We are therefore sending a message to all stakeholders to take a second look at this, and work together on the practical limitations in order to achieve an optimal, but not perfect, implementation of the concept.
While some of the deployed protocols are in the public domain, the source code for particular applications have not been released yet making it difficult for security researchers to render an informed opinion on its implementation.