|
189 | 189 | these, and they can only be created "manually". Writing down 5 or more |
190 | 190 | sets of 20 words is difficult, error-prone and time consuming. |
191 | 191 |
|
192 | | -The [python-slip39][1] project (and the SLIP-39-app macOS/win32 App) exists to |
193 | | -assist in the safe creation and documentation of Hierarchical Deterministic (HD) |
194 | | -Wallet seeds and derived accounts, with various SLIP-39 sharing parameters. It |
195 | | -generates the new random wallet seed, and generates the expected standard |
196 | | -Ethereum account(s) (at derivation path `m/44'/60'/0'/0/0'` by default) and |
197 | | -Bitcoin accounts (at Bech32 derivation path `m/84'/0'/0'/0/0'` by default), with |
198 | | -wallet address and QR code (compatible with Trezor derivations). It produces |
199 | | -the required SLIP-39 phrases, and outputs a single PDF containing all the |
200 | | -required printable cards to document the seed (and the specified derived |
201 | | -accounts). |
202 | | -
|
203 | | -On an secure (ideally air-gapped) computer, new seeds can safely be |
204 | | -generated and the PDF saved to a USB drive for printing (or directly |
205 | | -printed without the file being saved to disk.). Presently, `slip39' can |
206 | | -output example ETH, BTC, LTC, DOGE, BNB, CRO and XRP addresses derived |
207 | | -from the seed, to /illustrate/ what accounts are associated with the |
208 | | -backed-up seed. Recovery of the seed to a [trezor-model-t][2] is simple, |
209 | | -by entering the mnemonics right on the device. |
210 | | -
|
211 | | -We also support backup of existing insecure and unreliable BIP-39 |
212 | | -recover phrases as SLIP-39 Mnemonic cards, for existing BIP-39 hardware |
213 | | -wallets like the [ledger-nano][3]! Recover from your existing BIP-39 |
214 | | -Mnemonic, select "Using BIP-39", and generate a set of SLIP-39 Mnemonic |
215 | | -cards. Later, use the SLIP-39 App to recover from your SLIP-39 Mnemonic |
216 | | -cards, click "Using BIP-39" to get your BIP-39 Mnemonic back, and use it |
217 | | -to recover your accounts to your Ledger (or other) hardware wallet. |
218 | | -
|
219 | | -Output of BIP-38 or JSON encrypted Paper Wallets is supported, for |
220 | | -import into standard software cryptocurrency wallets. |
221 | | -
|
222 | 192 | # Hardware Wallet "Seed" Configuration |
223 | 193 |
|
224 | 194 | > Your keys, your Bitcoin. Not your keys, not your Bitcoin. |
|
251 | 221 |
|
252 | 222 | Output of BIP-38 or JSON encrypted Paper Wallets is also supported, for import into standard |
253 | 223 | software cryptocurrency wallets. |
254 | | -## on the Command Line |
255 | 224 |
|
256 | 225 | [1]: <https://github.com/pjkundert/python-slip39.git> "python-slip39" |
257 | 226 |
|
|
349 | 318 | 2021-12-28 10:55:18 slip39.recovery Recovered SLIP-39 secret with 4 (1st, 2nd, 7th, 8th) of 8 supplied mnemonics |
350 | 319 | 2021-12-28 10:55:18 slip39 ETH m/44'/60'/0'/0/0 : 0x68dD9B59D5dF605f4e9612E8b427Ab31187E2C54 |
351 | 320 |
|
| 321 | +## SLIP-39 Mnemonic Cards PDF |
| 322 | +
|
352 | 323 | Here's an example of PDF containing the SLIP-39 recovery mnemonic cards produced: |
353 | 324 |
|
354 | 325 | ![SLIP-39 Mnemonic Cards PDF][slip39-cards] |
|
0 commit comments