python-slip39
shamir
python-slip39 | shamir | |
---|---|---|
5 | 2 | |
41 | 20 | |
- | - | |
7.3 | 0.0 | |
2 months ago | 10 months ago | |
Python | Go | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
python-slip39
-
Ask HN: Can 2 ledgers generate the same seed phrase out of millions out there?
Sure — with about the same likelihood as selecting the same atom out of all the atoms in the universe, twice in a row.
Besides; don’t. Generate your own entropy, save it as sets of SLIP-39 Mnemonic cards, and use the https://slip39.com App or https://iancoleman.io/slip39/ to recover your entropy (and your BIP-39 Phrase.
-
Binance has no proof of reserves for ETH/XRP, inadequate reserves for rest
Use https://slip39.com
Create a new seed (using your own dice tools to create good entropy).
Practice recovering your BIP-39 Mnemonic from your SLIP-39 Mnemonit cards.
Print out the cards, and decide who you’ll share them with. Send them.
Then, transfer your Bitcoin, etc. into the address printed / QR-coded on the card.
No hardware wallet required; later, use a hardware wallet to recover the account private keys, and use your coins.
-
Ssss: Shamir's Secret Sharing Scheme
Backup your BIP-39 Mnemonic phrase using SLIP-39 [0]
This saves the original entropy from which your BIP-39 phrase was generated, over several groups of multiple SLIP-39 mnemonics cards.
Later, recover enough cards from a few groups, recover your BIP-39, and recover your hardware wallet.
Much more reliable, and safer because an attacker must collect many independent mnemonics from groups they probably don’t know the members of.
[0] https://slip39.com
- Which (on- or offline) wallet supports SLIP39?
-
Did I just lose half a million dollars
Use SLIP-39, and a hardware wallet that allows recovery from SLIP-39 shards (eg. a Trezor).
With BIP-39, you are simply going to lose your wallet, eventually. It's almost inevitable. Either because you lose the 12- or 24-word passphrase, OR because someone else finds one of your backups.
I've written a decent Python implementation, here, which is simple enough to review:
https://github.com/pjkundert/python-slip39/
shamir
-
Ssss: Shamir's Secret Sharing Scheme
A few months ago I built a CLI frontend for Hashicorps shamir secret sharing implementation in Go. You can find it here: https://github.com/dennis-tra/shamir
It combines the two separate commands in the article into one.
- Show HN: A CLI Frontend for HashiCorp Vault's Shamir's Secret Sharing
What are some alternatives?
multi-party-ecdsa - Rust implementation of {t,n}-threshold ECDSA (elliptic curve digital signature algorithm).
keyxn - Pure Nim implementation of Shamir's Secret Sharing (SSS) algorithm
sss - Library for the Shamir secret sharing scheme
keyx - Elixir implementation of Shamir's Secret Sharing
blockchain-crypto-mpc - Protecting cryptographic signing keys and seed secrets with Multi-Party Computation.
kyber - Advanced crypto library for the Go language
vault-plugin-secrets-github - Create ephemeral, finely-scoped @github access tokens using @hashicorp Vault.
go-shamir - A small CLI tool for Shamir's Secret Sharing written in Go, using Vault's Shamir implementation
slip39 - A web tool for SLIP39 mnemonic shares