[PracticalSecurity] Anonymity - great technology but hardly used

cyphrpunk cyphrpunk at gmail.com
Thu Oct 27 20:18:12 PDT 2005


On 10/26/05, Shawn K. Quinn <skquinn at speakeasy.net> wrote:
> On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote:
> > Many of the anonymity protocols require multiple participants, and
> > thus are subject to what economists call "network externalities".  The
> > best example I can think of is Microsoft Office file formats.  I don't
> > buy MS Office because it's the best software at creating documents,
> > but I have to buy it because the person in HR insists on making our
> > timecards in Excel format.
>
> 1) You have told your HR person what a bad idea it is to introduce a
> dependency on a proprietary file format, right?

This is off-topic. Let's not degenerate into random Microsoft bashing.
Keep the focus on anonymity. That's what the cypherpunks list is
about.

CP





More information about the cypherpunks-legacy mailing list