I reviewed the code to understand how it works and to find vulnerabilities. After about 2 hours, I didn't find anything. It is not a formal audit but it is better than nothing.
BULLBITCOIN.COM's avatar BULLBITCOIN.COM
@npub1t289...nkzs announcing Recoverbull, a privacy-first encrypted hot wallet backup and recovery protocol. Implemented in BULL wallet, it serves as an alternative to custodial wallets for beginners. A key milestone in our journey to make self-custody the safest default Bitcoin user experience! ๐Ÿ‘‡ More info: http://RECOVERBULL.COM Francis will be hosting a live Q&A on ๐• tomorrow at 3 PM EST: https://x.com/i/spaces/1kvJpMQBNPDxE
View quoted note →

Replies (1)

At WalletScrutiny I want to establish something similar. Attestations to have tried to reproduced binaries. "I tried for 4h and failed" is a data point just like your "I tried to find weaknesses for 2h but it looked ok". That's far far better than no external statements at all and I hope to standardize this on nostr. @btc_remnant
โ†‘