“Networks, when attacked, become even more decentralized and resilient. A good example is Napster and its successors, each of which has more closely approached an ideal peer-to-peer model, and further freed itself from reliance on infrastructure that can be shut down by central authority, than its predecessors. Hierarchies, on the other hand, respond to attack by becoming even more ossified, brittle and closed. Hierarchies respond to leaks by becoming internally opaque and closed even to themselves, so that their information is compartmentalized and they are less able to make effective use of the knowledge dispersed among their members.”
(Visited 39 times, 1 visits today)
Related posts:
He Volunteered to Go to Auschwitz
"I'm Going to Take Him Out"
How to Be a Rogue Superpower: A Manual for the Twenty-First Century
John Whitehead: Orwell Revisited
Wendy McElroy: First They Came For The Porn Stars...
"Homelanders" To U.S. Expatriates: Don't Come Back... Ever
Bill Bonner: Why I Sued Washington 28 Years Ago
George Orwell Surely Would Be Amused by the Statolatry in the United Kingdom
Dual Canadian-American citizens: We are not tax cheats
Welcome to Police-State America, Weary Traveler
Will Grigg: The Stalinist in the White House
Former Fed Banker: Debunking the Myths About Central Banks
It’s Time for Private Defense
A Letter to America from the Son of an American
7 Lessons I Learned About Investing in Bitcoin