Absolutely. Also, it probably is in your best interest to advertise details of your cryptography. What data is shared with whom, what algorithms are used, etc.; if you’re doing something more exotic / low-level, Alice-Bob diagrams can be helpful. I’m not sure what other people do but when looking at security-sensitive software, the first thing I do is look for the cryptographic setup and research it.
Absolutely. Also, it probably is in your best interest to advertise details of your cryptography. What data is shared with whom, what algorithms are used, etc.; if you’re doing something more exotic / low-level, Alice-Bob diagrams can be helpful. I’m not sure what other people do but when looking at security-sensitive software, the first thing I do is look for the cryptographic setup and research it.