Guys keep in mind, regardless of the length of your passphrase, bruteforcing will eventually find accounts. I'm actually surprised this hasn't become more prevalent. Since each wallet is ONLY a passphrase and not a username and passphrase to authenticate against, and there is not a lockout on accounts for how fast you can check a passphrase (unless the blockchain does it). All someone needs to do is bruteforce continually till it happens upon a account. Since everyone is essentially using one username which is identical for all of us and it's impossibly hard to change it once you have one (replotting).
Luckily mine is huge, but with time it will also be broken by a brute force. I'm not certain of the speed at which you could check passwords, but I assume with scripts and modern GPUs you could do some serious bruteforcing on Burst.
Luckily mine is huge, but with time it will also be broken by a brute force. I'm not certain of the speed at which you could check passwords, but I assume with scripts and modern GPUs you could do some serious bruteforcing on Burst.
Burst uses 256 bit keys to protect accounts. When your passphrase has 256 bits or more entropy, the account is protected by 256 bits.
256 bits ~ 1.15 * 1078 ~ about the number of atoms in the observable universe.
Bitcoin addresses are "only" protected by 160 bits, which is more than a billion billion times easier to brute force, but even thats out of reach.
At the moment even 64 bits are - kind of - safe.
Take a look at this address:
http://burstcoin.eu/address/17139770934297222142
3 Million burst protected by 64 bits. Still not stolen. I highly recommend this guy to protect his address!