
{"id":113902,"date":"2024-02-26T16:58:21","date_gmt":"2024-02-26T16:58:21","guid":{"rendered":"https:\/\/mycryptomania.com\/?p=113902"},"modified":"2024-02-26T16:58:21","modified_gmt":"2024-02-26T16:58:21","slug":"how-to-create-secret-bitcoin-wallets-with-passphrases","status":"publish","type":"post","link":"https:\/\/mycryptomania.com\/?p=113902","title":{"rendered":"How to Create Secret Bitcoin Wallets with Passphrases"},"content":{"rendered":"<p>Modern HD Wallets enable the wallet owner to create an infinite number of secret wallets backed up with one single recovery seed plus the 25th word passphrase.\u00a0\u00a0<\/p>\n<p><a href=\"https:\/\/stratus.io\/blog\/hot-vs-cold-crypto-wallets-guide\/\" target=\"_blank\" title=\"\" rel=\"noopener\">Hierarchical Deterministic wallets<\/a>, also called <strong>HD Wallets, <\/strong>were introduced as part of the Bitcoin Improvement Proposal #32 (BIP 32).\u00a0<\/p>\n<h3 class=\"wp-block-heading\"><strong>Key Terms HD Wallet Passphrases:<\/strong><\/h3>\n<p><strong>BIP: <\/strong>Short for <a href=\"https:\/\/github.com\/bitcoin\/bips\/blob\/master\/README.mediawiki\" target=\"_blank\" title=\"\" rel=\"noopener\">Bitcoin Improvement Proposal<\/a> which is the method to propose, discuss and implement Bitcoin Blockchain features, upgrades and\/or information.<\/p>\n<p><a href=\"https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0032.mediawiki\" target=\"_blank\" title=\"\" rel=\"noopener\">BIP-32<\/a> \u2013 the 32nd Proposal which introduced HD Wallets<\/p>\n<p><a href=\"https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0039\/bip-0039-wordlists.md\">BIP-39<\/a> \u2013 the 39th Proposal which implemented mnemonic phrases from a \u2018word list\u2019 that can be converted to binary seeds to create deterministic wallets.<\/p>\n<p><a href=\"https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0044.mediawiki\" target=\"_blank\" title=\"\" rel=\"noopener\">BIP-44<\/a> \u2013 the 44th Proposal which improves on BIP-32 to allow \u201chandling of multiple coins, multiple accounts, external and internal chains per account and millions of addresses per chain\u201d using <strong>prefixes <\/strong>(xpub\/xpriv) for <strong>extended keys.<\/strong><\/p>\n<p><strong>Wallet<\/strong>: software that generates a public and private key pair to allow users to transact and store cryptocurrency.\u00a0\u00a0<\/p>\n<p><strong>Seed Phrase<\/strong>: A string of 12 or 24 words derived from your private key that can be used to restore, recover and access your crypto wallet.\u00a0 (aka \u2013 \u2018seed\u2019 \u2018master seed\u2019 \u2018phrase\u2019 \u2018mnemonic seed\u2019, \u2018recovery seed\u2019, \u2018backup seed\u2019, \u2018recovery phrase\u2019 or \u2018secret code\u2019)\u00a0<\/p>\n<p><strong>Passphrase<\/strong>: Optional \u201825th word\u2019 a user can add to their 24 word mnemonic seed phrase to unlock hidden wallets.\u00a0 (aka \u2013 \u2018wallet seed extension\u2019)<\/p>\n<p><strong>PIN<\/strong>: Enter your <strong>PIN<\/strong> or <strong>PIN code<\/strong> on a <strong>hardware wallet<\/strong> to restrict access to your device.\u00a0 Some wallet providers, like Ledger, offer an option to create a second PIN.<\/p>\n<p><strong>Wallet Password<\/strong> \u2013 software wallets, or hot wallets, may require a password separate from your PIN, Passphrase, or Recovery Seed.\u00a0 The password is used to access the software wallet and in some cases it\u2019s used to encrypt files stored on your computer.<\/p>\n<p><strong>Extended Keys (XPRIV &amp; XPUB)<\/strong> \u2013 HD Wallets use a <strong>master key pair<\/strong> called the Extended Private Key (xpriv) and the Extended Public Key (xpub).\u00a0 These extended keys are used to derive subordinate <strong>child keys<\/strong> which are used to create an infinite number of <strong>public addresses<\/strong> from one single master key pair or extended keys.\u00a0\u00a0<\/p>\n<p><strong>Pro Tip<\/strong> \u2013 Your 12 or 24 word recovery <strong>seed phrase<\/strong> can be used to access, recover, and restore your wallet on ANY third-party software wallet (ie \u2013 <a href=\"https:\/\/electrum.org\/\" target=\"_blank\" title=\"\" rel=\"noopener\">Electrum<\/a> or <a href=\"https:\/\/sparrowwallet.com\/\" target=\"_blank\" title=\"\" rel=\"noopener\">Sparrow<\/a>) or hardware device (ie \u2013 <a href=\"https:\/\/store.coinkite.com\/store\/coldcard\" target=\"_blank\" title=\"\" rel=\"noopener\">ColdCard<\/a>, <a href=\"https:\/\/blockstream.com\/jade\/\" target=\"_blank\" title=\"\" rel=\"noopener\">BlockStream Jade<\/a>, or Ledger) regardless of what service you used to create it.\u00a0\u00a0<\/p>\n<p>The wallet may contain multiple addresses with each address having a corresponding <strong>public key<\/strong> cryptographically derived from an <strong>extended private key<\/strong>.