Although much attention has been given to the problem of not distorting or subverting the voting process in an online environment, techniques such as encryption and distributed time-stamping make it practically impossible to compromise personal autonomy (Chaum, 1985) and (Haber and Stornetta, 1991).