In the November 2018 election, Los Angeles County will implement at least two of the three most important voting-system reforms, namely paper ballots and free software. (I don't know whether they will manage to implement the third reform, which is auditing of randomly sampled precinct results.)
“L.A. County Gets State Approval of New Vote-Counting System Using Open Source Software”
John Myers, Los Angeles Times, August 22, 2018
It is the first election system of its kind, using publicly available source code that has been certified for use in California.
“For Open-Source Software, the Developers Are All of Us”
Derek Zimmer, Linux Journal, February 7, 2018
You enter information into your Google Chrome browser, on a website running Microsoft Internet Information Server, and the website is verified through Comodo certificate verification. Your data is transmitted through Cisco firewalls and routed by Juniper routers. It passes through an Intel-branded network card on your Dell server and through a SuperMicro motherboard. Then the data is transmitted through the motherboard's serial bus to the SandForce chip that controls your Solid State Disk and is then written to Micron flash memory, in an Oracle SQL database.
You are reliant on every single one of those steps being secure, in a world where the trillion-dollar problem is getting computers to do exactly what they are supposed to do. All of these systems have flows. Every step has problems and challenges. And if something goes wrong, there is no liability. The lost data damages your company, your livelihood, you. …
So how do we fix this problem? we organize and support open software development. We make sure that important free and open security projects have the resources they need to flourish and succeed. …
We have founded the Open Source Technology Improvement Fund, a 501(c)3 nonprofit whose only job is to fund security research and development for open-source software. We vet projects for viability, find out what they need to improve and get them the resource to get there. We then verify that their software is safe and secure with independent teams of software auditors, and work with the teams continuously to secure their projects against the latest threats.