3rd Iteration
3rd Iteration
> @3rdIteration, this does not solve my problem, > you can run 100,000 lines of passphrases-list and wait for 1 hour - nothing will change, > although you claimed that...
If you are only using one mnemonic then just use BTCRecover.py and do a normal passphrase recovery.
OpenCl isn't being used for the passphrase checks in any meaningful way anyway, so if you only have one mnemonic, then you might as well use that. On Tue, Feb...
This behavior is now improved for running seedrecover with large numbers of passphrases as of https://github.com/3rdIteration/btcrecover/commit/2743e9587d0cd84e12dea50a7dfb609d777b5f3e
> @3rdIteration, why not use this kernel - https://github.com/openwall/john/blob/bleeding-jumbo/run/opencl/pbkdf2_hmac_sha512_kernel.cl ? > salt = passphrase It's not offering any functionalities that the current kernel doesn't have...
The current kernel does support checking a list of seeds where as given passphrase is in use, just like the one you linked. What neither of them support is taking...
Can you generate a test wallet and provide a command that can be pasted to reproduce this error?
fixed in https://github.com/3rdIteration/btcrecover/commit/40f53d0ceb4f93e13fb3cddee9aab73569f45087
Firstly, ignore the scammer that was commenting before. Secondly, you have provided no useful information here. What kind of wallet are you attempting to recover? Can you submit a sample...
Free support happens in the YouTube comments section, ask there