“Networks, when attacked, become even more decentralized and resilient. A good example is Napster and its successors, each of which has more closely approached an ideal peer-to-peer model, and further freed itself from reliance on infrastructure that can be shut down by central authority, than its predecessors. Hierarchies, on the other hand, respond to attack by becoming even more ossified, brittle and closed. Hierarchies respond to leaks by becoming internally opaque and closed even to themselves, so that their information is compartmentalized and they are less able to make effective use of the knowledge dispersed among their members.”
Related posts:
A Tale of Two Giants: The Elephant and the Dragon
FDR Spied on Leonard Read
Murray Rothbard: And Now Afghanistan [1980]
Stanford Seminar - BTC: Bitcoin, a New Value Chain in China
Why The U.S. Job Market Remains Terribly Bleak
Substitutionary Justice In A Free Society
Eric Margolis: Syria's WMD?
ObamaCare Was Sold To American Voters On Deceptive Terms
Understand the Emergence of the Marijuana Meme - Even In China
A millionaire, a market crash and a murder
Wait Long, Move Fast
Happy Tax Freedom Day?
Withdrawing Political Legitimacy
Criminal Enterprise Operations of the Police
Judge Napolitano: Spying and Lying