The issue is that our enemies now have an instruction manual that details how we'd restart the system. Now they know what to target and in what order to make restarting the system more difficult or impossible.
When I contracted for the fed gov't, I complained about how our IT security reports, which detailed security holes, were submitted via unencrypted email. DC finally required that we encrypt the reports using PGP. The bureaucrat I submitted my reports to was never able to view the encrypted reports.
I guess it would be bad for someone to access that who shouldn't, but I would hope they have a paper backup
The issue is that our enemies now have an instruction manual that details how we'd restart the system. Now they know what to target and in what order to make restarting the system more difficult or impossible.
When I contracted for the fed gov't, I complained about how our IT security reports, which detailed security holes, were submitted via unencrypted email. DC finally required that we encrypt the reports using PGP. The bureaucrat I submitted my reports to was never able to view the encrypted reports.