\u00a0\u00a0<\/p>\n<p>These different addresses are often referred to as \u2018accounts\u2019 within the wallet.\u00a0<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<p>If you use the Ledger hardware wallet, the software program defaults to creating a unique Bitcoin address for every transaction to enhance your privacy on the network.\u00a0\u00a0<\/p>\n<p>Your public key is like your bank account number and your private key is like your bank account password.\u00a0 Each unique key pair derives a public address which the \u2018receiver\u2019 shares with the \u2018sender\u2019 to initiate a transaction.\u00a0\u00a0<\/p>\n<h2 class=\"wp-block-heading\"><strong>Can I use one single recovery seed for different blockchains?<\/strong><\/h2>\n<p>Yes, your HD wallet generates one single recovery seed phrase which thanks to the BIP-32 cryptographically derives (via <strong>derivation path<\/strong>) and stores the <a href=\"https:\/\/blog.stratus.io\/bitcoin-keys-and-addresses\/\" target=\"_blank\" title=\"\" rel=\"noopener\"><strong>public key <\/strong>and <strong>private key pair<\/strong><\/a><strong> <\/strong>for each different cryptocurrency \u2018<strong>wallet chain<\/strong>\u2019 and the various sub-accounts.\u00a0\u00a0<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<p>Your <strong>seed phrase<\/strong> is used for backing up and recovering your wallet, most commonly with a hardware device (cold wallet).\u00a0 The seed phrase represents the<strong> master key pair<\/strong> which includes the <strong>extended private key (XPRIV)<\/strong> and <strong>extended public key (XPUB).<\/strong>\u00a0\u00a0<\/p>\n<p><strong>XPRIV <\/strong>generates new private keys while <strong>XPUB<\/strong> is used to display the balances of each public key in your wallet for each different crypto account.\u00a0\u00a0<\/p>\n<p>In essence, your <strong>seed phrase<\/strong> secures the <strong>extended private key<\/strong> which is used to generate a pseudononympus identity for every public address (key pair) you create inside the wallet used to send or receive Bitcoin (or other crypto).<\/p>\n<p><em>You DO NOT need to generate a unique backup recovery seed for the different crypto blockchains (Bitcoin, Ethereum) or their (sub)accounts (addresses) stored on the HD Wallet thanks to the BIP32 deterministic method of deriving key sets\u2026<\/em><br \/><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fblog.stratus.io%2Fhow-to-create-secret-bitcoin-wallets-with-passphrases%2F&amp;text=You%20DO%20NOT%20need%20to%20generate%20a%20unique%20backup%20recovery%20seed%20for%20the%20different%20crypto%20blockchains%20%28Bitcoin%2C%20Ethereum%29%20or%20their%20%28sub%29accounts%20%28addresses%29%20stored%20on%20the%20HD%20Wallet%20thanks%20to%20the%20BIP32%20deterministic%20method%20of%20deriving%20key%20sets%E2%80%A6&amp;via=StratusBTC&amp;related=StratusBTC\" target=\"_blank\" rel=\"noopener\">Click To Tweet<\/a><\/p>\n<p><strong>Private keys<\/strong> are used to derive a <strong>public key<\/strong> but <strong>public keys <\/strong>CANNOT be used to derive a <strong>private key.\u00a0\u00a0<\/strong><\/p>\n<p>In a Bitcoin transaction, a <strong>ScriptPubKey<\/strong> \u2018locks\u2019 bitcoin to the <strong>receiver\u2019s address<\/strong> which is a hash (shortened version) of the receiver\u2019s <strong>public key.\u00a0\u00a0<\/strong><\/p>\n<p>For example, Pay-to-Public-Key-Hash<strong> (P2PKH) <\/strong>is the most common \u2018<strong>locking script<\/strong>\u2019 compared with an alternative, Pay-to-Public Key <strong>(P2PK).\u00a0 <\/strong>P2PK locks bitcoin to a <strong>public key<\/strong> and P2PKH locks bitcoin to a <strong>hash<\/strong>, or shortened version, of the public key.\u00a0<\/p>\n<p>The <strong>permissionless<\/strong> nature of most blockchains (Bitcoin, Ethereum) enables the end user to safely and autonomously migrate all crypto accounts in their wallet<strong> <\/strong>to different wallet providers using the same original 12 \u2013 24 word backup recovery seed.\u00a0<\/p>\n<p><strong>Pro Tip: <\/strong>If you are using a recovery seed to migrate from one wallet provider to another (ie Ledger to ColdCard), make sure you confirm that the new wallet provider supports all of your cryptocurrency accounts (Ethereum, Bitcoin, Filecoin etc).<\/p>\n<h2 class=\"wp-block-heading\"><strong>How to create a BIP 32 Deterministic Key<\/strong><\/h2>\n<p><strong>BIP32 HD wallets<\/strong> allow keys to be organized in a hierarchical, multi-level tree structure to send and receive from an unlimited number of different wallets and accounts (sub-accounts) under a single HD Wallet.\u00a0\u00a0<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<p>The (1) Seed Phrase represents the (2) Master Key \u2013 Extended Private Key with an extra 256 bits of entropy\/randomness to create (3) Child Keys and even (4) Grandchild Keys.