*except if someone wants to misuse them.
http://itpolicy.princeton.edu/voting/
an attacker who gets physical access to a machine or its removable memory card for as little as one minute could install malicious code; malicious code on a machine could steal votes undetectably, modifying all records, logs, and counters to be consistent with the fraudulent vote count it creates. An attacker could also create malicious code that spreads automatically and silently from machine to machine during normal election activities — a voting-machine virus.
Suddenly pencils and paper look even better, don’t they?