Seedshift
Plausibly deniable steganographic encryption of BIP-39 mnemonic seed words with a date shift cipher (by mifunetoshiro)
FinderOuter
Easy to use bitcoin recovery tool to fix damaged private key, mini-private key, address, BIP38 encrypted key, mnemonic (seed phrase), BIP-32 derivation path, Armory backups, recover passwords and more (by Coding-Enthusiast)
Seedshift | FinderOuter | |
---|---|---|
7 | 5 | |
23 | 266 | |
- | - | |
1.8 | 8.5 | |
10 months ago | 3 months ago | |
Python | C# | |
MIT License | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Seedshift
Posts with mentions or reviews of Seedshift.
We have used some of these posts to build our list of alternatives
and similar projects.
-
I’m currently in the process of building a Safu Ninja metal seed storage and have a question about BIP 39.
try this tool for plausibly deniable steganographic encryption of BIP-39 mnemonic seed words. It is very cool but keep in mind you need to be careful each time you add complexity to the whole process https://github.com/mifunetoshiro/Seedshift/
-
Seedshift - steganographically encrypt your seed words
Pertaining to recent events (both the FTX collapse and LastPass hack), self-custody of your crypto and with it safe backup of your mnemonic seed words has never been more warranted I think. I keep my seed words secured in a local KeePass database in a few different places, but this guy kept them on LastPass. I wrote this script a few years ago to be able to securely write them down in an easy human-readable format and not have to worry about it even if a thief/hacker came across them: https://github.com/mifunetoshiro/Seedshift
-
where do you keep your seed phrase?
Piece of paper, steganographically encrypted with https://github.com/mifunetoshiro/Seedshift
-
Your seed phrase: Some of the worst mistakes you can make when storing your seed. And some tricks to help you store it better.
I developed a method that steganographically encrypts your seed words in a plausibly deniable way using a date-shift cipher: https://github.com/mifunetoshiro/Seedshift
-
Brute-forceable puzzle - free crypto for whoever manages to crack it
There is an x amount of crypto I put there as an award for whomever manages to get ahold of it. It is encrypted with a date shift cipher using this script I wrote: Seedshift. I basically used 1-4 dates in YYYY-MM-DD format to shift the mnemonic words (modulo 2048 to wrap around the wordlist, you can do it manually without the script).
-
PSA: If you use a cloud service (e.g. LastPass) to store e.g. 2FA recovery seeds, backup it on another cloud service or locally with KeePass
Also, it's not recommended nor safe to store seed words directly in plain-text in either cloud or local backups. If you do, at least obfuscate them somehow. I personally use a date shift cipher when writing down/saving my seed words (https://github.com/mifunetoshiro/Seedshift) which you can also do by hand.
-
Memorizing your seed
I use a date shift cipher on my seed words, so even if someone comes across it, it would be useless for them. I wrote a script for it: https://github.com/mifunetoshiro/Seedshift
FinderOuter
Posts with mentions or reviews of FinderOuter.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-06-17.
-
12 Words and 1extra word.
There are bruteforcing tools (example) out there, so to answer your question: not difficult at all.
-
//////. How can you use the finder outer to recover lost crypto? ///
and AvaloniaUI FinderOuter can run on all operating systems. This project is written fully in C# and is 100% open source and will always remain free to use. You can make a donation if you found this tool useful. FinderOuter is still in beta and under development. New features are slowly added and everything is optimized. Contribution is always welcome. Please report any bugs you find or any improvement suggestions you have by creating a new issue.
-
Comparing btc recover & finder outer
Finder outer: https://github.com/Coding-Enthusiast/FinderOuter
-
FinderOuter v0.12.1 has come a long way ever since last time I posted about it on Reddit.
The FinderOuter is a bitcoin recovery tool I've been working on for a long time now to help bitcoiners recover their lost coins using a simple GUI to make the recovery process as simple as possible no matter the user's technical background. It is 100% open source and free to use. It can be found on GitHub: https://github.com/Coding-Enthusiast/FinderOuter
-
Just found wallet private keys from 2013. Might have anywhere between 0 and 50 BTC. Can't remember password.
Second, there are tons of programs out there that can help you with this. one I saw recently (no idea how good it is) is this one -- https://github.com/Coding-Enthusiast/FinderOuter
What are some alternatives?
When comparing Seedshift and FinderOuter you can also consider the following projects:
python-mnemonic - :snake: Mnemonic code for generating deterministic keys, BIP39
btcrecover - An open source Bitcoin wallet password and seed recovery tool designed for the case where you already know most of your password/seed, but need assistance in trying different possible combinations.