It might be but it is highly dubious. However, they MIGHT have put some effort into "plugging" each implementation and planting a subtle bug in them. You never can tell.
It is not somuch the protocol what matters but the implementations.
Imagine they "rig" all those beatiful hardware RNG. Could you tell the difference?
Are you sure renowned developer X van Y is not an NSA mole?
It is not somuch the protocol what matters but the implementations.
Imagine they "rig" all those beatiful hardware RNG. Could you tell the difference?
Are you sure renowned developer X van Y is not an NSA mole?