\u00a0<\/p>\n<p>HD Wallets (Type 2) were introduced via the Bitcoin Improvement Proposal #32 (<strong>BIP32<\/strong>) in 2012 to improve privacy &amp; usability as an alternative to<strong> <\/strong><a href=\"https:\/\/bitcoinwiki.org\/wiki\/bitcoin-qt\" target=\"_blank\" title=\"\" rel=\"noopener\"><strong>Bitcoin Core \u2018Qt\u2019<\/strong> <strong>Wallets<\/strong><\/a> which required physical private key backups or hard drive storage on your computer (filename: <strong>wallet.dat<\/strong>) for every address key pair you manage.\u00a0\u00a0<\/p>\n<p>With HD Wallets, you can always generate the same set of keys from the <strong>extended master private key<\/strong> without ever revealing the corresponding private keys.\u00a0\u00a0<\/p>\n<p>The only limitation imposed is related to the available storage (~1.5MB) available on a specific hardware wallet and varies depending on the manufacturer.<\/p>\n<p>You can <a href=\"https:\/\/bip32jp.github.io\/english\/\" target=\"_blank\" title=\"\" rel=\"noopener\">try it for yourself <\/a>using this Deterministic Key Generator tool.<\/p>\n<p><strong>Step 1<\/strong>:\u00a0 Follow the instructions to enter your entropy, which is a mathematical word for randomness.\u00a0\u00a0<\/p>\n<p>For example, you could roll a 6 sided dice 53 times and enter the result in order after each roll.\u00a0\u00a0<\/p>\n<p>You could also flip a coin 53 times, entering \u20181\u2019 for heads and \u20182\u2019 for tails to create your own randomness (entropy).<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<p><strong>Step 2<\/strong>: (optional) enter an \u2018optional password\u2019 commonly referred to as a password or <strong>passphrase<\/strong>.\u00a0\u00a0<\/p>\n<p><strong>Step 3<\/strong>: Select whether you want a 12 or 24 word BIP39 phrase (seed phrase\/recover seed) and click \u2018Generate New Phrase\u2019.<\/p>\n<p>Voila!\u00a0 After some complicated behind the scenes hashing, salting, and checksum operations you just created a new Bitcoin address with the corresponding public and private key pair.\u00a0\u00a0<\/p>\n<p>The backup phrase provided was generated from the <a href=\"https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0039\/english.txt\">BIP39 word list <\/a>which corresponds to a numeric number converted from the output of the key generator which uses entropy.<\/p>\n<p><strong>Step 4<\/strong>: (optional) Scroll down the page, select <strong>\u2018External account (master)\u2019<\/strong> from the <strong>Derivation Path<\/strong> dropdown.\u00a0 Examples below:<\/p>\n<p>Path m\/0 = The first (0) child private key derived from the master private key (m)<\/p>\n<p>Path m\/0\/0 = The first grandchild private key derived from the <strong>first child<\/strong> (m\/0)<\/p>\n<p>Path m\/1\/0 = The first grandchild private key derived from the <strong>second child <\/strong>(m\/1)<\/p>\n<p>The <strong>Account<\/strong> (k) field is where you can enter a number to represent an additional key pair.\u00a0\u00a0<\/p>\n<p>We can enter the number 3 to generate the (public\/private) key pair for the third Bitcoin address in our HD wallet.\u00a0 This is the logic that cold wallet device manufacturers like Trezor and Ledger use to generate new, pseudonymous addresses that are not publicly connected but stored within the same wallet.\u00a0 Here\u2019s a link to their <a href=\"https:\/\/developers.ledger.com\/docs\/device-app\/psd\/keys\" target=\"_blank\" title=\"\" rel=\"noopener\">documentation<\/a>.<\/p>\n<p>The example below displays the public and private keys generated based on the account number I enter.\u00a0\u00a0<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<p><strong>Note: <\/strong>Notice how the \u2018BIP 32\u2019 <strong>Extended Key<\/strong>, at the top of the image, DOES NOT change.\u00a0\u00a0<\/p>\n<p>With HD Wallets, the public and private key pairs are generated from an <strong>extended master private key<\/strong> which can be unlocked\/restored with a 12 \u2013 24 recovery seed phrase that you must backup and keep secure.\u00a0<\/p>\n<p><strong>Pro Tip: <\/strong>Generating a <strong>paper wallet<\/strong>, like the example above, is not our recommendation because using an <a href=\"https:\/\/bitcointalk.org\/index.php?topic=1013586.0%3Ball&amp;ref=stratus.io\" target=\"_blank\" title=\"\" rel=\"noopener\">online key generator introduces risk<\/a> (keylogger, bad actor, malware).\u00a0 You could opt to use a more advanced, secure, and self-contained (air-gapped) option following <a href=\"https:\/\/gist.github.com\/atoponce\/44d50f0bbcd06811c8c8eeef13b79585\" target=\"_blank\" title=\"\" rel=\"noopener\">these instructions<\/a> (<a href=\"https:\/\/armantheparman.com\/dicev2\/\" target=\"_blank\" title=\"\" rel=\"noopener\">alternative<\/a>) or allow your wallet provider to generate the <strong>private key<\/strong> (and recovery seed).