this post was submitted on 22 May 2024
14 points (81.8% liked)
Monero
1663 readers
27 users here now
This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.
Wallets
Android (Cake Wallet) / (Monero.com)
iOS (Cake Wallet) / (Monero.com)
Instance tags for discoverability:
Monero, XMR, crypto, cryptocurrency
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Great blog! does this have any benefit over a polyseed mnemonic where you also have a secret password? With polyseed as well as BIP39, even if your mnemonic is caught you can use that plain seed as a decoy that opens a fake wallet, while your real seed with your real funds can only be decrypted with the password, and this encrypted mnemonic by hand won't result in a valid seed so the malicious actor can assume that a valid seed still exists and it still needs to be seized or brute forced?
I think this method is better when using steganography combined since the mnemonic looks like a blob of nothing when reading the contents of the file, while if an actual seed was used it could reveal there is a Monero seed hidden in that file, but then I think a better encryption method can be used since using digital files loses the benefit of not using a computer?
https://github.com/tevador/polyseed
Thanks, glad you found something useful in it.
I'm not sure, I'll have to look into polyseed. I guess the over all point is to take elements of this and make it your own :)
My key focus, as you pointed out, was not to use any third-party software or technology. Trying to think of a "worst case scenario" that provides decent encryption while also only needing a memorisation of a short password and a pen/paper. You could write out the Vigenère Table by hand if you really wanted to.
Next, in this line of thinking, I'll do something on the Playfair Code which was used by the British during the Boer War and by German spies during WWII
Vigenere is old insecure shit. Dont do it.
Yes it is not impervious to brute force-frequency analysis, however it still has it's uses.