How about we throw rocks AT the candidates instead?
Also, it's not absurd; How do you verify the code of a secure system, but in such a way that it's not possible to also alter the system in the course of verifying it? Think of a rootkit. Verifying OS files and BIOS data relies on the OS and BIOS at least to some extent, so a carefully modified system can fake its own authenticity.
You, the average voter or poll volunteer, have no way of verifying the code operating on a voting machine without also having the ability to change the code on the voting machine, and if anyone has the ability to change the code, then the code is not secure is it?
Voting machines need to be black boxes, but the content of that box is too critical to simply be trusted... so electronic voting is a non-starter.