pull down to refresh

Esto me recuerda a un viejo amigo tenía una contraseña repetida y fácil en su móvil para todo,le dije que no pusiera 1111... en todo y mucho menos que lo hiciera delante de otros, cometió el error de hacerlo delante de mi, no me costó su amistad pero aprendió la lección, poner la misma frase me parece absurdo y solo la última palabra diferente, no se mucho de contraseñas ni soy un hacker de la tecnología pero por nada del mundo se me ocurre hacer esto. Éxitos para los atrevidos.
The whole point is that the seed phrase provides ZERO entropy. Those phrases (all the no entropy ones, like "action" repeated 12 times) are constantly scanned, and if anyone were to put bitcoin onto one of the addresses linked to the private key associated with that seed phrase, it would immediately be swept away.
You can actually restore that seed phrase into Sparrow, just for fun, and see all the transaction on it. I guess people accidentally (?) send sats to an address associated with that key. And...immediately it's swept away.
However, with the seed phrase AND the passphrase, you have a different private key. And that private key will have much better entropy. Not as good as 12 words, but good enough for a lot of purposes.
reply
0 sats \ 0 replies \ @anon 6h
Be careful with your calculations. Each bip 39 word adds 11 bits of entropy so 7 words would add 77 bits.
If you were using the EFF long diceware wordlist... 7 words is ~90bits. And 8 words is over 100 iirc. Even a small increase in entropy is an exponential increase in security so more is better.
reply
0 sats \ 1 reply \ @Angie 11h
Bien gracias
reply
0 sats \ 0 replies \ @Angie 2h
La idea se ve maravillosa, solo habría que ver si funciona para todo el planeta y si se pueden usar palabras comunes es decir la que uno desee y que lleve la letra Ñ garantiza mejor seguridad.
reply