This is a really weird misrepresentation of the facts. Did you even bother to read our official announcement on the incident? Apparently not. We totally acknowledged the incident and put together an action plan to make sure no user funds are at risk, this is why we were in contact with Google and the Police authorities from the very first day that this bug was disclosed to us. And since you brought this up it would be also nice of you to mention that this bug only existed in this very particular version of our then-newly-released desktop wallet so mobile clients were not affected at all [...]
Ok. So only the destkop clients were affected.
At least your mobile wallet is open-source so everyone can verify the code and check that you don't have other blatantly retarded mistakes there, right? Oh i forgot.. it's not.
Also, i'd like to quote you here:
Thank you for your comments. We don't believe that any side claims that the seed was sent in plain text, the "victim" (aka blackmailer) has always claimed that his seed was sent encrypted to Google and then a Google employee used it to steal his funds. We have millions of users but only his funds was stolen - and stolen by Google. We expect people on this forum to be smarter than that. And yes, you can verify that everything was broadcasted over HTTPS, just ask the "researchers" who made a case out of it in the first place to send you a copy of the wallet executable, install it on a sandbox and run a packet sniffer to see for yourself.
You were using HTTPS. Congratulations, that makes the vulnerability just a little bit less severe.
You see google as the only (?) person who can steal funds from this vulnerability
because of HTTPS. This means you obviously don't have any clue.
There is no good reason to trust a closed source wallet from developers who have such a stance regarding this vulnerability.