4
Let’s talk about Layer One X and X_wallet | horrifically bad use of cryptographic primitives
(saltysquirrel1759d62f4c-tcyiv.wordpress.com)
Questions, answers, discussions, and literature on the theory and practice of cryptography
Rules (longer version here)
##Related resources;
Very fun (horrifying) read. That fucking extension was probably coded with heavy use of LLM generated code.
This is an instance where I sincerely hope it was the work of an LLM, for the alternative is even more fearful: someone who knows just enough cryptography to be familiar with using primitives and is able to write code that compiles, but doesn't actually understand one iota of the theory behind modes and constructions.
The thought of this person being somewhere out there, inexorably writing awful code but unlike an LLM has the free will to keep going. It gives me chills.
At the very least the source code was available to read. Much of the software world which is proprietary could (and does) have similar awful security. Proprietary code isnt necessarily insecure, just that it is much simpler to call people out on their bs code practices otherwise.