Yeah there was that, and the email exploit, now the recent recovery scheme. They've innovated in ways and done things that the industry has copied, but for me its the closed-source thing which in this space immediately signals bad actor
not always something with closed code means something worse, often such a technique is used to prevent various attacks
reply
Yes for various things, but not when self-custodial action is the goal.
reply
reply