Closed mflaxman closed 3 years ago
Thanks for the report! I want to make sure I understand fully, can you please elaborate on verification step 4?
Why should m/48'/0'/0'/2'
be used instead of m/48'/1'/0'/2'
?
Oof, my mistake. Sorry!
I forgot that in Electrum testnet and mainnet use different paths. That's why your tool is so much more useful for this vs https://iancoleman.io/bip39/, it's hard to mess up.
Steps to reproduce:
abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon
art
to the mnemonic (correct) and produces this result:Extended Public Key in Vpub format (Testnet P2WSH) Vpub5ncJ4gVToMcTWjG4shBZHeeCUXhX5r86W9cwggqw1m6aojbrHxr9yJFsoXaiXrBfAzV3TaVyxCB6EYUW21SVayfcAhiVc9XRJS1WL4Gh9td
This is incorrect, the Vpub should be
Vpub5mLhmUp7c2mbtewB1ABALt1JhoCTuZU1aAhEBNUkAA1QzbzX4rg7PzupkWvuBs6yeM46z8QV2GfraXoHKw8dzVtnNW4zkHZBiqtBUKyCMeF
How to verify this
Vpub
:abandon
23x withart
on the end:abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon art
BTC - Bitcoin Testnet
, then click on theBIP141
tab towards the bottom.m/48'/0'/0'/2'
underBIP32 Derivation Path
and selectP2WSH (1-of-1 multisig)
underScript Semantics
- hackey, but that's what corresponds to what we're calculating. See here for more.BIP32 Extended Public Key
isVpub5mLhmUp7c2mbtewB1ABALt1JhoCTuZU1aAhEBNUkAA1QzbzX4rg7PzupkWvuBs6yeM46z8QV2GfraXoHKw8dzVtnNW4zkHZBiqtBUKyCMeF
.