Response to “How Microsoft Appointed Itself Sheriff of the Internet” (Part 2)