It sounds like the technical problem is that they spent more time thinking about cryptography itself than they did about the prudent application of it.
Confidentiality that undermines availability might be good cryptography but it violates basic tenets of information security.
Confidentiality that undermines availability might be good cryptography but it violates basic tenets of information security.