Which part didn't you get?
Imagine you have a 24 word seed. You split it into 2 halves, 12 words each, and store each half separately, which makes it more secure, because if someone finds one, they won't be able to access your wallet. Both halves are needed to reconstruct the 24 word seed and access your wallet.
With seed XOR, however, instead of splitting it into halves, you split it into pieces that are still 24 words each (and not 12), but there is 50% redundancy in them.
The XOR table is: 0 xor 0 = 0 0 xor 1 = 1 1 xor 0 = 1 1 xor 1 = 0
So two bits get reduced to one.
You could as well pad 12 word halves with random seed words to get 24 words, but combining them wouldn't be commutative.
Yes good explainer Space. OP was right as well about the optionality, decoying, and plausible deniability. I think it allows for this better than any other solution. I don't know, I personally think it's very underrated, because of what you can start building beneath the original seed and it's 2+ XOR, which is perhaps unexplored. But sXOR it's also relatively new; 2021 or so, and the only hardware wallet that supports XOR computing of the original seed is Coldcard. We need more.
reply
I was thinking of doing it myself and wrote a Python script that XORs two seed phrases, but left it at that for the time being. It would have to be run on a machine that's not connected to the internet and an OS booted from a USB stick, like Tails, to avoid malware. Hardware solutions are surely preferable.
reply