From today’s addition to the article for G6:
In 2045, a crowdsourced investigation of the Zhupao data breach uncovered technical specifications for the withering process that renders G6 data unusable when disconnected from the larger network. Analysis of the specifications revealed that the process is patterned on misfolding proteins, with an initial corruption triggered when a G6 node is taken offline or its owner-actor verification is revoked, and then cascading across the disconnected data.
Kind of enamoured with the fact that G6 nodes can get CMD too. Excellent bit, not a kind of sick thing to build into your network specifically rolled out to prevent CMD at all, very cool.