“Networks, when attacked, become even more decentralized and resilient. A good example is Napster and its successors, each of which has more closely approached an ideal peer-to-peer model, and further freed itself from reliance on infrastructure that can be shut down by central authority, than its predecessors. Hierarchies, on the other hand, respond to attack by becoming even more ossified, brittle and closed. Hierarchies respond to leaks by becoming internally opaque and closed even to themselves, so that their information is compartmentalized and they are less able to make effective use of the knowledge dispersed among their members.”
Related posts:
“Privacy” Held Hostage By “Security” – Public Unimpressed
Their Propaganda....Our Propaganda
The Bitcoin Central Bank's Perfect Monetary Policy
The Advantages of Bitcoin Over Paper Money and Gold
Surrendering U.S. Citizenship Over New Banking Regulation?
Don't Eat These, Ever: What’s in Your Condiments?
Jeffrey Tucker: Is There A Viable Alternative To College?
Will Grigg: "Damned from Memory": When the Drug War Turns on its Own
Dealing with Cops These Days
Robert Ringer: A Tale of Two Winners
David Graeber, DEBT: The First 5,000 Years [2012]
Internationalizing in Chile
Will China Rescue the Global Economy?
Robert Ringer: The Illusion of Misfortune
Thoughts from the Frontline: The Age of Transformation