@@ -10,45 +10,37 @@ your insecure/unreliable BIP-39 Mnemonic using SLIP-39.
1010 Pro Fixed Hex data may be supplied for the Seed
1111
1212
13- 1 Random
13+ 1 BIP-39
1414========
1515
16- A high-quality 128-bit random seed value is probably adequate, and the
17- 20-word SLIP-39 (and 12-word BIP-39) Mnemonics are much more practical
18- than those produced for 256-bit seeds .
16+ Backup an existing 12- or 24-word BIP-39 Seed Phrase Mnemonic. Or,
17+ select Create to produce a new BIP-39 Mnemonic. Save your BIP-39 Seed
18+ Phrase as a set of SLIP-39 Mnemonic Card Groups .
1919
20- 2^128 is aproximately 10^38. There are about 10^57 atoms in our solar
21- system, and about 10^19 atoms in a particle of dust .
20+ Later, select Recover to input your SLIP-39 Mnemonics, and recover
21+ your BIP-39 Seed Phrase .
2222
23- Therefore, the odds of 2 people picking the *same* high-quality random
24- 128-bit Seed (1 in 10^38), is about the same as 2 people randomly
25- selecting the same particle of *dust* out of the mass of our entire
26- solar system!
23+ You can then securely destroy your BIP-39 Mnemonic card(s) (or, keep a
24+ copy in some *extremely* secure location), and use the SLIP-39
25+ Mnemonic cards as your distributed backup in case of its loss.
2726
28- So, 128-bit seeds are probably fine for most practical levels of
29- account security...
3027
28+ 1.1 SLIP-39 vs. BIP-39 Seed
29+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
3130
32- 1.1 The Birthday Paradox
33- ~~~~~~~~~~~~~~~~~~~~~~~~
34-
35- However, due to the [Birthday Attack], the probability of two parties
36- out of /a large number creating Seeds/ having a Seed *collision*
37- (accidentally selecting the same Seed value) is somewhat greater.
38-
39- If every human and all their devices created a few billion Seeds
40- (about 10^13), the probability of an /accidental/ collision falls to
41- about 1 in 10^12 -- about 1 in a billion. Unlikely, but something
42- like this has happened for IPv4 addresses, so who knows.
43-
44- So, if a 1 in a billion chance of someone eventually stumbling upon
45- your wallet is too great a risk, choose a 256-bit random Seed where
46- this Birthday Paradox probability falls to 1 in 10^32 -- approximately
47- the chance of 2 people on earth picking the same virus-sized particle
48- in our solar system.
31+ The Seed is computed *differently* on the hardware wallet (eg. a
32+ Ledger or Trezor), when importing using BIP-39 vs. SLIP-39!
4933
34+ So, in order for us to compute and show you the correct Cryptocurrency
35+ wallet(s), you must indicate whether you're importing using the
36+ SLIP-39 Mnemonics directly (ie. on a Trezor "Model T"), *or* if you're
37+ recovering the BIP-39 Mnemonic, and using that on the hardware wallet
38+ (ie. on a Ledger, or some other non-SLIP-39 hardware wallet).
5039
51- [Birthday Attack] <https://en.wikipedia.org/wiki/Birthday_attack>
40+ If you recover your Seed Entropy from a BIP-39 Mnemonic, we'll
41+ /assume/ you intend to *use* the BIP-39 Mnemonic on your hardware
42+ wallet, and we'll check "Recovering from BIP-39 on my Hardware
43+ Wallet".
5244
5345
54462 SLIP-39
@@ -77,32 +69,42 @@ your insecure/unreliable BIP-39 Mnemonic using SLIP-39.
7769 Mnemonics can't be "mixed" together to recover the Seed.
7870
7971
80- 3 BIP-39
72+ 3 Random
8173========
8274
83- Create a new BIP-39 Mnemonic, or convert an existing 12- or 24-word
84- BIP-39 Mnemonic into a 128- or 256-bit Seed.
75+ A high-quality 128-bit random seed value is probably adequate, and the
76+ 20-word SLIP-39 (and 12-word BIP-39) Mnemonics are much more practical
77+ than those produced for 256-bit seeds.
8578
86- This allows you to "back up" your BIP-39 Seed Entropy to a set of
87- SLIP-39 Mnemonic Card Groups. You can then securely destroy your
88- BIP-39 Mnemonic card(s) (or, keep a copy in some *extremely* secure
89- location), and use the SLIP-39 Mnemonic cards as your distributed
90- backup in case of its loss.
79+ 2^128 is aproximately 10^38. There are about 10^57 atoms in our solar
80+ system, and about 10^19 atoms in a particle of dust.
9181
82+ Therefore, the odds of 2 people picking the *same* high-quality random
83+ 128-bit Seed (1 in 10^38), is about the same as 2 people randomly
84+ selecting the same particle of *dust* out of the mass of our entire
85+ solar system!
9286
93- 3.1 SLIP-39 vs. BIP-39 Seed
94- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
87+ So, 128-bit seeds are probably fine for most practical levels of
88+ account security...
9589
96- The Seed is computed *differently* on the hardware wallet (eg. a
97- Ledger or Trezor), when importing using BIP-39 vs. SLIP-39!
9890
99- So, in order for us to compute and show you the correct Cryptocurrency
100- wallet(s), you must indicate whether you're importing using the
101- SLIP-39 Mnemonics directly (ie. on a Trezor "Model T"), *or* if you're
102- recovering the BIP-39 Mnemonic, and using that on the hardware wallet
103- (ie. on a Ledger, or some other non-SLIP-39 hardware wallet).
91+ 3.1 The Birthday Paradox
92+ ~~~~~~~~~~~~~~~~~~~~~~~~
10493
105- If you recover your Seed Entropy from a BIP-39 Mnemonic, we'll
106- /assume/ you intend to *use* the BIP-39 Mnemonic on your hardware
107- wallet, and we'll check "Recovering from BIP-39 on my Hardware
108- Wallet".
94+ However, due to the [Birthday Attack], the probability of two parties
95+ out of /a large number creating Seeds/ having a Seed *collision*
96+ (accidentally selecting the same Seed value) is somewhat greater.
97+
98+ If every human and all their devices created a few billion Seeds
99+ (about 10^13), the probability of an /accidental/ collision falls to
100+ about 1 in 10^12 -- about 1 in a billion. Unlikely, but something
101+ like this has happened for IPv4 addresses, so who knows.
102+
103+ So, if a 1 in a billion chance of someone eventually stumbling upon
104+ your wallet is too great a risk, choose a 256-bit random Seed where
105+ this Birthday Paradox probability falls to 1 in 10^32 -- approximately
106+ the chance of 2 people on earth picking the same virus-sized particle
107+ in our solar system.
108+
109+
110+ [Birthday Attack] <https://en.wikipedia.org/wiki/Birthday_attack>
0 commit comments