Many moons ago I did a project at uni where we implemented elliptic curve cryptography in Java and released it as open source. Unsurprisingly, we had no idea what we were doing. Some years later I get a random mail from someone using it on some embedded system...
I don't want to know, and I fear that ist is paramount that I maintain plausible deniability πβ₯οΈπ

