Re: [PracticalSecurity] Anonymity - great technology but hardly used
At 08:41 PM 10/26/05 -0500, Shawn K. Quinn wrote:
On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote:
Many of the anonymity protocols require multiple participants, and thus are subject to what economists call "network externalities". The best example I can think of is Microsoft Office file formats. I don't buy MS Office because it's the best software at creating documents, but I have to buy it because the person in HR insists on making our timecards in Excel format.
1) You have told your HR person what a bad idea it is to introduce a dependency on a proprietary file format, right?
2) OpenOffice can read Excel spreadsheets, and I would assume it can save the changes back to them as well.
Why don't you send her comma-delimited text, Excel can import it?
At 12:23 PM -0700 10/27/05, Major Variola (ret) wrote:
Why don't you send her comma-delimited text, Excel can import it?
But, but...
You can't put Visual *BASIC* in comma delimited text...
;-)
Cheers,
RAH
Yet another virus vector. Bah! :-)
--
-----------------
R. A. Hettinga
participants (2)
-
Major Variola (ret)
-
R.A. Hettinga