all the potential security flaws that we’ve discussed here operate under the assumption that I maliciously attempted to subvert the stated purpose of this tool
This is not true at all. Security flaws of a crypto tool are bugs which make it less secure than expected and which the author is typically not aware of. Software with a hidden malicious load is just a trojan (or malware in general).
Note that I said “all the potential security flaws we’ve discussed here”. Not, “any possible security flaw.”
This is precisely why I’ve been annoyed by the direction this thread has taken. If someone wants to talk about potential flaws specific to this tool, I’m all ears. But instead it’s mostly been a discussion about all the different ways I could possibly slip a Trojan into this tool.
This is not true at all. Security flaws of a crypto tool are bugs which make it less secure than expected and which the author is typically not aware of. Software with a hidden malicious load is just a trojan (or malware in general).
Note that I said “all the potential security flaws we’ve discussed here”. Not, “any possible security flaw.”
This is precisely why I’ve been annoyed by the direction this thread has taken. If someone wants to talk about potential flaws specific to this tool, I’m all ears. But instead it’s mostly been a discussion about all the different ways I could possibly slip a Trojan into this tool.
I don’t believe I ever said anything like that.
You didn’t. Sorry, I should have clarified. When I said “this thread” I meant “the comments in general” and not your particular reply.