Coder Social home page Coder Social logo

seedtool's People

Contributors

bitcoinqna avatar gregorytrzonkowski avatar lvnilesh avatar ottosch avatar punterwantsawhalepass avatar superphatarrow avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar

seedtool's Issues

[Feature request]: Display fingerprint and update it after applying passphrase

SeedSigner (and hopefully other wallet hardware/software) trains users to refer to their various keys by the fingerprint, especially when backing up their mnemonic and/or SeedQR.

So a user may have a backup that lists the target fingerprint but can no longer locate the passphrase that yielded that fingerprint.

But rather than doing the computation-heavy calculations that the current Passphrase Tester tool does, we'd just need the tool to display the resulting fingerprint after applying the passphrase. They can then quickly iterate through possible passphrases until they (hopefully) yield the target fingerprint they were looking for.

The fingerprint display will be generally useful (with or without a passphrase) as an addition to the info that's presented.

Also serves as yet another external validator to compare different BIP-39 implementations/HWWs to see if you get the same results.

Feature request: BIP-85 Passwords

Add the BIP855 password to the "BIP85 Application dropdown".
The coldcard mk4 is able to produce a 21 character password based on the BIP-85 spec. To my understanding it derived from PWD BASE64 as explained in the BIP.

Beside the offline password manager possibilities, this is a great way of deriving multiple passphrases based on one master seed.

TapRoot (P2TR) address in Single Address Tool section

As a user, I want a TapRoot type of address to be show (alongside "legacy", "wrapped segwit" and "native segwit') so that I can learn all the of them in one place. (I suggest showing the raw TapRoot address generated from an "internal" a.k.a. "untweaked" public key: bc1pgrulsvazt3e9gqhzg2t9gy94hwvjm3875yegdq0s5azhrscsfcmqgk5wqt in the case shown in the image below).

image

Derive original seed using 2-of-2 Seed XOR

I was able to split a seed with the xor tool, but unable to recover it. There is only a field to enter one of the derived xor seeds and I am unable to retrieve the original seed.

Is this a bug or did I do something wrong?

image

Release

bitcoin:bc1qcuwsav796wfxtrht4arnjvmzy6g5q7t26cy6lp?amount=10

Add Support for seedXOR and One-Time-Pads

SeedXOR and OTP are ways of turning a single seed into two new seeds in a way that provides perfect security if conditions are met. These methods have the advantage that they are easy to also compute by hand. SeedXOR enables the generation of valid seed words. A use can make a passphrase that fails to have enough entropy, whereas these methods do not allow entropy reduction. Additionally, on many devices, passphrase entry can be time consuming and less convenient.

SeedXOR overview here:
https://seedxor.com/

SeedXOR variant with 2 of 3 setup thread here:
https://twitter.com/nk1tz/status/1447328171334963201

Python implementation of OTP for bitcoin seeds here.
https://github.com/brndnmtthws/seed-otp

Make Raw Entropy as Mnemonic length available to support manual binary seed generation

Despite its presence in Ian Coleman's "Mnemonic Code Converter" the Menu item "Use Raw Entropy (3 words per 32 bits)" is not part of the fantastic seedtool yet.
By choosing this option the user could determine the seed manually by generating binary entropy (11 bits per word) and calculate the words based on this as described in e.g. Do you trust your seed, don't generate it yourself.

The seedtool could be used then for checking the own work and support the last word calculation.
Maybe this menu item needs some additional caption to avoid noob confusion.

Word Indexes starting with "0"

When you enter in Entropy Section and then find "Word Indexes" you will get an incorrect correspondence.

Abandon = Word index "0" - the correct is "1"
Ability = Word index "1" - the correct is "2"
Able = Word index "2" - the correct is "3"

Add instructions for verifying release

On the releases page, there is a PGP signature block and a signature.txt file included, but no instructions on how to verify this. It's best practice to include these instructions in the project's main README file, or in each release, or both.

Hello

bitcoin:3F6K3Fo91oh1W8yyFyG7d1wbAaEr88ktqG

Should migrate some of the tools at bitaddress.org

https://github.com/pointbiz/bitaddress.org

One thing I like is having the mouse movement and keyboard change the entropy. I don't know how seedtool currently does when it's "Calculating" but I would trust it more if it included some user inputs.

Also some version of a Brain wallet that accept any string of character as entropy (at your own risk!) and generate an xpriv instead of a single address would be amazing.

Typo in opening paragraph

This page offers a space for bitcoiners to experiment and learn how bitcoin wallets are generated using different sources of entrpopy (randomness).

Misspelling

BIP84 defines the standard for deriving P2WPKH (Pay to Withness Public Key Hash) addresses, typically referred to as 'Native Segwit' addresses.

Withness should be Witness

Feature Request: Testnet / Mainnet Selection for BIP47 Reusable Payment Codes

At Seed Tool v2.0.0 it is only possible to derive a Reusable Payment Code for a mainnet wallet.

Consider adding a toggle to the "BIP47: Reusable Payment Codes" section to switch between mainnet and testnet, as Reusable Payment Codes are derived differently for mainnet and testnet wallets.

Consider setting the toggle to mainnet by default.

My address

0xDcd053a7C8Cdd3A38aF86A3f6Ec86c418f02fFF9

[Feature request]: Bitcoin addresses resulting from private keys generated independently

As a user, I want to input ECDSA private key in hex format and get the resulting bitcoin addresses so that they are independent from the implemented software libraries and sources of entropy.

Why is it important?
To minimize users' dependence on tools, libraries etc. Users should be able to choose not to trust them and manually generate keys on their own (or import ones generated elsewhere). There is the risk that an auto-generated keys may follow a pattern that may be exploited (keys could be recreated easily and used to transfer bitcoins from an address). A pattern/vulnerability (bug in random key generation implementation) may be discovered in the future and affect keys/addresses generated in the past.

There is only "Enter your own entropy" input field in the tool in the 1.07 (current) version. Let's add a similar input field for ECDSA private key (in hex format), please.

Feature request: generate 2nd seed that produces XOR result with a valid checksum

Generate the 2nd seed which XOR'd with the 1st one results in the one which is complete (with correct checksum/last 4 bits) so that there isn't the need calculate SHA256 checksum: "If you intend to recover your original seed by hand in future using SeedXOR, you should make a note of the original seed's final word because the chances are that you will not be able to calculate the last word by hand using XOR & SHA256."

There is 1/4^2=6.25% chance to generate such a seed so brute-force could be implemented to achieve it.

image

Entering own mnemonic phrase filling behavior

On pasting a mnemonic phrase into SeedTool, only the first slot is being filled, and with all of the words.
A better behavior would be that each word will be placed into the right slot, based on space or known given word.

image

Feature Request: SeedQR display

This feature request is to display a SeedQR where ever a mnemonic is presented in Seed Tool.

Once a user has generated or manually loaded a seed into Seed Tool, they should have the ability to view the SeedQR representation of the BIP39 mnemonic. This would also be extremely useful to display the SeedQR for mnemonics within the "Seed XOR" and "BIP85: Deterministic Entropy" sections.

This is very useful for workflows when an airgapped computer is used where a master seed is stored (or accessible) and a signing device (like a SeedSigner) needs to scan a SeedQR to sign a transaction created on an internet-connected computer. SeedQRs are much easier to work with on a signing device than manually typing in each mnemonic.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.