<\/p>\n<h2 class=\"wp-block-heading\"><strong>What\u2019s the chance of generating the same private key as someone else?<\/strong><\/h2>\n<p>A <strong>private key<\/strong> is just a number that can be randomly generated like we just showed in the example above.\u00a0\u00a0<\/p>\n<p>Technically, someone could accidentally generate the same BIP39 recovery seed when they are setting up a new wallet.\u00a0 This is called <strong>key collision.<\/strong><\/p>\n<p>The chances of generating the same private key as someone else is 2^256 which is approximately 10^77 <\/p>\n<p><strong>Nerd alert<\/strong> \u2013 2^256 (1.15 quattuordecillion) = 1.157920892373162e+77 = 115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,665,640,564,039,457,584,007,913,129,639,936<\/p>\n<p>For example, let\u2019s assume that Bitcoin goes through a <strong>mass adoption<\/strong> and at some point in the future there are <strong>10 TRILLION<\/strong> addresses (currently ~500 Billion w\/ only <a href=\"https:\/\/buybitcoinworldwide.com\/how-many-bitcoin-users\/\" target=\"_blank\" title=\"\" rel=\"noopener\">30 Million<\/a> holding Bitcoin).\u00a0 So, 30 Million to 10 Trillion is a HUGE leap, but let\u2019s keep at it.\u00a0 If those 10T addresses were evenly distributed, there would still be gaps of 10^64 between each.\u00a0 Remember we started with 10^77 as the total number of possible addresses.\u00a0\u00a0<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<p>Your private key is statistically impossible for someone or some quantum computer to guess in the next 10^23 millennia because the number of combinations is comparable to the quantity of atoms in the universe.\u00a0<\/p>\n<p>So, you\u2019re saying there\u2019s a chance.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Bitcoin Wallet Passphrases<\/strong><\/h2>\n<p>Buttcoiners and FUD-spreaders are happy to talk about hacking, stealing, scamming or even accidental \u2018<strong>key collision\u2019<\/strong> resulting in an unauthorized party having access to your coins because they have your <strong>recovery seed<\/strong>.<\/p>\n<p>Technically someone <em>could<\/em> generate the same private key on the first guess.\u00a0 Unlikely, but possible.\u00a0<\/p>\n<p>Or maybe you fell victim to a phishing attack or clicked a bad link.\u00a0\u00a0<\/p>\n<p><strong>Pro Tip: Never.\u00a0 Never ever. Never ever type in your seed phrase on ANYTHING other than a cold storage device.\u00a0 Your hardware wallet\u2019s sole purpose is to be the ONLY thing that can safely accept your recovery seed.\u00a0 If you have any questions, ask us at <\/strong><a href=\"mailto:team@stratus.io\" target=\"_blank\" title=\"\" rel=\"noopener\"><strong>team@stratus.io<\/strong><\/a><strong> and remember that we will not ask for your seed.\u00a0\u00a0<\/strong><\/p>\n<p>Passphrases are optional and add additional data to the <strong>master seed<\/strong> before the <strong>extended private key <\/strong>is generated.\u00a0\u00a0<\/p>\n<p>Adding a passphrase to your randomly generated <strong>private key<\/strong> is the easiest way to protect your wallet from <strong>key collision<\/strong> with the drawback of having one additional word or number to backup and keep secure.<\/p>\n<p>With a 13th or 25th word BIP-39 passphrase, If someone acquired your seed through hacking or happenstance, they would need <strong>both your backup recovery seed + your passphrase<\/strong> to access your passphrase-secured accounts.<\/p>\n<p>By default, every wallet uses a \u2018blank\u2019 passphrase.\u00a0 Adding a passphrase replaces the default \u2018blank\u2019 placeholder with a \u2018string\u2019 (case sensitive letters\/words\/numbers) that replaces the default \u2018blank\u2019 passphrase field.<\/p>\n<p>A <strong>passphrase <\/strong>offers the greatest value by adding an additional layer of security if your <strong>seed phrase<\/strong> is discovered or accidentally revealed to someone.\u00a0<\/p>\n<p><strong>Pro Tip: <\/strong>A \u2018passphrase\u2019 and \u2018<a href=\"https:\/\/www.blockplate.com\/blogs\/blockplate\/what-is-a-bip39-passphrase\" target=\"_blank\" title=\"\" rel=\"noopener\">BIP-39 Passphrase<\/a>\u2018 are used interchangeably.  A passphrase option is available on BIP-39 compatible wallets which use the list to generate your 12\/24 word recover seed.  However, <span>your passphrase is NOT limited to one of 2,048 words the BIP-39 list<\/span> and we strongly encouraged you to use, backup and secure a unique alphanumeric passphrase.<\/p>\n<h2 class=\"wp-block-heading\"><strong>How do I set up and recover a passphrase wallet?<\/strong><\/h2>\n<p>Depending on the requirements of the wallet provider, a <strong>passphrase<\/strong> is CaSe sensitive and can be any combination of numbers, letters, and symbols.