~~
You ignored the main argument I made: if there is a flaw in the system, it must be
removed. A soft-fork is not the best way to remove a security flaw.
Is that system insecure, because it is possible to do so?
That was a very bad example. 2+2=4 is working exactly as it is supposed to work. On the other hand if you could compute private key from public key, then ECDSA is NOT working as it is supposed to work.