Passphrase wallets are still a single point of failure, and if you have a badly generated wallet, the security is reduced to the passphrase itself.
The solution is to use open source software, so you know exactly how seed phrases are being generated, and to use multisig.
reply
bx exploited above is open source software.
reply
good god, how the hell wasn't this found sooner, then. Geez, it's still in their source code. 🤦🏻‍♂️
reply
deleted by author
reply
Ha, yeah I fully agree. Guess that’s why I thought an exploit would have happened back in 2017
reply
deleted by author
reply
One small point of correction: a paraphrase takes a seed and generates a new paraphrase. Someone can always generate a random seed and have it be equal to your seed + paraphrase (however small that chance is). Having a paraphrase doesn’t protect you from that.
reply
EDIT: a passphrase takes a seed a generates a new SEED.
One handed typo with cigar 🚬 sorry
reply
If you're doing single sig, yeah definitely use a passphrase. The passphrase is essentially an additional seed word... You just have to make sure you don't lose it, because if you do, you've lost your funds. It's not a great solution for long term storage IMO.
Multisig eliminates the need for a passphrase for a couple of reasons: 1 - you need to know which wallets are connected to withdraw from, so even if you were able to predict seed phrases, you'd still have your work cut out for you trying to find multisig wallets 2 - you wouldn't know if you found a multisig wallet or not, and can't withdraw without the xpubs anyway
That's way more complicated for the attacker, and it's way more difficult for the user to lose their funds.
reply
12 or 24 seed + phrase + multisig? oh yes do we have adequate security?
reply
Nah, I wouldn't do multisig + passphrase. You don't really need passphrase for multisig. See my response above.
reply
perfect, thanks
reply
reply