[PracticalSecurity] Anonymity - great technology but hardly used
cyphrpunk
cyphrpunk at gmail.com
Thu Oct 27 20:18:12 PDT 2005
On 10/26/05, Shawn K. Quinn <skquinn at speakeasy.net> wrote:
> On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote:
> > Many of the anonymity protocols require multiple participants, and
> > thus are subject to what economists call "network externalities". The
> > best example I can think of is Microsoft Office file formats. I don't
> > buy MS Office because it's the best software at creating documents,
> > but I have to buy it because the person in HR insists on making our
> > timecards in Excel format.
>
> 1) You have told your HR person what a bad idea it is to introduce a
> dependency on a proprietary file format, right?
This is off-topic. Let's not degenerate into random Microsoft bashing.
Keep the focus on anonymity. That's what the cypherpunks list is
about.
CP
More information about the cypherpunks-legacy
mailing list