Replying to Avatar Bert

What is your passphrase best practice?

Was asked about the following setup:

nostr:npub1s0vtkgej33n7ec4d7ycxmwt78up8hpfa30d0yfksrshq7t82mchqynpq6j Passport, uses encrypted backup with SDcard. Access code to unencrypt is in physical distributed location that would take significant time to travel. SDCard only is a risk as it can burn/break etc.

So the client uses a physical steel backup with 24 words, again a different location. On a different location holds the passphrase on steel.

How do you rate this setup? There’s redundancy in both the SD Card, Steel seed phrase and steel passphrase. Do you think a double backup for the passphrase is required?

Would love more input on best practices around this. nostr:npub15c88nc8d44gsp4658dnfu5fahswzzu8gaxm5lkuwjud068swdqfspxssvx nostr:npub17h7h2jzhq3hn06h93jvz67sfjxaq3jvk7kenjrazht28aun33hks42sd76

I'm not a fan of passphrase. I would always prefer a classic 2v2 multisig to a passphrase.

Reply to this note

Please Login to reply.

Discussion

Please explain why.

In my opinion, it is more convenient to use with signing devices such as SeedSigner or Passport. With seedQR it is almost fool proof.

But the question that then comes up for me is, doesn't it make sense to use an m of n setup directly?