DONβ€˜T DO THIS! 🚨🚨🚨

This significantly compromises the security of your seed. Firstly, it's not Shamir Secret Sharing; it's a subpar version. While 24 words offer 256-bit entropy, making them nearly impossible to guess, the proposed method weakens this exponentially. If an attacker accesses one seed part, they only need to guess 8 words with 80-bit entropy. Though currently challenging, a sophisticated attacker with good equipment and time could achieve this. Moreover, Moore's law implies that guessing these 8 words becomes easier every year, making brute force a plausible threat within the next decade.

Even worse if you use this method for a 12 word seed. Brute forcing 4 words is very easy.

Either use SeedXOR or a Passphrase:

1. Stamp or engrave your seed onto stainless steel or titanium at least twice, creating a backup.

2. Verify that your passphrase has an entropy of at least 128 bits (refer to the image).

3. Stamp or engrave your passphrase onto stainless steel or titanium at least twice, creating a backup.

4. You will require both parts of the 2-of-2 setup to access your funds, making it crucial to have one backup for each part.

5. Store each part in separate secure locations. With only one part, an attacker cannot access your funds and brute forcing becomes impractical.

This enhances security against theft but adds complexity. Consider carefully whether you truly need this advanced setup or if securely storing your seed phrase with one backup is sufficient for your needs. nostr:note1ua696hcaae4w2wpufwu9rhd9mtt4sre420ddgrzv2lu09374wglqxx0yjl

Reply to this note

Please Login to reply.

Discussion

I agree, before seeing this, I've just quote posted you. It's good to use best security practices, but in reality most people will compromise and settle for *some* security in return for minimal complexity. This is somewhere in the middle. I've got a system in place to pass my sats on to my daughter which I feel provides adequate security and minimal chance of something going wrong, with near zero chance of theft through collusion.

Thanks for looking out guys πŸ™

Hey, nostr:npub1hycynfhz23ardfmf9kgwfw4gpyqj2fsh24r2zuehg4x7lx4kn5cqsqv4y3, Fren,

Thank you very much for taking the time and trouble to inform us of the underlying issues here.

Truly appreciated.πŸ™πŸ»πŸ˜ƒπŸ’œπŸ«‚πŸ’–πŸ˜†πŸ‘πŸ’―πŸ”₯

Happy to help πŸ€œπŸ€›