Technology can realize greatly intensified forms of continuous democratic participation, but such applications must be openly developed and publicly owned.
You may be able to verify that a given code is correct, or that a given device is correct, but no amount of software can conclusively prove that a given person has voted. All that cryptography prevents is a man in the middle attack, it does not prevent bad inputs from being entered by people who have stolen credentials.
Voting should be easy and convenient, but paper ballots and voting booths can be easy and convenient.
You may be able to verify that a given code is correct, or that a given device is correct, but no amount of software can conclusively prove that a given person has voted. All that cryptography prevents is a man in the middle attack, it does not prevent bad inputs from being entered by people who have stolen credentials.
Voting should be easy and convenient, but paper ballots and voting booths can be easy and convenient.