I wasn’t requesting access, I was asking what trusted third party authority will audit your cryptographic protocol to certify it as secure? Do you adhere to NIST standards? Do you offer a bounty for cracking your crypto like Telegram? Do you have a white paper explaining your cryptographic architecture and the reasoning behind it?
Why do you use a proprietary key exchange algorithm and not a standard robust Diffie-Helman?
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
What are your plans for having your crypto audited?
The offer is interesting, but unfortunately this is a commercial project, so we can't give you an access.
I wasn’t requesting access, I was asking what trusted third party authority will audit your cryptographic protocol to certify it as secure? Do you adhere to NIST standards? Do you offer a bounty for cracking your crypto like Telegram? Do you have a white paper explaining your cryptographic architecture and the reasoning behind it?
Why do you use a proprietary key exchange algorithm and not a standard robust Diffie-Helman?