4
Let’s talk about Layer One X and X_wallet | horrifically bad use of cryptographic primitives
(saltysquirrel1759d62f4c-tcyiv.wordpress.com)
Questions, answers, discussions, and literature on the theory and practice of cryptography
Rules (longer version here)
##Related resources;
At the very least the source code was available to read. Much of the software world which is proprietary could (and does) have similar awful security. Proprietary code isnt necessarily insecure, just that it is much simpler to call people out on their bs code practices otherwise.