Avatar
StackSats ⚡️
b93049a6e2547a36a7692d90e4baa809012526175546a17337454def9ab69d30
#Bitcoin-only #Memes #AustrianEconomics #noderunner 🕳️🐇

Nothing, however, is as ill founded as the assertion of the alleged equality of all members of the human race.

Mises

Thanks Lopp, appreciate your feedback.

What do you precisely mean by "fooling themselves about the utility of a duress wallet"? Are you suggesting that a sophisticated attacker would be aware of this regardless?

#nostrversary nostr:note1nvkyrgqmex63sp8m7qt5x890mpglzrayyra7c7uf6rkppcdv0wqszlg6f7

Thanks for your reply. I am aware of Multisig with it’s advantages and flaws. However, that doesn’t answer my question.

Thanks for your reply, but that doesn’t answer my question.

Thank you for your response. Here my comments to that:

1) Passphrase and SeedXOR have similar complexity. I understand the point, that more complex solutions increase the risk of loss due complexity. Anyhow, that has nothing do to with my question.

2) Why is a SeedXOR easier to restore? Please explain.

In my opinion Passphrase is easier to restore and supported by most wallets.

Furthermore the seed phrase of a passphrase secured wallet has the same deceive feature as the seed of a SeedXOR. You can load both with „ready to lose funds“ to deceive an attacker. The attacker doesn’t know that a bigger wallets exists in both cases.

3) what is the difference in the attacker having the seed phrase of a 256 bit passphrase wallet or a seed phrase of a SeedXOR wallet. Please explain.

Who can explain me this? #asknostr

nostr:npub17u5dneh8qjp43ecfxr6u5e9sjamsmxyuekrg2nlxrrk6nj9rsyrqywt4tp evaluates passphrase backups as "mediocre" and considers SeedXOR the superior alternative. He argues that passphrases are flawed due to their 2-2 setup, posing a risk of losing funds if one part is lost. Nevertheless, the same vulnerability exists for SeedXOR (2-2, 3-3, …). I don’t see any downside as long as the passphrase has a 256 bit entropy. Multiple backups are essential for both solutions.

Lopp on Passphrase backup:

„This gives you a security model that's the same as a 2 of 2 multisig setup. Do you know why 2 of 2 multisig isn't popular? Because it has 2 single points of failure - if you lose either part, you're screwed. I've seen quite a few people over the years get locked out of their funds because they forgot or lost the passphrase that accompanied their seed phrase.“

Lopp on SeedXOR backup:

„Seed XOR is, in my opinion, a superior way to achieve the properties that folks try to get with a "25th word passphrase" or via naive seed splitting, while decreasing the complexity and improving plausible deniability. Note that this is essentially an N of N (2-of-2 / 3-of-3 / etc) split backup, so you're going to want multiple sets of XOR'd backups to ensure that losing a single plate doesn't cause catastrophic loss.“

Source: https://blog.lopp.net/how-to-back-up-a-seed-phrase/