Bitcoin Forum
February 10, 2026, 04:19:55 AM *
News: Community awards 2025
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [Experiment]How BIP85 Passwords is helping me solve the problem of losing passwd  (Read 85 times)
Forsyth Jones (OP)
Legendary
*
Offline Offline

Activity: 1806
Merit: 1951


I love Bitcoin!


View Profile WWW
February 08, 2026, 08:25:23 PM
Last edit: February 08, 2026, 08:52:16 PM by Forsyth Jones
Merited by joker_josue (5), Cricktor (2)
 #1

In recent years, we've had several very important updates on Bitcoin protocol, such as BIP32, BIP39, Segwit, taproot, etc. But what got me most excited is the BIP85 and I'll try to explain why throughout this post.

To understand what BIP-85 is, I recommend reading my topic with all the possible references I found at the time, where I tried to explain it in the best way I could: How to backup multiple seeds derived from one: BIP-85

BIP-85 has as one of its main functions explored by the wallets that support it, generating child seed phrases from your parent seed phrase, in addition, it can also generate xprivs, private keys, etc. What is less explored is that through BIP-85, we can mathematically generate Base64 characters that serve as a perfect password (depending on your point of view) based on its parent seed phrase and BIP-39 passphrase (if enabled). See it.

One of the few software that fully explores the functionality of the BIP-85 is Coldcard (MK4 and Q) and on this page, the iancoleman .html script only explores the traditional BIP-85 (it doesn't explore the BIP-85 passwords).

If you want to go directly to the technique's execution, go straight to the 'How-to'.

Motivation

Well, technically I'm not using it yet, but my grandma has a lot of difficulty storing the passwords for her digital life, she writes down her passwords in her notebook, but then loses them or takes too long to find them.

So I downloaded keepassDx on her Android, created a database and a temporary master password (until I had a better idea), but she was still unable to use it due to the complexity (considering that she is in her 70y old and is not very familiar with the digital environment).

So I had to think of a password that balances convenience without compromising basic security principles and without running risk of losing that password if it's storing login credentials other than conventional credentials, which cannot be reset (like bitcoin wallets, seedphrases, passphrases, etc).

How-to:

So I had an idea: I went to generate a new password derived from one of my seed phrases + BIP39 Passphrase, for this I used the bitcoiner.guide script, like iancoleman, can be generated offline and saved a copy of the .html to run on any device (mainly offline).

After typing my backup seed phrase + Passphrase BIP39:



I went to BIP85: Deterministic Entropy > Selected the password length (e.g: 15) > and the index number (BIP85 PWD Index) and the result is a random and robust password like this:

Code:
c16VkHrEykNHLln



I used the password generated by BIP-85 as the master password for the KeepassDx database, in KeepassDx we can also access the database only with biometrics (fingerprint only, not facial), this way I killed two birds with one stone:

She doesn't need to enter the password generated by the BIP-85 every time she accesses, she can simply use her fingerprint, if KeepassDx no longer requests biometrics, she accesses it by typing the password, and if she loses the password, it will no longer be the end of the world, as long as the following are not lost:

Code:
The parent backup seed phrase;
BIP39 passphrase;
Password Length;
Index.

With access to this information, simply use the BIP85 Passwords compatible tool (like this or coldcard) and restore access to the keepass database.

This method is very useful if you store Bitcoin wallet passwords, secondary passphrases depending on your objective: password managers, veracrypt and etc. where you cannot lose the password.

Of course, I could use 12-word mnemonic words as a keepass password, but that's up to you, it depends on each user's paranoia, some think complex passwords like those generated by the BIP-85 are more secure, I'm tending towards passphrases like: 'chase acoustic lyrics' than complex passwords.
Like I said, it's just an experiment that has already helped me solve a very common problem: losing passwords that cannot be reset by common methods.

