iancoleman / bip39

A web tool for converting BIP39 mnemonic codes
https://iancoleman.io/bip39/
MIT License
3.41k stars 1.42k forks source link

Split mnemonic issue #593

Closed cesarmassri closed 2 years ago

cesarmassri commented 2 years ago

Split mnemonic for a 12-word leaves 4 words hidden. It is possible to brute-force them.

The same problem occurs for a 15-word mnemonic. For 24-words is ok.

Source: https://medium.com/@johncantrell97/how-i-checked-over-1-trillion-mnemonics-in-30-hours-to-win-a-bitcoin-635fe051a752

wigy-opensource-developer commented 2 years ago

I have just checked the live application and it clearly says Time to hack with only one card: 109 seconds with a red font under the split cards. Is there something else the application could do?

cesarmassri commented 2 years ago

Ok.... That's acceptable.

We could think of another security scheme with 15 words (or 12)... Maybe more cards...

Thank you!!!

On Wed, May 18, 2022, 04:50 wigy @.***> wrote:

I have just checked the live application and it clearly says Time to hack with only one card: 109 seconds with a red font under the split cards. Is there something else the application could do?

— Reply to this email directly, view it on GitHub https://github.com/iancoleman/bip39/issues/593#issuecomment-1129686588, or unsubscribe https://github.com/notifications/unsubscribe-auth/ALG5H2JXDNLQMCN67LSGOO3VKSOOBANCNFSM5WFTEMKA . You are receiving this because you authored the thread.Message ID: @.***>