“Networks, when attacked, become even more decentralized and resilient. A good example is Napster and its successors, each of which has more closely approached an ideal peer-to-peer model, and further freed itself from reliance on infrastructure that can be shut down by central authority, than its predecessors. Hierarchies, on the other hand, respond to attack by becoming even more ossified, brittle and closed. Hierarchies respond to leaks by becoming internally opaque and closed even to themselves, so that their information is compartmentalized and they are less able to make effective use of the knowledge dispersed among their members.”
Related posts:
Making Sense of Bitcoin
Sending Money Home: Technology or Bureaucracy?
Our Legacy Systems: Dysfunctional, Unreformable
Tor: The Onion Router
America Is Plunging Into Kafka’s Nightmare
Gary North: How Come We're So Rich?
John Whitehead: Orwell Revisited
The State of Cryptocurrency Mining
Jeffrey Tucker: How the Internet Saved Civilization
Ron Paul: Government Policies Hurt Low-Wage Workers
The Future of the Web Looks a Lot Like Bitcoin
Paul Rosenberg: Top 5 Reasons I Stopped Caring About Politics
Go Directly to Jail: The Criminalization of Almost Everything [2010]
Why you need offshore gold storage
A Story of Slavery in Modern America
