jackbox
Legendary
Offline
Activity: 1246
Merit: 1024
|
|
March 18, 2015, 10:10:15 AM |
|
Is it possible to use Electrum+Trezor if the Trezor device was set up through https://mytrezor.com? Wallet schould be the same as on mytrezor.com. Yes, exactly the same. Just set up as new wallet, not restore. It will get the master public key from the Trezor and you are good to go. I use mine with Electrum 2 and it was setup on myTrezor website.
|
|
|
|
Erdogan
Legendary
Offline
Activity: 1512
Merit: 1005
|
|
March 18, 2015, 10:30:16 AM |
|
Question: How many different passphrases does Trezor support?
over 9000 no, wait all of them! How hard are the passphrases to crack compared to bip38? I know there is some type of key lengthening.... I'm mostly curious how hard short passwords are to crack if you have the seed. That'd be interesting to know, yes. I know one thing: on each bruteforce attempt you have to query the utxo set to see if there are funds, because there's no other way to know wether or not you have found the correct passphrase. In fact you also have to check wether there address has been used in the past (and now has 0 balance so it's not in the utxo set any more) and/or query a couple more addresses in case the first one was left untouched. That alone should slow things down quite a bit. The passphrase has to be entered via the pc, and there is no concealment from a rogue pc pin-cod style.
|
|
|
|
cypherdoc
Legendary
Offline
Activity: 1764
Merit: 1002
|
|
March 18, 2015, 10:46:31 AM |
|
So you can have infinite and separated set of addresses at your own disposal based on the passphrase while having one single private key in the form of the seed? That's neat. Thank you.
That's not quite right. There's one mnemonic, that's the 24 word string. Combined with any (or no) passphrase, the mnemonic gets turned into the seed, and then the root private key. Each passphrase you use with the same mnemonic will generate a different root private key. what's the correct way to visualize this? a tree with the root privkey at the top and a new branch extending downwards for each passphrase in a hierarchical tree?
|
|
|
|
cypherdoc
Legendary
Offline
Activity: 1764
Merit: 1002
|
|
March 18, 2015, 10:47:52 AM |
|
why do we trust the Electrum server more than mytrezor.com server when it comes to tracking addresses used?
|
|
|
|
Lincoln6Echo
Legendary
Offline
Activity: 2461
Merit: 1058
Don't use bitcoin.de if you care about privacy!
|
|
March 18, 2015, 10:57:47 AM |
|
Is it possible to use Electrum+Trezor if the Trezor device was set up through https://mytrezor.com? Wallet schould be the same as on mytrezor.com. Yes, exactly the same. Just set up as new wallet, not restore. It will get the master public key from the Trezor and you are good to go. I use mine with Electrum 2 and it was setup on myTrezor website. So to use the existing wallet from trezor.com I have to choose: What do you want to do: -create new wallet wallet type: - Hardware wallet right? Is there something else to consider?
|
|
|
|
klondike_bar
Legendary
Offline
Activity: 2128
Merit: 1005
ASIC Wannabe
|
|
March 18, 2015, 01:21:58 PM |
|
So you can have infinite and separated set of addresses at your own disposal based on the passphrase while having one single private key in the form of the seed? That's neat. Thank you.
That's not quite right. There's one mnemonic, that's the 24 word string. Combined with any (or no) passphrase, the mnemonic gets turned into the seed, and then the root private key. Each passphrase you use with the same mnemonic will generate a different root private key. what's the correct way to visualize this? a tree with the root privkey at the top and a new branch extending downwards for each passphrase in a hierarchical tree? picture it like bitcoin mining almost. The 24-word seed is like the list of transactions. The password (25th word of the seed) is like a nonce - any value will work, and can create millions of possibilities.
|
|
|
|
jackbox
Legendary
Offline
Activity: 1246
Merit: 1024
|
|
March 18, 2015, 04:53:56 PM |
|
Is it possible to use Electrum+Trezor if the Trezor device was set up through https://mytrezor.com? Wallet schould be the same as on mytrezor.com. Yes, exactly the same. Just set up as new wallet, not restore. It will get the master public key from the Trezor and you are good to go. I use mine with Electrum 2 and it was setup on myTrezor website. So to use the existing wallet from trezor.com I have to choose: What do you want to do: -create new wallet wallet type: - Hardware wallet right? Is there something else to consider? Yes, if there is a selection button click Trezor and it will query the Trezor for the public master key and that will be save under the wallet name you previously gave it when you said new wallet. If you start Electrum without the Trezor connected it will say error, watch only mode. If you want to send just plug in the Trezor before starting the send transaction and it will ask for your PIN (if you have one) and then sign the transaction. Easy and works well.
