TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: MnemonicSafe – A BIP-39 Secret Sharing Library Inspired by Slip-39

1 pointsby iapi4 months ago

1 comment

iapi4 months ago
Hey HN,<p>I’m excited to share MnemonicSafe, a JavaScript library that securely splits and encrypts BIP-39 mnemonics using Shamir’s Secret Sharing (SSS) and AES-256-GCM encryption. This project is inspired by SLIP-39 (SatoshiLabs’ Shamir Backup), but it is an independent, experimental approach that offers flexibility for custom security models.<p>How It Works • Split a BIP-39 mnemonic into N shares using Shamir’s Secret Sharing. • Threshold-based recovery: Only T of N shares are needed to reconstruct the mnemonic. • Encrypt each share using AES-256-GCM with unique passwords for added security. • Supports reconstruction of the mnemonic only when the correct threshold of decrypted shares is provided.<p>Why Use This? • More secure than storing a single mnemonic. • Resistant to loss: As long as the threshold number of shares exists, the mnemonic can be recovered. • Better than just encrypting the mnemonic: A single compromised key won’t reveal the full secret. • Customizable &amp; extensible: Can be adapted for advanced use cases like expiration metadata, threshold encryption, or HSM integration.<p>What This Is Not • This is not an official SLIP-39 implementation. It is inspired by SLIP-39 but uses password-based encryption for added flexibility.<p>GitHub: <a href="https:&#x2F;&#x2F;github.com&#x2F;hackable&#x2F;mnemonicsafe">https:&#x2F;&#x2F;github.com&#x2F;hackable&#x2F;mnemonicsafe</a><p>Would love to hear thoughts from HN! Any feedback, suggestions, or security critiques are welcome.