this post was submitted on 16 Jan 2026
4 points (100.0% liked)

Cryptography @ Infosec.pub

588 readers
1 users here now

Questions, answers, discussions, and literature on the theory and practice of cryptography

Rules (longer version here)

##Related resources;

founded 2 years ago
MODERATORS
 

I won't spoil the walkthrough of the appalling source code. But it does end like this:

If you’re using X_wallet, you need to move your assets Right. Fucking. Now. to a wallet that isn’t a steaming pile of dogshit.

As always, there's an XKCD to succinctly describe the situation: https://xkcd.com/221

you are viewing a single comment's thread
view the rest of the comments
[–] Neptr@lemmy.blahaj.zone 3 points 2 weeks ago* (last edited 2 weeks ago)

At the very least the source code was available to read. Much of the software world which is proprietary could (and does) have similar awful security. Proprietary code isnt necessarily insecure, just that it is much simpler to call people out on their bs code practices otherwise.