The rules of protocol and encryption used in the Quinn Act are still effective even years after their inception, which means that the principle is well designed. However, security holes have been found and repaired over time in many versions of the software. As with any other form of software, the safety of the program depends on the speed at which problems are created and fixed. The more such problems are discovered, the more mature the decision will be.
There are often misconceptions about thieves and security holes that have occurred in a number of businesses and money exchange services. Although these events are unfortunate, none of them included the breakthrough of the Coin itself, and no gaps were made to the technology or network of the Bit Coin; just as stealing a bank does not mean gaps in the dollar itself. However, it is accurate to say that a whole range of good practices and security solutions are required to give users better protection of their money and to minimize the overall risk of theft and loss. Over the past few years, such security features have been developed as portfolio encryption, non-Internet-related portfolios, computerized portfolios and multi-signature transactions.