|
|
|
|
molecular
Donator
Legendary
Offline
Activity: 2772
Merit: 1019
|
|
March 18, 2015, 05:21:34 PM |
|
Question: How many different passphrases does Trezor support?
over 9000 no, wait all of them! How hard are the passphrases to crack compared to bip38? I know there is some type of key lengthening.... I'm mostly curious how hard short passwords are to crack if you have the seed. That'd be interesting to know, yes. I know one thing: on each bruteforce attempt you have to query the utxo set to see if there are funds, because there's no other way to know wether or not you have found the correct passphrase. In fact you also have to check wether there address has been used in the past (and now has 0 balance so it's not in the utxo set any more) and/or query a couple more addresses in case the first one was left untouched. That alone should slow things down quite a bit. The passphrase has to be entered via the pc, and there is no concealment from a rogue pc pin-cod style. That's a different attack. The question was how long would it take (in relation to passphrase length) to bruteforce the passphrase if someone finds your paper seed backup.
|
PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0 3F39 FC49 2362 F9B7 0769
|
|
|
jackbox
Legendary
Offline
Activity: 1246
Merit: 1024
|
|
March 18, 2015, 05:28:27 PM |
|
Question: How many different passphrases does Trezor support?
over 9000 no, wait all of them! How hard are the passphrases to crack compared to bip38? I know there is some type of key lengthening.... I'm mostly curious how hard short passwords are to crack if you have the seed. That'd be interesting to know, yes. I know one thing: on each bruteforce attempt you have to query the utxo set to see if there are funds, because there's no other way to know wether or not you have found the correct passphrase. In fact you also have to check wether there address has been used in the past (and now has 0 balance so it's not in the utxo set any more) and/or query a couple more addresses in case the first one was left untouched. That alone should slow things down quite a bit. The passphrase has to be entered via the pc, and there is no concealment from a rogue pc pin-cod style. That's a different attack. The question was how long would it take (in relation to passphrase length) to bruteforce the passphrase if someone finds your paper seed backup. That would depend on the length and complexity of the password and if anything about it was known to the attacker. With a strong password it could take thousands of years. Once quantum computers are mainstream it could possibly be brute forced within minutes but by then Bitcoin protocol would have changed to a quantum alogorithm.
|
|
|
|
cypherdoc
Legendary
Offline
Activity: 1764
Merit: 1002
|
|
March 18, 2015, 05:29:15 PM |
|
So you can have infinite and separated set of addresses at your own disposal based on the passphrase while having one single private key in the form of the seed? That's neat. Thank you.
That's not quite right. There's one mnemonic, that's the 24 word string. Combined with any (or no) passphrase, the mnemonic gets turned into the seed, and then the root private key. Each passphrase you use with the same mnemonic will generate a different root private key. what's the correct way to visualize this? a tree with the root privkey at the top and a new branch extending downwards for each passphrase in a hierarchical tree? picture it like bitcoin mining almost. The 24-word seed is like the list of transactions. The password (25th word of the seed) is like a nonce - any value will work, and can create millions of possibilities. isn't each passphrase generated set of addresses a separate branch of the HD tree? however, it sounds like no further sub-branches can be built under each branch?
|
|
|
|
jackbox
Legendary
Offline
Activity: 1246
Merit: 1024
|
|
March 18, 2015, 05:31:03 PM |
|
So you can have infinite and separated set of addresses at your own disposal based on the passphrase while having one single private key in the form of the seed? That's neat. Thank you.
That's not quite right. There's one mnemonic, that's the 24 word string. Combined with any (or no) passphrase, the mnemonic gets turned into the seed, and then the root private key. Each passphrase you use with the same mnemonic will generate a different root private key. what's the correct way to visualize this? a tree with the root privkey at the top and a new branch extending downwards for each passphrase in a hierarchical tree? picture it like bitcoin mining almost. The 24-word seed is like the list of transactions. The password (25th word of the seed) is like a nonce - any value will work, and can create millions of possibilities. isn't each passphrase generated set of addresses a separate branch of the HD tree? however, it sounds like no further sub-branches can be built under each branch? Each password with any given seed will generate a completely new master public and private keys. Think of it as a completely new tree.
