Indeed a protocol must be implemented by both sides to be useful.
The 4.0.0 release has redundant config and session storage saved apart from the file system. A corrupted file system will no longer cause loss of credentials, key or counters needed to join the network.