slips
Our great sponsors
slips | ||
---|---|---|
90 | 28 | |
1,448 | 11 | |
2.1% | - | |
9.0 | 5.5 | |
8 days ago | 7 months ago | |
Markdown | Python | |
Creative Commons Attribution Share Alike 4.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
slips
-
As XRP Toolkit doesn't support Trezor, is there an alternative way to use SetRegularKey on my Trezor to be able to register for the Evernode Airdrop via Xumm?
The official SLIP-0039 standard itself confirms it is not possible to convert this mnemonic type to BIP-0039. Down in Section 9 "Compatibility with BIP-039":
-
Shamir Secret Sharing
For anybody new or returning to SSS, check out SLIP-0039: https://github.com/satoshilabs/slips/blob/master/slip-0039.m...
One of the big downsides of SSS is that it’s very raw and you have to do a lot of legwork to make it actually useable. It’s rightfully criticized for this and the argument follows the don’t roll your own crypto vein.
SLIP39 solves this by formalizing a protocol for handling SSS splits built atop standards for crypto key serialization (BIP-39). SlIP shards are unique on each generation so parties with the same underlying SSS shard can’t compare mnemonics, they’re mnemonically serialized, and have a checksum and group index metadata which makes a more sane UX possible when combining.
-
Trezor-T XMR Account Recovery (do not use, sample only)
Well every wallet chose to solve this problem independently. Trezor proposed a new standard called SLIP10 to do BIP44 type operations coins that did not use secp256k1. Problem is, there are very few utilities I've found that will do SLIP10 derivations.
-
Seed Conversion Woes
Checkout the SLIPs repo (https://github.com/satoshilabs/slips.git) and modify testvectors.py. We are going to replace the curvenames and last four show_testvectors lines with the following:
-
Reminder: Trezor Shamir Backup is fundamentally secure
They use an open source algorithm which is documented here. Anyone can verify it and the recovery outside of a Trezor hw-wallet is possible if required.
-
Article explaining how Ledger Recover works
It will be using SLIP-39, like Trezor and Electrum, or a Ledger rewrite of it. All the language about shards is straight from the SLIP39 spec.
- Is it possible to have both BTC and XMR keys stored on the same Trezor at the same time?
-
Simple sample script to dump Trezor Coinjoin taproot addresses
This was all done with the SLIP-14 seed using the passphrase coinjoin if you want to follow along.
-
Simple sample script to dump coinjoin taproot addresses
With the introduction of the new Coinjoin feature in the latest release of firmware and software, I had the need to dump some of my taproot derivations. Although blockbook can do this fine using descriptors in place of xpubs for taproot accounts, it fails on Coinjoin accounts. This is likely because SLIP-25 as 6 deep derivations while BIP-86 uses a standard derivation depth of 5.
-
coinjoin funds accessible to other wallets?
The recovery of Coinjoin accounts is described here. Accessing them outside of Trezor Suite will 100% destroy all privacy obtained since Suite is the only keeper of the anonymity set for each UTXO. Using your CJ coins outside of Suite may also erode the privacy of previous transactions using your Suite Private coins as well.
-
Found the ARM timer to get nanosecond (4ns) ticks off of BCM2835
BCM2835 ARM Timer Tick Counter Example (in C)
-
Try Trezor-T Firmware on your laptop via the Trezor Emulator
If you do have questions or run into problems post on this thread, or, if you find reddit too adversarial, you can post on the GitHub discussion board tied to my posts. Please don't DM me.
-
Trezor-T XMR Account Recovery (do not use, sample only)
SLIP10 XMR Recovery Script
-
Possible Replacements to Trezor Password Manager
So no, I can set my reddit password to 79fb...a183 and I no longer need to remember it. Whenever I feed my Trezor the same arguments to encrypt-keyvalue I will always get the same ciphertext back. This method is actually what the original Trezor Password Manager uses, as well as the Keepass2Trezor plugin. After toying with this a while I wanted a bit more flexability so I made a mk_secret.py script to do most of the work for me. Now my command is simplified to:
- Would you use (or toy with) a Trezor KeePass launcher to replace Trezor Password Manager
-
Risk of computing seed phrases
BTW. Here is my bip39-diceware list. There are many like it, but this one is mine.
-
Simple sample script to dump Trezor Coinjoin taproot addresses
dump_cj_keypool.py, typical use as python dump_cj_keypool.py > keypool.txt
-
Simple sample script to dump coinjoin taproot addresses
dump_cj_keypool.py
-
How do I start bitcoin when I’m under the age of 18 and I’m on a phone if that’s even possible
An old post I made about it. Usually involves getting to the US and getting an adult to help. It's much easier if you take a summer job and have money that you can claim you earned instead of begging parents both for the money and the sign-off.
-
How to configure Ubuntu automatic updates to house kernel and initrd on EFI ESP?
Here's the completed bash script for this, in case anyone is interested:
What are some alternatives?
bip39 - A web tool for converting BIP39 mnemonic codes
blockbook - :blue_book: Trezor address/account balance backend
shamir39 - Split BIP39 mnemonics using Shamir's Secret Sharing Scheme
Bitcoin - Bitcoin Core integration/staging tree
python-shamir-mnemonic
electrum - Electrum Bitcoin Wallet
bips - Bitcoin Improvement Proposals
slip39 - A web tool for SLIP39 mnemonic shares
trezor-user-env - Development tool for Trezor developers
python-mnemonic - :snake: Mnemonic code for generating deterministic keys, BIP39
pass-import - A pass extension for importing data from most existing password managers