\u00a0 Common words <em>could <\/em>be brute forced, so consider adding randomness using 12 upper\/lowercase letters and numbers.\u00a0 Some providers may present an option to select a word from the predefined list of <a href=\"https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0039\/english.txt\" target=\"_blank\" title=\"\" rel=\"noopener\">2,048 BIP-39 word list<\/a>.\u00a0\u00a0<\/p>\n<p>You\u2019ll need to decide if simplicity (memorable passphrase) is more important than advanced security (random words\/numbers).\u00a0\u00a0<\/p>\n<p>Passphrases DO NOT get stored on your device.\u00a0 Your wallet will combine the <strong>recovery seed<\/strong> + <strong>passphrase <\/strong>to create a new, unique passphrase-secured <strong>private\/hidden<\/strong> wallet.\u00a0 For exmample:<\/p>\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group__inner-container\">\n<p>Wallet A = recovery seed + {default empty passphrase}<\/p>\n<p>Wallet B = recovery seed + passphrase1<\/p>\n<p>Wallet C = recovery seed + passphrase2<\/p>\n<p>Wallet D = recovery seed + passphrase3<\/p>\n<\/div>\n<\/div>\n<p>If someone generated the same <strong>private key<\/strong> by rolling dice or flipping a coin, your <strong>passphrase enhances<\/strong> your entropy by adding an additional word (or number) that can\u2019t be randomly generated.\u00a0\u00a0<\/p>\n<p><strong>Pro Tip<\/strong>: Best practice is to store your passphrase separately from your backup recovery seed when you self-custody your bitcoin.\u00a0 Even if you have your recovery seed accessible, if you lose (or forget) your passphrase, you will lose your coins!<\/p>\n<p>Accessing your hidden\/secret wallets to make a transaction is as easy as accessing your standard wallet then entering your passphrase in where prompted.\u00a0\u00a0<\/p>\n<p>If you enter the wrong passphrase, your wallet is NOT able to tell you that it\u2019s incorrect because technically there are no <em>wrong<\/em> passphrases.\u00a0 If you enter the wrong passphrase, a NEW hidden\/secret wallet will be created for use.\u00a0 You will need to reset and try again if your passphrase entry does not access the wallet you expected.\u00a0\u00a0<\/p>\n<p>The only way to know if you entered the correct passphrase is by the contents of the wallet funds.\u00a0\u00a0<\/p>\n<p>You may be wondering, how can I reset or change my passphrase?\u00a0 You can\u2019t reset or change your passphrase.\u00a0 Each passphrase you enter accesses a different wallet.\u00a0 If you want to use a different passphrase, then generate a new passphrase wallet and send bitcoin to this wallet.<\/p>\n<p>For example, if you use <a href=\"https:\/\/www.youtube.com\/watch?v=QsIvndsFzOY\" target=\"_blank\" title=\"\" rel=\"noopener\">Trezor watch this video <\/a>showing how to create hidden wallets and use 3rd party apps like MetaMask or hardware devices like <a href=\"https:\/\/coldcard.com\/docs\/passphrase\/\" target=\"_blank\" title=\"\" rel=\"noopener\">ColdCard with a passphrase<\/a>. <\/p>\n<h2 class=\"wp-block-heading\"><strong>Can I use a second PIN as a passphrase?<\/strong><\/h2>\n<p>On some devices, like Ledger, you can create a <a href=\"https:\/\/support.ledger.com\/hc\/en-us\/articles\/115005214529-How-to-set-up-a-passphrase-?docs=true\" target=\"_blank\" title=\"\" rel=\"noopener\">second PIN<\/a> for your hardware wallet that uses a PIN to unlock a specific passphrase protected secret wallet.\u00a0 Entering the second PIN accesses the hidden accounts.\u00a0\u00a0<\/p>\n<p>On a Ledger wallet device, you have two options for the <strong>second PIN passphrase:<\/strong><\/p>\n<p><strong>Attach to Pin<\/strong>: Your device has a standard non-passphrase wallet accessible by your primary PIN.\u00a0 If you turn your device off, then back on and enter the <strong>secondary PIN<\/strong>, your device will allow you to manage your hidden wallets.<\/p>\n<p>With Attach to Pin you selected from the device menu, confirm your secondary PIN then confirm a passphrase.\u00a0 You still have a passphrase, but don\u2019t have to enter it because the PIN serves as a proxy for the passphrase.<\/p>\n<p>You can only create <strong>one (1) secondary PIN<\/strong> if you select the Attach to Pin.\u00a0 Creating a separate passphrase attached to a PIN overrides the first PIN code + passphrase combination.\u00a0 You can still access the overwritten secret wallet by recovering the wallet with a seed and the original passphrase.\u00a0\u00a0<\/p>\n<p><strong>Set as Temporary: <\/strong>A temporary passphrase generates new accounts on your device for the remainder of the session.\u00a0 When you turn your wallet off then back on, navigate to the <strong>passphrase menu<\/strong> and click \u2018set secret passphrase.