[…] “While the primary directive of the network is linking, paranodality is concerned—to paraphrase Lovink—with whatever the mirror phantom of linking is. A few examples of paranodalities might help to illustrate the concept: a close friend orfamily member who refuses to participate in the latest social media craze and remains a conspicuous hole in our social network is an example of a paranode; broken web links pointing to pages thatno longer exist or cached versions of pagesno longer active are paranodal because they represent phantom nodes; signal jammers
such as RFID (radio-frequency identification) blockers that prevent network devices from being found are examples of technologies that create paranodality; public spaces without surveillance cameras are paranodal spaces; radio operators without a license (pirate radio) are paranodal because they function without validation from the network; any kind of wilderness where signal reception cannot be established is paranodal; digital viruses and parasites that obstruct the operations of a network are also examples of paranodal technologies; obsolete technology is
paranodal because its usage is no longer required to operate the network; digital noise and glitches are paranodal because they interfere with the fow of data in the network; paranodality is a lost information packet on the Internet; populations in a dataset that are excluded or discriminated against by an algorithm become paranodal; punk or rogue nodes—nodes who belong to a network only in order to destroy it—are paranodal” (“Off the Network.Disrupting the Digital World”, Ulises Ali MejiAs, Minnesota University Press, 2013, p.154-155)