TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: MnemonicSafe – A BIP-39 Secret Sharing Library Inspired by Slip-39

1 点作者 iapi3 个月前

1 comment

iapi3 个月前
Hey HN,<p>I’m excited to share MnemonicSafe, a JavaScript library that securely splits and encrypts BIP-39 mnemonics using Shamir’s Secret Sharing (SSS) and AES-256-GCM encryption. This project is inspired by SLIP-39 (SatoshiLabs’ Shamir Backup), but it is an independent, experimental approach that offers flexibility for custom security models.<p>How It Works • Split a BIP-39 mnemonic into N shares using Shamir’s Secret Sharing. • Threshold-based recovery: Only T of N shares are needed to reconstruct the mnemonic. • Encrypt each share using AES-256-GCM with unique passwords for added security. • Supports reconstruction of the mnemonic only when the correct threshold of decrypted shares is provided.<p>Why Use This? • More secure than storing a single mnemonic. • Resistant to loss: As long as the threshold number of shares exists, the mnemonic can be recovered. • Better than just encrypting the mnemonic: A single compromised key won’t reveal the full secret. • Customizable &amp; extensible: Can be adapted for advanced use cases like expiration metadata, threshold encryption, or HSM integration.<p>What This Is Not • This is not an official SLIP-39 implementation. It is inspired by SLIP-39 but uses password-based encryption for added flexibility.<p>GitHub: <a href="https:&#x2F;&#x2F;github.com&#x2F;hackable&#x2F;mnemonicsafe">https:&#x2F;&#x2F;github.com&#x2F;hackable&#x2F;mnemonicsafe</a><p>Would love to hear thoughts from HN! Any feedback, suggestions, or security critiques are welcome.