must be invited to use the bcd blockchain
Immutable Data
Transactions recorded on bcd blockchain are tamper-proof and traceable, providing further data protection
Transaction data is stored in campaign and PAC's systems for months before being filed with the government
Records can be edited at anytime, and its nearly impossible to trace