\u2019\u00a0 If you want to access a passphrase wallet, enter the passphrase then your <strong>primary PIN<\/strong> to validate.<\/p>\n<p>Note: This does not assign a PIN to the passphrase like the \u2018attach to PIN\u2019 option.\u00a0\u00a0<\/p>\n<h3 class=\"wp-block-heading\"><strong>Generating a Private Key with Passphrase Example: <\/strong>\u00a0<\/h3>\n<p>When we created the master keys in the previous example, we were provided with a recovery seed, private key, public key, public address and an extended key (XPRIV).\u00a0<\/p>\n<p><strong>12 word recovery seed<\/strong>: <em>banana code hard debate vague ecology mistake sick present prepare nasty manage<\/em><\/p>\n<p><strong>Private Key (WIF*)<\/strong>: L2qM2hSYeC9TW9LhUwtzQMHhaKzeyoNULmuzDQkaiynVaDyByDtR<\/p>\n<p>*WIF \u2013 \u201cwallet import format\u201d is the standard alphanumeric private key format.\u00a0\u00a0<\/p>\n<p><strong>Public Key (hex)<\/strong>: 02054f43aa816fe14d4d38a3c01af02844b0366aad8e7a6865780c57062269e05b<\/p>\n<p><strong>Public Address:<\/strong> 1EGxUj4NEuXyWoKfGPGhhCHbWAv6LrL5xP<\/p>\n<p><strong>Extended Key:\u00a0<\/strong><\/p>\n<p>xprv9s21ZrQH143K3FUHuKDbffdt4TYNYigit28odBvz9HZ2QZdu6rybiqDVxpUYoyudsv9tebfY2iJmZke6LDR3EeaVVTQBH3ZgbTBmsTM8wyH<\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<p>Adding a Passphrase \u201cbtc\u201d to the backup recovery seed generated a new private key, public key, public address and an extended key (XPRIV).<\/p>\n<p><strong>Extended Key with Passphrase: <\/strong>xprv9s21ZrQH143K3QaGxe5JD5rgtHdQmvLZMxM6LBGwgDYEX7jDLXxkjPyV2bsM6RNe8eE8uqicqWRmRoqTF7GkJzmoss64Ua1M92SkVRE8bML<\/p>\n<p>It\u2019s like having a completely different wallet with an infinite number of addresses and backed up with the same <strong>recovery seed<\/strong>.\u00a0 Adding a 25th word passphrase creates an entirely NEW wallet with an infinite number of addresses and backed up with the <strong>same recovery seed + passphrase.<\/strong><\/p>\n<p>This is the beauty of deterministic wallets which use cryptography to easily derive secure keys to transact with.\u00a0 Prior to HD wallets, every time you created a new address you were given a new recovery seed to backup to recover the wallet.\u00a0\u00a0<\/p>\n<h2 class=\"wp-block-heading\"><strong>HD Wallet Privacy\u00a0<\/strong><\/h2>\n<p>New key pairs can be derived for each transaction which helps to keep your transactions more private compared to using the same key pair every time you send or receive Bitcoin.\u00a0\u00a0<\/p>\n<p>The organizational structure of HD Wallets increases privacy, compared to non deterministic, because if \u2018branch A\u2019 is used to receive Bitcoin, \u2018branch B\u2019 is used to receive Bitcoin a change outputs within the same wallet.\u00a0\u00a0<\/p>\n<p>Another major privacy benefit for HD Wallets is being able to generate and use <strong>different<\/strong> <strong>public keys<\/strong> in transactions <strong>received<\/strong> while eliminating the need to provide the corresponding <strong>private key.<\/strong><\/p>\n<p>The Bitcoin blockchain is a public network.\u00a0\u00a0<\/p>\n<p>Re-using an address allows anyone with a <a href=\"https:\/\/www.blockchain.com\/explorer\" target=\"_blank\" title=\"\" rel=\"noopener\">blockchain explorer<\/a> to view your transaction history and balance.\u00a0\u00a0<\/p>\n<p>Many HD Wallet hardware devices are programmed to generate a new address for every transaction.\u00a0\u00a0<\/p>\n<p>The addresses (key pairs) are maintained within your wallet under the same account while being publicly disassociated from each other on the network thanks to the <strong>extended public key <\/strong>(XPUB).\u00a0\u00a0<\/p>\n<p><strong>Pro Tip: <\/strong>multiple passphrases can also be used to categorize different wallets depending on the transaction type for each.\u00a0 For example: Passphrase A for your <a href=\"https:\/\/stratus.io\/blog\/dollar-cost-averaging-bitcoin\/\" target=\"_blank\" title=\"\" rel=\"noopener\">Dollar Cost Averaging<\/a> (cap gains tax reporting).\u00a0 Passphrase B for sending\/receiving with friends or family.\u00a0 Passphrase C for merchant transactions. \u00a0 <strong>EVERY passphrase needs to be backed up separate from each other and your recovery seed!!<\/strong><\/p>\n<h2 class=\"wp-block-heading\"><strong>HD Wallet Security<\/strong><\/h2>\n<p>You should have a plan for <a href=\"https:\/\/stratus.io\/blog\/best-places-to-hide-your-cold-wallet\/\" target=\"_blank\" title=\"\" rel=\"noopener\">backing up and safely storing your recovery seed<\/a> to prevent unauthorized access to your wallet(s).<\/p>\n<p>Being in your own bank means that you are free to manage a personal <a href=\"https:\/\/stratus.io\/blog\/crypto-risks-and-security-basics\/\" target=\"_blank\" title=\"\" rel=\"noopener\">strategy for Crypto Operational Security<\/a>.