Apr. 29th, 2023

paserbyp: (Default)
What happens after we die? We know the body is left behind, but from ancient times there are myriad views on what happens to the soul, spirit, or mojo. One thing the ancients didn’t have to think about was remnants of a digital life. Who inherits your Bitcoin wallet, or your Facebook profile? What do you do with digital assets that you want passed down to your heirs?

Who really owns your data? How is ownership defined? Unlike physical properties like lands, or a car, [ownership of] data is not clearly defined. We might have some laws about intellectual property rights, but for data it’s not clear.

Inheritance of digital assets is likewise unclear. It’s very easy for you to inherit your parents’ house. There are rules, there are procedures, everything is set in stone. What about inheritance of digital data? Well, this has never been done before. We didn’t find any clear rules about how to inherit somebody else’s data.

Data can reside in multiple countries, in multiple locations, and duplicates of this data can exist at the same time. Furthermore, you can almost instantly transfer data from a location in Europe to one in America. Just like that, bam, I moved my data. Any solution to digital inheritance will have to account for clarifying ownership.

Before you can pass on your data, you must determine what you’ve got.

You have to make an inventory of your data, and this is the most crucial part. You have to know what you have. What kind of data is important to you? Where is it located? Who should handle the data?

This inventory is an ongoing process, any time you open a new account, purchase cryptocurrency, or acquire any other digital asset.

Protecting your data against attack is also important. Ransomware or a data breach could happen. If you’re rich or important in your field, you might face attacks on your business or direct personal attacks. Even so, data security is not the only concern. You might be super-secure, your devices might be super-secure, everything is OK, but inheritance should not be the weakest link.

For example, I might be above average knowledge in encryption schemes and ways how attackers are trying to steal your data, but I’m not knowledgeable in the laws of passing on data.

Also important is the expertise of your heirs. Inherited data is useless if the receiver isn’t able to access or process it. You have to make sure that whoever receives or inherits the data is able to access it.

Don't forget about several important points, including taking stock of any special software and hardware requirements. You advised creating a clear description of what data is involved, where it resides, and how it can be accessed. It also recommended putting this data in written, audio, and video form.

Maybe you have this whole scheme in your mind, this amazing procedure. But if you don’t pass this information to other people, if you don’t tell them how to access it, if something happens to you, they will not be able to access it.

Bottom line is you have to make an inventory of your data, and this is the most crucial part. You have to know what you have. What kind of data is important to you? Where is it located? Who should handle the data?

In additional, a bit of warning about encryption. You want to store and secure the data for a long time. There have been real examples where encryption schemes that were once considered secure are now known to be broken. Maybe in the future, like in five years, the encryption protocols that we know right now might be broken.

For example, when actual quantum computing becomes available it will break public key cryptography. Also you should be aware about a wide variety of other threats, including theft, hardware failure, and natural disasters.

Also you should noted that someone who’s 30 today can reasonably expect to live to 80 or more. We’re talking about 50 years until death. To put that in perspective, take for example some events from 1973, 50 years ago: the very first cell phone call, the launch of SkyLab, and the development of TCP (Transmission Control Protocol), essential to the workings of the internet.

Furthermore, today's tech giants may be tomorrow's dinosaurs. Digital Equipment Corporation, DEC, at the time was massive, one of the market leaders in computers. They existed for just 41 years. Even Microsoft is only 48. None of the big tech companies have reached the 50 years we need.

Finally, be aware of available storage methods and their expected lifespan, ranging from five to 10 years for CD storage to a surprising 35 years for VHS. Just imagine, all of the big companies you know, all of the technology you’re using, all of the storage media you may use for storing data, none of them will be ready for the next 50 years.

So, what about solution? Where to store your digital data?

Nowadays you might upload it to some cloud storage. The problem with cloud storage, if you just think about the companies, it’s tricky to find a company you’re 100% sure will exist in 50 years.

After much digging, you can came up with a recommendation for M-DISC, a variation on Blu-ray that’s designed to last 1,000 years. You need just got the device at home and it’s something you can do, and you have it under your control.

Having the data physically present on storage media in your country means that your country’s laws apply, something that’s not true of cloud storage.

Indeed you assumed the data will be encrypted. Storing stuff in plain textbthat’s a no-go. As noted, quantum computing will break many current encryption standards, including popular public key crypto systems. But symmetric algorithms such as the widely used AES-256 will survive, with sufficient key length.

Also you should noted that you don’t want a single point of access. What if you pass along your data disc and password to multiple relatives? But there’s only one Bitcoin wallet, say, so the first to open it keeps it. That’s not good. Also, what if the person you gave the stuff to would die before you?

In this case proposed a system involving multiple stakeholders, including one or more guardians and one or more successors.

Your Guardian gets the encrypted data disk, and the successors each get a part (just a part) of the password. At least two or three have to come together to unlock your data.

Finally, you don’t literally have to pack up a backpack for your heirs, but one way or another you must make sure they receive everything that’s necessary to unpack your digital estate:

* The data itself, on long-lasting media

* Any software needed to access the data

* Your will, including an explanation of why your heirs should want the data

* Any security and protection notes

* A clear explanation of how to access the data in written, audio, and video form

I concluded that the process can be broken down into Inventory, Protection, Storage, Accessibility, and Distribution. Do the inventory and that’s an ongoing process as mentioned before. This never stops. The easier it is to access it for your relatives, the better it is in the future.

Profile

paserbyp: (Default)
paserbyp

June 2025

S M T W T F S
1 2 3 456 7
8910 11121314
15161718192021
22232425262728
2930     

Most Popular Tags

Page Summary

Style Credit

Page generated Jun. 12th, 2025 01:31 pm
Powered by Dreamwidth Studios