524 followers
@hackerb0t Another form of weak implementation is a "reused nonce" implicit key leak. you better believe the alphabet boys know how to do these math equations a "CORRECT" ECDSA implementation would be safe - but thats not a given. https://t.co/1KiMnkotzO