<\/p>\n<p><strong>Hardware wallets<\/strong> store your keys offline and even protect your keys and crypto if you plug your cold wallet into a computer infected with malware.\u00a0\u00a0<\/p>\n<p>Most cold storage devices require you to enter a 4-8 numeric <strong>Pin<\/strong> (<strong>Pin Code)<\/strong> during setup.\u00a0\u00a0<\/p>\n<p>If you want to make a transaction, you must physically <a href=\"https:\/\/stratus.io\/blog\/how-to-recover-your-cold-wallet-with-24-word-seed\/\" target=\"_blank\" title=\"\" rel=\"noopener\">enter the correct <strong>Pin<\/strong> on the hardware device<\/a> to access your accounts.\u00a0\u00a0<\/p>\n<p><strong>Pro Tip: <\/strong>Some wallet manufacturers have a \u2018kill switch\u2019 that wipes your device after a fixed number of incorrect PINs have been entered.\u00a0 If your device is wiped, you can still recover or restore your crypto wallet(s) with your <strong>12-24 word backup recovery seed.<\/strong><\/p>\n<div class=\"wp-block-image\">\n<\/div>\n<p>You must have a safe, discrete and reliable backup strategy to secure your <strong>1)<\/strong> Recovery Seed, <strong>2)<\/strong> Optional Passphrase(s), <strong>3) <\/strong>physical Hardware Device (cold wallet), and <strong>4) <\/strong>Pin\/PinCode.<\/p>\n<p>A <strong>distributed <\/strong>backup strategy is pretty easy to implement and ensures that your <strong>wallet<\/strong> and <strong>passphrase<\/strong> backups are stored at different physical locations.\u00a0\u00a0<\/p>\n<p>You can deploy OpSec tactics like a <strong>honeypot trap<\/strong> to further reduce your risk of losing crypto due to a random <strong>collision event<\/strong>, unauthorized discovery of your physical backup(s), or a malicious 3rd party phishing\/malware hack.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Setting up a Crypto Honeypot Trap Example:\u00a0<\/strong><\/h2>\n<p>On your device, create a new wallet or select an existing wallet. (\u2018Wallet A\u2019)\u00a0<\/p>\n<p>Next, find the setting to add\/create a <strong>passphrase.<\/strong><\/p>\n<p>Enter a new <strong>passphrase <\/strong>or select from the provided list of BIP39 words (if applicable)<strong>.<\/strong>\u00a0 Immediately write down your recovery seed and passphrase which will need to be backed up (separately) ASAP!<\/p>\n<p>A new wallet \u2018Wallet B\u2019 is created and accessible on your device using the <strong>passphrase<\/strong>.\u00a0 Copy the <strong>public address<\/strong> and write this down.\u00a0 Reset your wallet then restore the wallet from the backup seed + passphrase.\u00a0 Compare the public address to ensure they match.\u00a0 Repeat this process when creating new passphrase protected wallets.\u00a0\u00a0<\/p>\n<p>You can create additional passphrase protected wallets (Wallet C, Wallet D).\u00a0 An Extended Public Key (XPUB) is generated for each wallet allowing normal transactions.<\/p>\n<p>Transfer your bitcoin from Wallet A to Wallet B leaving a small amount in Wallet A.\u00a0 <strong>Pro Tip: <\/strong>Taking this up a notch, you can \u2018remove\u2019 <strong>Wallet B<\/strong> <strong>(passphrase) <\/strong>from your wallet provider\u2019s UI (ie \u2013 Ledger Live) if you\u2019re concerned about the unlikely hack-at-home.<\/p>\n<p>Next, set up a <strong>watch-only wallet<\/strong>, like <a href=\"https:\/\/bluewallet.io\/watch-only\/\" target=\"_blank\" title=\"\" rel=\"noopener\">Blue Wallet<\/a>.\u00a0 Provide your public address, xPUB (start w\/ 1), yPUB (starts w\/ 3) or zPUB (starts w\/ bc1).<\/p>\n<p>Create an alert in the watch-only wallet for Wallet A (<strong>honeypot<\/strong>).\u00a0 If any Bitcoin moves out of Wallet A, you know that your <strong>recovery seed<\/strong> <strong>has been compromised<\/strong> though you may still have time to transfer Bitcoin before the bad actor uses brute-force to identify your hidden wallet(s) (Wallet B\/C\/D).<\/p>\n<p>Generate a new set of <strong>master keys<\/strong> and a fresh <strong>recovery seed <\/strong>by creating a new wallet (software or new device) and copy the <strong>public address<\/strong>.<\/p>\n<p>Create a transaction in Wallet B to send your bitcoin balance to the <strong>public address<\/strong> of the new wallet which is secured by the new recovery seed and optional passphrase.\u00a0 This is called <strong>\u2018sweeping\u2019<\/strong> (aka \u2013 <strong>key rotation<\/strong>).\u00a0 The network transactions fees are a small price to pay for peace of mind and an enhanced security protocol.<\/p>\n<p>Repeat steps 1-8 and review your backup strategy identifying if the breach was a) physical discovery of your seed, PIN, and\/or passphrase, b) random collision, c) whether you suspect you\u2019re being targeted with malware or other internet vulnerability and\/or d) on a regular (semi\/annual) basis.