Quote Originally Posted by plizze View Post
Since i didnt reverse engineered the software
I believe that you must have understood an algorithm (which, for closed-source software, includes reverse engineering in the first step) to make a statement on whether it's secure or not.