scgbckbone
scgbckbone
How I generate non-secret shares: 1. From current loaded secret (whether it is mnemonic, xprv, or codex32) * codex32: secret = master_seed (secret share with hrp MS) * others: secret...
> HRP was always in the checksum, it just was pre-computed for "ms" so the checksums for other HRP were wrong. I noticed when I tried to validate the CLN...
Seems to me this is well over the BIP-85 application scope. As I understand it, BIP85 generates "a thing" from "a thing". Your application is generating "multiple things" from "a...
> Then why not use that for BIP39 or any other application too? Let users convert deterministic bytes into mnemonics or codex32 strings as they wish. The point of a...
> BIP93 prescribes using the first k alphabetical share indices for "random initial shares" (our bip85 entropy application) completely missed that one, thanks for the reminder + examples > However,...
> Since only hrp = "ms" secrets represent a BIP-0032 master seed with an associated master key pair and master pubkey fingerprint perhaps we drop the fingerprint default? Or (my...
> Your design should probably use the 20-MSB of the master key fingerprint as the identifier on master xprvs and master xpubs. That has the awesome property of keeping the...
> When I see storing the chain code and private key, I am thinking you're encoding an extended key (you are) so that seems most useful to go all the...