8/ The practice of assessing the security model of a system by description from people involved with the project rather than by source code was similarly employed by the MIT DCI when seeking to understand the IOTA Winternitz-based signature scheme. It is simply more effective.

— Eric Wall | BIP-420😺 (@ercwl) March 6, 2018