How preppers plan to save us if the whole internet collapses

New Scientist — TechnologyTuesday, November 4, 2025 at 4:00:14 PM
How preppers plan to save us if the whole internet collapses

How preppers plan to save us if the whole internet collapses

Recent internet outages have underscored the vulnerabilities inherent in the global network, highlighting the risk of a potential catastrophic failure. These incidents have raised concerns about the lack of an official contingency plan to address such a collapse. In response to this gap, a dedicated team of hackers is actively preparing solutions to mitigate the impact should the internet fail entirely. Their efforts aim to provide a backup system to maintain connectivity and essential services during an outage. This proactive approach emerges from the recognition that current infrastructure is fragile and that official preparedness measures are insufficient. The situation emphasizes the need for alternative strategies to safeguard communication and information flow in the event of widespread internet disruption.

— via World Pulse Now AI Editorial System

Was this article worth reading? Share it

Recommended Readings
NBA Trade Rumors: NBA Execs Reportedly Have 'No Interest' in Ja Morant Trade
NegativeArtificial Intelligence
Recent reports indicate that NBA executives are showing no interest in trading for Ja Morant, highlighting the growing tensions in Memphis due to off-court issues and a rift with the team. This situation is significant as it not only affects Morant's career but also the dynamics of the Memphis franchise, raising questions about the team's future and Morant's role within it.
How does HTTP work?
NeutralArtificial Intelligence
HTTP, or Hypertext Transfer Protocol, is essential for how we use the Internet. It allows us to request and receive information from websites, making it a fundamental part of our online experience.
Is spyware hiding on your phone? How to find and remove it - fast
PositiveArtificial Intelligence
In today's digital age, your smartphone is a treasure trove of personal information, making it a prime target for hackers and spies. This article provides essential tips on how to quickly identify and remove spyware from your device, ensuring your privacy and security. It's crucial to stay informed and proactive about protecting your digital life.
ToxicTextCLIP: Text-Based Poisoning and Backdoor Attacks on CLIP Pre-training
NegativeArtificial Intelligence
The CLIP model has made great strides in vision-language tasks, but its dependence on unfiltered internet data raises serious concerns about data poisoning and backdoor attacks. While most research has focused on image-related vulnerabilities, the risks associated with text data are equally significant and warrant attention.
如何通过代理访问区域锁定的手机游戏
NeutralArtificial Intelligence
This article discusses how to access region-locked mobile games using a proxy. It highlights the challenges gamers face due to geographical restrictions and offers solutions to bypass these limitations. Understanding how to navigate these barriers is important for gamers who want to enjoy a wider range of games, regardless of their location.
Lawmakers say stolen police logins are exposing Flock surveillance cameras to hackers
NegativeArtificial Intelligence
Recent concerns have emerged as lawmakers reveal that stolen police logins are putting Flock surveillance cameras at risk of hacking. With about 3% of Flock's law enforcement customers lacking multi-factor authentication, numerous agency accounts could be vulnerable to unauthorized access. This situation highlights the critical need for enhanced cybersecurity measures in law enforcement to protect sensitive data and maintain public safety.
Ex-Cybersecurity Staffers Charged With Moonlighting as Hackers
NegativeArtificial Intelligence
Three former cybersecurity employees have been charged with engaging in criminal activities by moonlighting as hackers. They allegedly launched ransomware attacks to extort millions from victims across the country. This case highlights the serious risks posed by individuals who misuse their expertise for malicious purposes, raising concerns about trust in the cybersecurity industry.
What Finally Made Web3 Click for Me
PositiveArtificial Intelligence
The article discusses the evolution of the internet from Web1 to Web2 and now to Web3, highlighting how this new decentralized web aims to empower users by giving them more control over their data. It emphasizes the significance of Web3 in addressing the limitations of previous web iterations and its potential impact on the future of digital interactions.