“Networks, when attacked, become even more decentralized and resilient. A good example is Napster and its successors, each of which has more closely approached an ideal peer-to-peer model, and further freed itself from reliance on infrastructure that can be shut down by central authority, than its predecessors. Hierarchies, on the other hand, respond to attack by becoming even more ossified, brittle and closed. Hierarchies respond to leaks by becoming internally opaque and closed even to themselves, so that their information is compartmentalized and they are less able to make effective use of the knowledge dispersed among their members.”
Related posts:
Stop-and-Frisk: How Government Creates Problems, Then Makes Them Worse
Fraud: Medicare vs. Walmart
Andrew Bacevich: How We Got Here
Thomas Jefferson on Liberty
Why you need offshore gold storage
The Daily Bell - Investment Trends 2014
"For Your Own Protection"
Wild and Free: The Libertarian Philosophy of Henry David Thoreau
Have We Reached Peak Government?
Breaking the last taboo - Gaza and the threat of world war
Doug Casey – Let’s Do A Tour Around The World
John Whitehead, The FBI: The Silent Terror of the Fourth Reich
The Grand Experiment: Offloading Risk onto the State
The Obama Quagmire
How I Got Boned by Taxes Two Years in a Row
