3rd Iteration

Results 162 comments of 3rd Iteration

If you need help with this, I maintain an updated fork and do YouTube videos for using the tool. If it helps, I can first make a video that closely...

No, there are 20! (20 factorial) possible seeds, the math of it makes it impractical.

I have it detecting a Yubikey 5 NFC just fine, even via pcsc_scan. (Running on a Raspberry Pi 4 with PN532 connected via i2c) It also works just fine with...

Can't test UART at the moment, but it's this board here https://a.aliexpress.com/_mqQRXte It also detects the yubikey with plain old nfc-poll.

That's the exact board that I am using. I actually have a second one coming in a few days, so can see if ur works the same and also test...

So I just checked and basically the quality varies dramatically between these cheap clone boards from AliExpress or Amazon... One of them ones that I have here has very poor...

Haven't tried but I would imagine so, these clones are never consistent...

Not sure if you are still interested in this but I am looking to extend the functionality of BTCRecover to make use of this algo for brute-force recovery of BIP39...

Yea the challenge is that every address and derivation path requires its own particular hashing to go from the master key to final address hash160 and if you are hashing...

So this could be a promising start, https://medium.com/@johncantrell97/how-i-checked-over-1-trillion-mnemonics-in-30-hours-to-win-a-bitcoin-635fe051a752 Will require some modifications for your use case, but woulf be useful in doing both the hashing and address verification in OpenCL.