Posted September 07, 2021
Let us make the hypothesis that a worst case scenario occurs, resulting in every electronic device being "fried" by EMPs/CMEs, universally, on a worldwide scale.
Nobody would be able to download, decrypt, authenticate or even use any software, and honestly, it would not be of any immediate concern, if such a scenario ever occurred, but all CD-DVD (tapes, disuettes and other non-digital means of data storage) copies of software would remain intact and readily functional if unencrypted. They could be preserved in a way akin to history relics.
However extreme that may be, if we even consider for a second the implications of the remote possibility of a grid down scenario (loss of power and Internet connection, Starlink and satellite excluded), maybe those basic means of raw data storage would be the only cultural vaults of the sprawling digitized human evolution (and anything shielded by such phenomena).
My point being that reliance on commodities offered outside the scope of being manipulated by the end user (clients, encrypted software, online authentication, cloud storage) can only go so far, when concerns about self-sufficiency, futureproofing and security need to be addressed.
Nobody would be able to download, decrypt, authenticate or even use any software, and honestly, it would not be of any immediate concern, if such a scenario ever occurred, but all CD-DVD (tapes, disuettes and other non-digital means of data storage) copies of software would remain intact and readily functional if unencrypted. They could be preserved in a way akin to history relics.
However extreme that may be, if we even consider for a second the implications of the remote possibility of a grid down scenario (loss of power and Internet connection, Starlink and satellite excluded), maybe those basic means of raw data storage would be the only cultural vaults of the sprawling digitized human evolution (and anything shielded by such phenomena).
My point being that reliance on commodities offered outside the scope of being manipulated by the end user (clients, encrypted software, online authentication, cloud storage) can only go so far, when concerns about self-sufficiency, futureproofing and security need to be addressed.
Post edited September 08, 2021 by FateIsOneEdge