I'll stop here now, this got very long, I'll continue if there's any discussion, use it sparingly and adapt it as best suits you.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits PREDICT..
█████████████████████████
█████████████████████████
███████████▀▀░░░░▀▀██████
██████████░░▄████▄░░████
█████████░░████████░░████
█████████░░████████░░████
█████████▄▀██████▀▄████
████████▀▀░░░▀▀▀▀░░▄█████
██████▀░░░░██▄▄▄▄████████
████▀░░░░▄███████████████
█████▄▄█████████████████
█████████████████████████
█████████████████████████
.
.WHERE EVERYTHING IS A MARKET..
█████
██
██







██
██
██████
Will Bitcoin hit $200,000
before January 1st 2027?

    No @1.15         Yes @6.00    
█████
██
██







██
██
██████

  CHECK MORE > 
joker_josue
Legendary
*
Offline Offline

Activity: 2296
Merit: 6585


**In BTC since 2013**


View Profile WWW
February 09, 2026, 07:59:47 AM
 #2

Interesting idea and a different approach.

Now I ask: the risk of losing the seed phrase is the same as losing the "normal" password, right? So, the idea they're proposing is that you keep the seed key, and your grandmother uses the password, is that it?

 
 b1exch.io 
  ETH      DAI   
  BTC      LTC   
  USDT     XMR    
.███████████▄▀▄▀
█████████▄█▄▀
███████████
███████▄█▀
█▀█
▄▄▀░░██▄▄
▄▀██▄▀█████▄
██▄▀░▄██████
███████░█████
█░████░█████████
█░█░█░████░█████
█░█░█░██░█████
▀▀▀▄█▄████▀▀▀
Eze BTC
Jr. Member
*
Offline Offline

Activity: 63
Merit: 7


View Profile
February 09, 2026, 02:30:47 PM
 #3

In recent years, we've had several very important updates on Bitcoin protocol, such as BIP32, BIP39, Segwit, taproot, etc. But what got me most excited is the BIP85 and I'll try to explain why throughout this post.

To understand what BIP-85 is, I recommend reading my topic with all the possible references I found at the time, where I tried to explain it in the best way I could: How to backup multiple seeds derived from one: BIP-85

BIP-85 has as one of its main functions explored by the wallets that support it, generating child seed phrases from your parent seed phrase, in addition, it can also generate xprivs, private keys, etc. What is less explored is that through BIP-85, we can mathematically generate Base64 characters that serve as a perfect password (depending on your point of view) based on its parent seed phrase and BIP-39 passphrase (if enabled). See it.

One of the few software that fully explores the functionality of the BIP-85 is Coldcard (MK4 and Q) and on this page, the iancoleman .html script only explores the traditional BIP-85 (it doesn't explore the BIP-85 passwords).

If you want to go directly to the technique's execution, go straight to the 'How-to'.

Motivation

Well, technically I'm not using it yet, but my grandma has a lot of difficulty storing the passwords for her digital life, she writes down her passwords in her notebook, but then loses them or takes too long to find them.

So I downloaded keepassDx on her Android, created a database and a temporary master password (until I had a better idea), but she was still unable to use it due to the complexity (considering that she is in her 70y old and is not very familiar with the digital environment).

So I had to think of a password that balances convenience without compromising basic security principles and without running risk of losing that password if it's storing login credentials other than conventional credentials, which cannot be reset (like bitcoin wallets, seedphrases, passphrases, etc).

How-to:

So I had an idea: I went to generate a new password derived from one of my seed phrases + BIP39 Passphrase, for this I used the bitcoiner.guide script, like iancoleman, can be generated offline and saved a copy of the .html to run on any device (mainly offline).

After typing my backup seed phrase + Passphrase BIP39:



I went to BIP85: Deterministic Entropy > Selected the password length (e.g: 15) > and the index number (BIP85 PWD Index) and the result is a random and robust password like this:

Code:
c16VkHrEykNHLln



I used the password generated by BIP-85 as the master password for the KeepassDx database, in KeepassDx we can also access the database only with biometrics (fingerprint only, not facial), this way I killed two birds with one stone:

She doesn't need to enter the password generated by the BIP-85 every time she accesses, she can simply use her fingerprint, if KeepassDx no longer requests biometrics, she accesses it by typing the password, and if she loses the password, it will no longer be the end of the world, as long as the following are not lost:

Code:
The parent backup seed phrase;
BIP39 passphrase;
Password Length;
Index.

With access to this information, simply use the BIP85 Passwords compatible tool (like this or coldcard) and restore access to the keepass database.

