> How do you "hack from the other side of the world" a computer that isn't even online?
Supply chain attacks. You just need to get in there before everything is cryptographically signed and sealed.
The best part is even if they published the source code for everything it would prove nothing. I seriously doubt the builds are reproducible. Lack of source-to-binary correspondence means source code would serve only to embarrass anyone protesting the electronic voting system.
As it stands, nothing short of a full audit of the complete signed software image that the machine booted and executed on election day would suffice. The judge-kings are on the record saying this system is UNQUESTIONABLE so they should publish the image on the internet and let the whole world take a look. I'm sure no faults will be found.