Dear community. As you already know recently there was an unpleasant situation with the coin YENTEN (YescryptR16):
the attackers took advantage of the vulnerability in the source code of YENTEN thanks to this they received 84 million coins. This was followed by a price reduction to 0.1-1 Satoshi per coin. Hopefully, the YENTEN community will successfully resolve this.
However, many people believe that this problem could flow into the WAVI source code. This is a misconception so it is necessary to clarify this situation.
As it became known from the discussion on BTCtalk (
https://bitcointalk.org/index.php?topic=2329470.4140) the reason for this problem was a vulnerability in the source code called
CVE-2018-17144 (more information:
https://bitcoincore.org/en/2018/09/20/notice/). This vulnerability appeared in the Bitcoin source code in November 2016 in the version of Bitcoin Core 0.14.0 and was solved on September 18 this year in update 0.16.3. So this issue migrated to the YENTEN source code when the fork was produced in October 2017. Therefore this issue is not related to the YENTEN developer (and the YescryptR16 algorithm).
Now that concerns our coin. WAVI is a fork of DASH (a fork of bitcoin on January 18, 2014) in which initially there is no this vulnerability. This means that WAVI is not threatened by this problem and your investment is protected by a digital code.
Link to the source code of YENTEN in which the vulnerability lies:
https://github.com/conan-equal-newone/yenten/blob/master/src/validation.cpp#L2859The corresponding part of the WAVI source code:
https://github.com/wavicom/wavi/blob/master/src/validation.cpp#L500If you have something to add or make comments, I suggest to discuss it.