The compiled code is on a portable disk. The disk can be set by sliding a 'lock' so it is read-only. The company supplies a CRC checksum which is a very long number. If you change any one byte anywhere in the code, the CRC will change. You can place the read-only disk in a laptop and within a few seconds run a check on the compiled code. The Democrat can check it. The Republican can check it. Then the disk is inserted into the voting machine. After election close, the disk can be stored and checked anytime in the future.
Brilliant! Exactly how is a read-only disk going to "write" the votes? My point is that if the source code is available, someone will write malicious code and run it. Guaranteed.
What about the princton professor that showed how to tamper a diebold machine
(had three George washington votes convert to 1 vote for Georges and two votes for Benedict Arnold)
On Fox and Friends, the professor said the malicious code was self erasing and undetectable.