zlacker

[parent] [thread] 10 comments
1. BobbyJ+(OP)[view] [source] 2022-02-08 17:53:43
When a few billion is at stake, you think they'd make the effort to memorize the keys. Or at least encrypt them.
replies(3): >>nerdwa+g2 >>tsimio+ca >>EVa5I7+0W2
2. nerdwa+g2[view] [source] 2022-02-08 18:01:16
>>BobbyJ+(OP)
The file the feds found had 2,000 addresses - so there's a non-trivial amount of 12 word phrases to remember.
replies(2): >>paulpa+d3 >>akomtu+8c
◧◩
3. paulpa+d3[view] [source] [discussion] 2022-02-08 18:05:35
>>nerdwa+g2
you would only need to memorize one seed to spawn infinite key pairs
replies(1): >>Alexan+v7
◧◩◪
4. Alexan+v7[view] [source] [discussion] 2022-02-08 18:23:17
>>paulpa+d3
can you elaborate? I find this very interesting. We can't choose which private key we get.

So is it possible for 1 seed to generate all of them? Doesn't that break information theory (Shannon's compression limit)?

replies(4): >>Bootvi+ha >>lordna+Na >>rogers+Ai >>FabHK+ZV2
5. tsimio+ca[view] [source] 2022-02-08 18:33:42
>>BobbyJ+(OP)
When a few billion is at stake, I would definitely not trust my memory for a chance to lose access.
◧◩◪◨
6. Bootvi+ha[view] [source] [discussion] 2022-02-08 18:34:14
>>Alexan+v7
First you create the seed, then you create the keys. Not the other way around.
◧◩◪◨
7. lordna+Na[view] [source] [discussion] 2022-02-08 18:36:29
>>Alexan+v7
Have a google for BIP-32, about Hierchical Deterministic Wallets. A secret key is nothing but a number, so it's not too hard to generate more numbers from that seed. If you have the seed and the parameters for the child numbers, you have all the private keys you want.
◧◩
8. akomtu+8c[view] [source] [discussion] 2022-02-08 18:42:32
>>nerdwa+g2
You only need to remember a big random number (can be a long phrase from a book you like), and a rule that generates keys, e.g. (keyid, seed) -> hash(keyid + seed). Needless to say, you never write the seed phrase down. At most you keep a vague pointer to the author of that book.
◧◩◪◨
9. rogers+Ai[view] [source] [discussion] 2022-02-08 19:08:53
>>Alexan+v7
You use a 2048 word dictionary (a random choice in that wordlist represents [log 2048 =] 11 bits of entropy) then you generate a random string of 132 bits to be your cryptographic seed which is a sequence of 12 words from the wordlist which you memorize.

From that seed you can generate for all practical purposes an infinite number of private keys for any and all purposes in existence. Using cryptographic one way functions such as a hash or PRNG.

Example: truncate_as_needed ( sha512 (seed | 2022 | wallet_title | priv #123) ) = private key #123

◧◩◪◨
10. FabHK+ZV2[view] [source] [discussion] 2022-02-09 14:39:27
>>Alexan+v7
Just to clarify: the statement is not that you could encode those existing 2000 private keys with one short seed (you cannot, indeed), but rather that you could easily and safely generate 2000 distinct private keys from one relatively short seed.
11. EVa5I7+0W2[view] [source] 2022-02-09 14:39:33
>>BobbyJ+(OP)
What makes you think it was not encrypted? Of course it was.
[go to top]