|
|
|
|
molecular
Donator
Legendary
Offline
Activity: 2772
Merit: 1019
|
|
March 18, 2015, 05:47:00 PM |
|
Question: How many different passphrases does Trezor support?
over 9000 no, wait all of them! How hard are the passphrases to crack compared to bip38? I know there is some type of key lengthening.... I'm mostly curious how hard short passwords are to crack if you have the seed. That'd be interesting to know, yes. I know one thing: on each bruteforce attempt you have to query the utxo set to see if there are funds, because there's no other way to know wether or not you have found the correct passphrase. In fact you also have to check wether there address has been used in the past (and now has 0 balance so it's not in the utxo set any more) and/or query a couple more addresses in case the first one was left untouched. That alone should slow things down quite a bit. The passphrase has to be entered via the pc, and there is no concealment from a rogue pc pin-cod style. That's a different attack. The question was how long would it take (in relation to passphrase length) to bruteforce the passphrase if someone finds your paper seed backup. That would depend on the length and complexity of the password and if anything about it was known to the attacker. With a strong password it could take thousands of years. Once quantum computers are mainstream it could possibly be brute forced within minutes but by then Bitcoin protocol would have changed to a quantum alogorithm. Let me rephrase the question then: how long would it take on commodity hardware worth 10,000$ to guess an 8-letter (uppercase, lowercase plus 10 special characters) with known seed words?
|
PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0 3F39 FC49 2362 F9B7 0769
|
|
|
windpath
Legendary
Offline
Activity: 1258
Merit: 1027
|
|
March 18, 2015, 06:20:34 PM |
|
Let me rephrase the question then: how long would it take on commodity hardware worth 10,000$ to guess an 8-letter (uppercase, lowercase plus 10 special characters) with known seed words?
Assuming: Test 2 billion keys per second, which a single high-performance computer might approximately manage. 94 Possible characters: numbers (10 different ones: 0-9) letters (52 different ones: A-Z and a-z) special characters (32 different ones) Fixed 8 char password (TREZOR pass is not fixed length) = 94 ^8 possible combinations or 60,956,894,000,000,000,000,000 about 35 days, given our assumptions... Major caveat: Every time you generate a possible solution you have to test it and check the balances for the given seed + the 8 letter pass phrase, if your doing this on a TREZOR it would take.. well, tens of thousands of years. If you wrote a special program that had the seed pre loaded and just tested the passwords and retrieved the balance for say the first 10 addresses from the master private key it would take hundreds if not thousands of years... Edit: TL:DR; It really comes down to how many keys you can test (i.e. check for balance) a second, and the answer is not nearly as many as you could generate. It's simply not feasible.
|
|
|
|
|
chmod755
Legendary
Offline
Activity: 1610
Merit: 1021
|
|
March 18, 2015, 09:41:08 PM |
|
My Trezor still works great - I'm using it with GreenBits now, however the cable that comes with the Trezor stopped working after just a few days.
|
|
|
|
molecular
Donator
Legendary
Offline
Activity: 2772
Merit: 1019
|
|
March 18, 2015, 10:40:16 PM |
|
If you find masterpub key (which can be done if you monitor the good things before getting hands on seed) you just need to match key, and not test balance.
Good point, but: if you can monitor the trezor you can probably also monitor the keyboard, so no need to bruteforce.
|
PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0 3F39 FC49 2362 F9B7 0769
|
|
|
keithers
Legendary
Offline
Activity: 1456
Merit: 1001
This is the land of wolves now & you're not a wolf
|
|
March 18, 2015, 11:36:21 PM |
|
what is up with the mytrezor page having captchas now? Is that normal? Today is the first time I have seen that...
|
|
|
|
kkurtmann
|
|
March 19, 2015, 12:46:38 AM |
|
what is up with the mytrezor page having captchas now? Is that normal? Today is the first time I have seen that...
no captcha for me on mytezor.com. slush pool site has had captchas for a long time though.
|
|
|
|
jackbox
Legendary
Offline
Activity: 1246
Merit: 1024
|
|
March 19, 2015, 03:28:17 AM |
|
what is up with the mytrezor page having captchas now? Is that normal? Today is the first time I have seen that...
I never encounted a captcha on the mytrezor.com site.
|
|
|
|
stick
|
|
March 19, 2015, 05:46:29 PM |
|
what is up with the mytrezor page having captchas now? Is that normal? Today is the first time I have seen that...
Captchas come from Cloudflare. Your request might come from an IP range that is somehow suspicious (e.g. the might have been a DDoS attack in the past ...)
|
|
|
|
|