The Action That Accomplishes Nothing

Decentralization does not prevent the adversary from acting against you. It ensures that his action accomplishes nothing.
The Action That Accomplishes Nothing

In 2007, the United States government destroyed E-gold. The digital currency had operated for over a decade, processed billions in transactions, and served millions of users worldwide. The attack was surgical: prosecutors indicted Douglas Jackson, the founder, on money laundering charges, seized the company’s gold reserves, and shut down the servers. E-gold vanished, and its users lost everything.

Six years later, Liberty Reserve met the same fate. Arthur Budovsky had built an even larger operation, processing six billion dollars through a global network of users and exchangers. The Costa Rican company served over a million customers, including two hundred thousand Americans, facilitating transfers outside traditional banking. In May 2013, Spanish police arrested Budovsky at Madrid’s airport. American prosecutors unsealed an indictment, the domain was seized, and Liberty Reserve ceased to exist. Budovsky received twenty years.

The pattern is stark. Digital currencies that challenge state monetary control invite destruction, and when that destruction comes, it follows the same template: identify the person in charge, arrest him, seize the assets, shut down the servers. The entire apparatus of a billion-dollar financial network collapses because it depends on a single point of failure. The founder is the kill switch.

Bitcoin launched in 2009, between E-gold’s destruction and Liberty Reserve’s demise. Satoshi Nakamoto had studied these failures carefully. The lesson was that centralization was fatal. E-gold died because Douglas Jackson could be arrested. Liberty Reserve died because Arthur Budovsky could be arrested. Any system with a CEO, a headquarters, a central server, or an identifiable leadership structure contains within it the mechanism of its own destruction. The adversary need only find the node whose removal collapses the network.

Nakamoto’s solution was to build a system with no such node. Bitcoin is leaderless, serverless, headquarterless, distributed across thousands of computers in every jurisdiction on earth. Any node can be destroyed and the others continue. The protocol runs regardless of what happens to any individual participant.

This architectural choice addresses a specific problem in adversarial conflict. Colonel John Boyd’s OODA loop describes how combatants cycle through Observe, Orient, Decide, and Act to achieve their objectives. Most analysis focuses on speed through the loop. Boyd’s deeper insight was that disrupting any phase paralyzes the adversary entirely. Deprive the adversary of observation and orientation collapses with it; deprive him of orientation and decision becomes impossible; deprive him of decision and all action is paralyzed.

Privacy disrupts the loop at observation. Encryption blinds the watcher, denying him the information he needs to proceed. When communications are encrypted and transactions are anonymous, the adversary’s loop stalls at the first step.

But privacy is hard to maintain. Building genuinely private systems requires sophisticated cryptography, careful protocol design, constant vigilance against metadata leakage, and user discipline that most people struggle to sustain. The cypherpunks understood this: privacy is possible, but it is expensive in complexity and effort. Many systems cannot achieve it, and many more achieve it imperfectly, leaking enough information for a determined adversary to reconstruct what he needs.

Decentralization offers a different kind of protection, one that operates even when the adversary can see everything. Grant him perfect observation. Let him watch every transaction, identify every participant, map every node. He observes, he orients, he decides, he acts. And his action accomplishes nothing.

China provided the empirical test in mid-2021, when the government banned Bitcoin mining entirely. China at that time controlled between sixty-five and seventy-five percent of the global hashrate, the computational power securing the network. The ban was total: mining operations were shut down, equipment was seized, miners arrested or fled. By any measure, the action succeeded on its own terms. The adversary observed, oriented, decided, and acted with full state power behind him.

Bitcoin’s hashrate collapsed; the network kept running. Blocks kept arriving, slightly slower than the ten-minute target, while the protocol’s difficulty adjustment automatically recalibrated to match the reduced computational power. No central authority intervened, no emergency committee convened. The code adapted. Then miners relocated to Kazakhstan, Russia, and Texas. Within six months, the network had fully recovered its previous hashrate. Within four years, China itself was back to contributing fourteen to twenty percent of global mining, the ban still nominally in effect but practically unenforceable as underground operations proliferated.

Kevin Zhang of Foundry summarized the event: “Bitcoin withstood a nation-state attack of China banning mining, and the network shrugged it off.” Brandon Arvanaghi put it more pointedly: “The bitcoin network withstood an attack by a major superpower and emerged stronger than ever six short months later.”

Nations can ban Bitcoin, and one major nation did, with the ban accomplishing nothing durable. The OODA loop completed, but the strategic objective remained unachieved. China’s action was fully executed and fully irrelevant.

Decentralization’s protection operates through a different mechanism than privacy. It does not conceal you from the adversary or prevent him from acting. It ensures that every action available to him falls short of his goal. Arrest the miners and the network continues; raid the developers and the protocol runs; sanction the exchanges and the peer-to-peer market persists. He is Sisyphus: the boulder moves, but it will not stay.

This creates a new category of institution, one that survives every action within the adversary’s capabilities. Privacy buys time and raises costs, forcing the adversary to expend resources on observation before he can proceed. Decentralization buys permanence, ensuring that even successful action fails to achieve the adversary’s objective. The two defenses complement each other: privacy makes the loop expensive to begin, while decentralization makes it futile to complete.

Douglas Jackson and Arthur Budovsky built financial systems that served millions and processed billions. Both died because one man could be arrested. Satoshi Nakamoto built a system that survives such arrests because no single arrest changes anything. The network has no kill switch. The adversary acts, and the protocol continues.



Loading comments…