Does it use the same algorithm as ColdCard? IIRC, the CC algo was to concatenate the rolls as a string and run it through SHA256.
Discussion
not sure ...
```
def generate_mnemonic_from_dice(roll_data: str, wordlist_language_code: str = SettingsConstants.WORDLIST_LANGUAGE__ENGLISH) -> list[str]:
"""
Takes a string of 50 or 99 dice rolls and returns a 12- or 24-word mnemonic.
Uses the iancoleman.io/bip39 and bitcoiner.guide/seed "Base 10" or "Hex" mode approach:
* dice rolls are treated as string data.
* hashed via SHA256.
Important note: This method is NOT compatible with iancoleman's "Dice" mode.
"""
entropy_bytes = hashlib.sha256(roll_data.encode()).digest()
if len(roll_data) == DICE__NUM_ROLLS__12WORD:
# 12-word mnemonic; only use 128bits / 16 bytes
entropy_bytes = entropy_bytes[:16]
# Return as a list
return bip39.mnemonic_from_bytes(entropy_bytes, wordlist=Seed.get_wordlist(wordlist_language_code)).split()
```
Looks like it, yeah. Same in spirit anyway, taking the hash of a string.
Would be worthwhile feeding a ColdCard and a SeedSigner the same stream of rolls and see what seed phrases they produce.
nostr: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 nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqyxhwumn8ghj7mn0wvhxcmmvqyg8wumn8ghj7mn0wd68ytnvv9hxgqgswaehxw309ahx7um5wghxcctwvsq3qamnwvaz7tmwdaehgu3wwa5kuegpzpmhxue69uhkummnw3ezuamfdejsz9rhwden5te0wfjkccte9ejxzmt4wvhxjmcpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqzqjjktunxr9j2auxra6rmn8y62uc64rwc4qpjd7t2gm7h7gr7scf6g3y4wt have tests like these been done before, please?