During a presentation in 2015, developer of Bitcoin Core, Greg Maxwell, engaged in discussing this issue. He was advised by Google’s cryptographer, Filippo Valsorda, against in executing any kind of fallback during the time of generating keys. Another cryptography expert and an assistant professor of computer science, Matthew Green, termed the fallback as not a good idea. He pointed out that the issue was not with the extension of code in relation to older wallet apps that uses weak key generation but also in respect of addresses generated at the time.
Green stated that “If you generated your Bitcoin address using this code, you could potentially have crackable, predictable keys that could be exploited to steal money.” He thinks that it is not possible to guide browsers and apps how to generate keys since it is not clear and there was also considerable variation.
As a result, Alphabet’s Google Chrome browser faced the issue until the year 2015. Gerard thinks that the subpar result of random number generation could be predictable probably in a week to crack through brute force. In his post, the Unix Administrator pointed out that most web wallets are facing the issue due to this flaw without naming any particular ones.
However, he believes that it would be a lucky one if there are only a few instances of loss of money from the wallet. On the other hand, Dave Harding, a Bitcoin contributor, expressed his doubts on the motive of Gerard, who brought back the issue. He thinks that there was nothing new in the fresh concerns except remailers’ choice and bitcoin address inclusion in his latest message.