Skip to content

Commit de67163

Browse files
committed
Initial integration of Entropy Analysis into PDF output warning
1 parent 922ce7a commit de67163

File tree

10 files changed

+262
-107
lines changed

10 files changed

+262
-107
lines changed

slip39/gui/SLIP-39-PASSPHRASE.org

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
#+title: SLIP-39/BIP-39 Phassphrase
1+
#+title: SLIP-39/BIP-39 Passphrase
22
#+OPTIONS: toc:nil title:nil author:nil
33

44
#+BEGIN_ABSTRACT
@@ -21,12 +21,32 @@ disclosure); a Passphrase is *not* recommended. Leave it empty!
2121
** Safely Using BIP-39 Passphrases
2222

2323
Once you Backup your BIP-39 Seed Phrase to a set of SLIP-39 Mnemonic Card Groups, you *must* also
24-
arrange to secure and recover any BIP-39 Passphrase(s). Remembre; you can have multiple
25-
Passphrases, to produce several sets of Cryptocurrency accounts from the same BIP-39 Seed Phrase.
24+
arrange to secure and recover any BIP-39 Passphrase(s). Remember; you can have multiple
25+
Passphrases, to produce several sets of Cryptocurrency HD wallet accounts from the same BIP-39
26+
Seed Phrase.
2627

2728
Make certain that each Passphrase is made available to each intended recipient, and also in at
2829
least one additional location (eg. with someone else who will be at your funeral).
2930

31+
*** Backup Full 512-bit BIP-39 Seed *including* Passphrase!
32+
33+
If you've *already* produced a BIP-39 Seed Phrase and a complex Passphrase, and have already
34+
funded or distributed the derived HD Wallet accounts, you can *still* back it up, securely and
35+
reliably with SLIP-39 -- without requiring the Passphrase to be remembered by the recipient!
36+
37+
Use the Pro controls and select "BIP-39 Seed" + "Passphrase" to fully decrypt your BIP-39 Seed
38+
Phrase. Then, produce 59-word SLIP-39 recovery cards encoding the full, decrypted 512-bit Seed.
39+
40+
These will *not* be compatible with standard BIP-39 nor SLIP-39 Hardware Wallets! (Don't blame
41+
me -- you elected to create an insecure and unreliable BIP-39 Seed Phrase + Passphrase, instead
42+
of SLIP-39 Mnemonic Cards! ;)
43+
44+
Your heirs or business partners will need to use a fully standards compliant SLIP-39 recovery
45+
program (like this SLIP-39 App, or [[https://github.com/trezor/python-shamir-mnemonic][python-shamir-mnemonic on Github]] ) to enter the large (but
46+
standards-compliant!) 59 word Mnemonics, and then generate Paper Wallets for each derived HD
47+
Wallet account they want to access. But, they *will* be able to recover your cryptocurrency
48+
accounts, *without* needing to recover the original BIP-39 Seed Phrase or Passphrase!
49+
3050
* SLIP-39 Passphrase
3151

3252
If you use SLIP-39 Mnemonic Card Groups, it is usually not necessary to use a Passphrase.

slip39/gui/SLIP-39-PASSPHRASE.txt

Lines changed: 34 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,15 +24,46 @@ recommended. Leave it empty!
2424

2525
Once you Backup your BIP-39 Seed Phrase to a set of SLIP-39 Mnemonic
2626
Card Groups, you *must* also arrange to secure and recover any BIP-39
27-
Passphrase(s). Remembre; you can have multiple Passphrases, to
28-
produce several sets of Cryptocurrency accounts from the same BIP-39
29-
Seed Phrase.
27+
Passphrase(s). Remember; you can have multiple Passphrases, to
28+
produce several sets of Cryptocurrency HD wallet accounts from the
29+
same BIP-39 Seed Phrase.
3030

3131
Make certain that each Passphrase is made available to each intended
3232
recipient, and also in at least one additional location (eg. with
3333
someone else who will be at your funeral).
3434

