http://pie4utuwnzfkjyluvwqyijk5kl5dvkmfant3capij77n26k5cvef3yqd.onion/viewtopic.php?p=239
Centralized Control Creates Dependency Problem: When administrators hoard critical information (e.g., attacks, lea activity, exploit methods, encryption protocols), they centralize control over that knowledge. This makes other members heavily reliant on the administrators for access, information, security or updates.