The Vulnerabilities of our Voting Machines, and How to Secure Them