On 10/26/05, Shawn K. Quinn <[EMAIL PROTECTED]> wrote: > On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote: > > Many of the anonymity protocols require multiple participants, and > > thus are subject to what economists call "network externalities". The > > best example I can think of is Microsoft Office file formats. I don't > > buy MS Office because it's the best software at creating documents, > > but I have to buy it because the person in HR insists on making our > > timecards in Excel format. > > 1) You have told your HR person what a bad idea it is to introduce a > dependency on a proprietary file format, right?
This is off-topic. Let's not degenerate into random Microsoft bashing. Keep the focus on anonymity. That's what the cypherpunks list is about. CP