[PracticalSecurity] Anonymity - great technology but hardly used
Shawn K. Quinn
skquinn at speakeasy.net
Wed Oct 26 18:41:48 PDT 2005
On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote:
> Many of the anonymity protocols require multiple participants, and
> thus are subject to what economists call "network externalities". The
> best example I can think of is Microsoft Office file formats. I don't
> buy MS Office because it's the best software at creating documents,
> but I have to buy it because the person in HR insists on making our
> timecards in Excel format.
1) You have told your HR person what a bad idea it is to introduce a
dependency on a proprietary file format, right?
2) OpenOffice can read Excel spreadsheets, and I would assume it can
save the changes back to them as well.
--
Shawn K. Quinn <skquinn at speakeasy.net>
More information about the cypherpunks-legacy
mailing list