Bad advice. If the passphrase is chosen by an human to be easy to remember, chances are that it will be pretty easy to bruteforce given the seed phrase, since there is no rate limits besides the computing power to create a wallet. The entire deal about password managers we use (or should use) today is to create secure passwords because humans suck at it.
My passphrase is >25 characters long, but very easy for me to remember because of how I've structured it.
Good luck cracking that.
reply
There is absolute no way with the current technology to bruteforce a 25+ character passphrase that contain no known words or meaning. The only question is if the way you structured it undermines these assumptions.
reply
You cannot effectively brute force attack a passphrase, can you? You need to contact the node and to check balance each time.
In any case, this was just to pass the airport, and then you could move the funds again to a more secure and backed up passphrase.
reply
You cannot effectively brute force attack a passphrase, can you? You need to contact the node and to check balance each time.
Why wouldn't it be effective if you are using one or more local nodes? It is just a database after all. And i think you don't even need to contact a node if you know at least one public address of the wallet.
reply
I don't know. Maybe. I'm not a hacker 😅
reply
There are plenty of ways to make things easy to remember AND secure. Don't let someone else's fear persuade you.
reply
indeed, 12/24 words seeds are easy to remember and secure.
reply