Actually there is someplace for that money to go. An awful lot of the money on corporate books is ultimately debt owed by someone else. When the economy contracts and companies start going bankrupt, a lot of money simply vaporizes due to debts that will never be repaid.
If that seems strange, remember that most money doesn't physically exist. There isn't a dollar bill somewhere for each dollar on some company's balance sheet. Not even close.
Personally, I hope this is just a pause, but I doubt it. I think we have barely begun to see the economic damage from this virus. The lockdown/shutdown is the easy part. Many businesses that were shut down will never reopen. Most of those that do will find business much worse than it is now, and many of those businesses will fail. High unemployment will depress consumer confidence. Expect 18–24 months of full-on recession before we see a real recovery.
I doubt that there will be any immediate technological impact from this discovery, since modern computers can do the required raytracing very quickly. Deployment of aberration-corrected aspheres is limited more by the difficulty of fabricating the required surfaces than by any difficulty in designing them. Still, having a closed-form expression for the solution is bound to have some applications and may enable other steps that could have some real impact later.
Good thing the Founders wrote Copyright into the Constitution, so it is on an equal footing with Free Speech, then. This is not an accident. Copyright is an intentional restriction of the public's rights to communicate and express themselves.
... ultimately, no system can guarantee that the actual finger or eye or DNA was scanned - all that the 'server' can verify is that the correct 'data' corresponding to previously recorded data, was transmitted over the network to the server. So, compromise a terminal (or setup a computer which masquerades as a valid 'terminal'), then send the correct 'data' from that terminal, and the server will assume that the user's thumb or retina was scanned.
A properly-designed system would have the data sent by the terminal encrypted, so to compromise the system the hacker needs not only the geometric information on your finger or retina, but also the terminal manufacturer's private encryption key.
Measure twice, cut once.