This method is very useful if you store Bitcoin wallet passwords, secondary passphrases depending on your objective: password managers, veracrypt and etc. where you cannot lose the password.

Of course, I could use 12-word mnemonic words as a keepass password, but that's up to you, it depends on each user's paranoia, some think complex passwords like those generated by the BIP-85 are more secure, I'm tending towards passphrases like: 'chase acoustic lyrics' than complex passwords.
Like I said, it's just an experiment that has already helped me solve a very common problem: losing passwords that cannot be reset by common methods.

I'll stop here now, this got very long, I'll continue if there's any discussion, use it sparingly and adapt it as best suits you.

Yeah, BIP-85 backs  deterministic password generation (via PWD BASE85 or BASE64 applications in the spec). This has been observed in implementation in some tools such as Coldcard and some forks of Ian Coleman's BIP39 tool.

Howbeit, the standard BIP-85 (from bitcoin/bips repo) generates entropy basically for seeds/mnemonics, WIF keys, etc. There's specific application numbers which password derivation uses such as 707785' for PWD BASE85 with Base85/Base64 encoding and slicing to the required length.It's safe, as well as deterministic. It can be regenerated through summation of master seed + index. Don't forget though that  passwords gotten in such way are not  BIP-39 mnemonics/passphrases, so, it's important you regard treat dem as just high-entropy strings. Nothing more, nothing less. It's a fantastic move for a convenient backup. You just need to consider safety in documentation of indices, so do it properly and securely.
Forsyth Jones (OP)
Legendary
*
Offline Offline

Activity: 1806
Merit: 1951


I love Bitcoin!


View Profile WWW
February 09, 2026, 03:28:50 PM
 #4

Interesting idea and a different approach.

Now I ask: the risk of losing the seed phrase is the same as losing the "normal" password, right? So, the idea they're proposing is that you keep the seed key, and your grandmother uses the password, is that it?
The ideal is she would keep all the necessary items for recovery when she no longer has access to the final password generated by the BIP-85 PWD. However, since she doesn't have the autonomy to do that, I keep the copies with me, so she has access to the backup items, like BIP-39 passphrase. The parent seed is also with me, so I also have access. The parent seed was already mine, it's also part of a backup I was keeping. It's a smart way to diversify my own backup by keeping a copy with her.

I'm even thinking about creating documentation, maybe even recording a video demonstrating how to recover the PWD password. This will be useful if I'm no longer here.

But for now, I periodically remind her: "This is your backups to recover your password" which helps reinforce her memory, especially when dealing with an elderly person who has spent a good part of her life outside the digital environment.

However, I'm the one who helps manage her finances, as no one else has the time or interest.

For now, the experiment is working. I created the password for her in the middle of last year, and a few days ago, I simulated a recovery with her and it worked.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits PREDICT..
█████████████████████████
█████████████████████████
███████████▀▀░░░░▀▀██████
██████████░░▄████▄░░████
█████████░░████████░░████
█████████░░████████░░████
█████████▄▀██████▀▄████
████████▀▀░░░▀▀▀▀░░▄█████
██████▀░░░░██▄▄▄▄████████
████▀░░░░▄███████████████
█████▄▄█████████████████
█████████████████████████
█████████████████████████
.
.WHERE EVERYTHING IS A MARKET..
█████
██
██







██
██
██████
Will Bitcoin hit $200,000
before January 1st 2027?

    No @1.15         Yes @6.00    
█████
██
██







██
██
██████

  CHECK MORE > 
Donneski
Full Member
***
Offline Offline

Activity: 560
Merit: 155


Contact Hhampuz for campaign


View Profile
February 09, 2026, 08:25:16 PM
 #5

This is a very creative idea and I can see the logic behind using deterministic entropy this way.

But don’t you think this might be adding extra complexity to a problem that password managers already solve quite well? I’m also wondering if tying anything related to passwords back to a seed phrase could create a situation where a small mistake exposes more than intended.

For someone who isn’t very technical, could this approach end up being more confusing during recovery than simply relying on a good password manager and proper backups?

I'm just curious to know how you see this trade-off in practice.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!