3535

36+
1.1.1 Backup Full 512-bit BIP-39 Seed *including* Passphrase!
37+
-------------------------------------------------------------
38+
39+
If you've *already* produced a BIP-39 Seed Phrase and a complex
40+
Passphrase, and have already funded or distributed the derived HD
41+
Wallet accounts, you can *still* back it up, securely and reliably
42+
with SLIP-39 -- without requiring the Passphrase to be remembered by
43+
the recipient!
44+
45+
Use the Pro controls and select "BIP-39 Seed" + "Passphrase" to fully
46+
decrypt your BIP-39 Seed Phrase. Then, produce 59-word SLIP-39
47+
recovery cards encoding the full, decrypted 512-bit Seed.
48+
49+
These will *not* be compatible with standard BIP-39 nor SLIP-39
50+
Hardware Wallets! (Don't blame me -- you elected to create an
51+
insecure and unreliable BIP-39 Seed Phrase + Passphrase, instead of
52+
SLIP-39 Mnemonic Cards! ;)
53+
54+
Your heirs or business partners will need to use a fully standards
55+
compliant SLIP-39 recovery program (like this SLIP-39 App, or
56+
[python-shamir-mnemonic on Github] ) to enter the large (but
57+
standards-compliant!) 59 word Mnemonics, and then generate Paper
58+
Wallets for each derived HD Wallet account they want to access. But,
59+
they *will* be able to recover your cryptocurrency accounts, *without*
60+
needing to recover the original BIP-39 Seed Phrase or Passphrase!
61+
62+
63+
[python-shamir-mnemonic on Github]
64+
<https://github.com/trezor/python-shamir-mnemonic>
65+
66+
3667
2 SLIP-39 Passphrase
3768
====================
3869

slip39/gui/SLIP-39-SD.org

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ BIP-39 Mnemonic using SLIP-39.
8181
There are a couple of drawbacks with this approach, though:
8282

8383
- Large 59-word SLIP-39 Mnemonics are produced, to store the 512-bit seed
84-
- Seed cannot be used with a BIP-39 Hardware Wallet
84+
- The Seed cannot be re-imported into a standard BIP-39 Hardware Wallet
8585
- Produce "Paper Wallets" for whichever derived HD wallets you need to access
8686

8787
** The Birthday Paradox
@@ -98,4 +98,3 @@ BIP-39 Mnemonic using SLIP-39.
9898
risk, choose a 256-bit random Seed where this Birthday Paradox probability falls to 1 in 10^32 --
9999
approximately the chance of 2 people on earth picking the same virus-sized particle in our solar
100100
system.
101-

slip39/gui/SLIP-39-SD.txt

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,8 @@ your insecure/unreliable BIP-39 Mnemonic using SLIP-39.
101101

102102
- Large 59-word SLIP-39 Mnemonics are produced, to store the 512-bit
103103
seed
104-
- Seed cannot be used with a BIP-39 Hardware Wallet
104+
- The Seed cannot be re-imported into a standard BIP-39 Hardware
105+
Wallet
105106
- Produce "Paper Wallets" for whichever derived HD wallets you need
106107
to access
107108

slip39/gui/SLIP-39-SE-SIGS.org

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ Avoid Harmonic and Shannon Entropy Deficiencies:
99
- Use Extra Randomness from good sources, eg. rolling 20 or so dice
1010
#+END_ABSTRACT
1111

12+
* Seed Entropy Deficit: {entropy_rating}
1213
#+BEGIN_EXAMPLE
1314
{update_seed_data.analysis}
1415
#+END_EXAMPLE

slip39/gui/SLIP-39-SE-SIGS.txt

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,14 @@ Avoid Harmonic and Shannon Entropy Deficiencies:
44
• Use strong cryptographically secure randomness for your Seed Data
55
• Use Extra Randomness from good sources, eg. rolling 20 or so dice
66

7-
┌────
8-
│ {update_seed_data.analysis}
9-
└────
107

11-
┌────
12-
│ {update_seed_entropy.analysis}
13-
└────
8+
1 Seed Entropy Deficit: {entropy_rating}
9+
════════════════════════════════════════
10+
11+
┌────
12+
│ {update_seed_data.analysis}
13+
└────
14+
15+
┌────
16+
│ {update_seed_entropy.analysis}
17+
└────

0 commit comments

Comments
 (0)