\u00a0\u00a0\u00a0\u00a0\u00a0<\/p>\n<p>*<strong>Note: <\/strong>Most wallet providers require you to first create a wallet before adding a passphrase to it. Adding a <strong>passphrase<\/strong> to an existing wallet or new wallet actually creates a <strong>new hidden (secret) wallet<\/strong>. \u00a0 Always refer to your wallet provider\u2019s FAQ\/help to confirm.<\/p>\n<p>The hacker or bad actor (and anyone else) who compromised your account can view the transaction, including the new bitcoin address on a blockchain explorer but they will be back to square one in attempting to crack your new <strong>seed + optional passphrase <\/strong>unless you fail to properly secure your digital and physical environment.\u00a0\u00a0\u00a0<\/p>\n<p>If your new wallet is compromised, it\u2019s safe to assume that you\u2019ve either been physically breached or there is malware installed on your computer.\u00a0 Time to audit and wipe.\u00a0\u00a0<\/p>\n<p>This scenario is not very likely to happen.\u00a0 A <strong>honeypot trap<\/strong> is relatively simple to set up but introduces a vulnerability of losing or failing to secure your <strong>seed and passphrase backups.<\/strong><\/p>\n<p>Do whatever makes you most comfortable and helps you to sleep at night.\u00a0\u00a0<\/p>\n<h2 class=\"wp-block-heading\"><strong>How to Create a Bitcoin Duress Wallet:<\/strong><\/h2>\n<p>Imagine you\u2019re walking out of an airport and get rushed into a car and driven off to an isolated location.\u00a0\u00a0<\/p>\n<p>There\u2019s a great big man holding a wrench and your hardware wallet.\u00a0 He\u2019s going to <a href=\"https:\/\/github.com\/jlopp\/physical-bitcoin-attacks\/blob\/master\/README.md?\" target=\"_blank\" title=\"\" rel=\"noopener\">steal your crypto<\/a>.\u00a0 You have two choices 1) enter your PIN or 2) prepare to get hit with the wrench until you cave in and give him the PIN code anyways.\u00a0\u00a0<\/p>\n<p>You tell him that you lost your coins in a boating accident but he can have whatever is left.<\/p>\n<p>This next step is important.\u00a0 When he hands the device back, enter the PIN for the main wallet you created after reading the next section and completing the setup for your <strong>duress wallet.<\/strong>\u00a0<\/p>\n<p>Reset your device or use a secondary device to create a new wallet (Wallet B) and write down the recovery seed so you can back it up. Generate a receiving address in Wallet B and copy\/paste to use later.\u00a0\u00a0<\/p>\n<p>Next, follow the \u2018Wallet B\u2019s\u2019 instructions to create a new wallet with a passphrase (back this up) which creates a new passphrase protected wallet we\u2019ll call Wallet B-Passphrase. This new wallet is recoverable with the same recovery seed as Wallet B + passphrase.<\/p>\n<p>Generate a receiving address for this passphrase wallet and copy\/paste to use later.\u00a0\u00a0<\/p>\n<p>Pro Tip: test the recovery process and confirm addresses before moving on to the next step and adding Bitcoin to the duress wallet.\u00a0\u00a0<\/p>\n<p>Now is a great time to review and implement this <a href=\"https:\/\/blog.stratus.io\/how-to-consolidate-utxo-guide-best-practices\/\" target=\"_blank\" title=\"\" rel=\"noopener\">UTXO management, consolidation and key rotation strategy<\/a>.\u00a0\u00a0\u00a0<\/p>\n<p>Depending on your personal preference and current wallet setup here are a few options to consider to setup your duress wallet similar to creating a honeytrap:<\/p>\n<p>Option 1) If you\u2019ve completed your UTXO audit and identified the unassociated addresses in Wallet A, you can plan out several smaller transactions at varying times to send to Wallet B\u2019s Address #1.\u00a0 This is the only scenario I\u2019d recommend re-using an address.\u00a0 After the transactions have been confirmed, you can consolidate the UTXOs.\u00a0 Alternatively, create multiple addresses in Wallet B and consolidate those UTXOs.<\/p>\n<p>Option 1) If you have some crypto on an exchange, this is a great opportunity to transfer a small but meaningful amount to your new \u2018main\u2019 non-passphrase address.\u00a0 Consider transferring the majority of your Bitcoin to Wallet B\u2019s passphrase address as long as you have a solid backup process in place.<\/p>\n<p>Option 2) If all of your Bitcoin is in cold storage, transfer some crypto back to an exchange, wait 24 hours then transfer to your new \u2018main\u2019 non-passphrase address.\u00a0 You won\u2019t necessarily be participating in a transaction with the same traceable UTXOs.<\/p>\n<p>Option 3)\u00a0 If your Bitcoin is associated with a wallet that has been publicly associated with your identity or has been used incorrectly by commingling Bitcoin, it\u2019s time to hit the reset button and transfer back to an exchange.\u00a0\u00a0<\/p>\n<p>The downside to washing your Bitcoin with an Exchange transfer is that all the attacker needs to do is force you to log in to an exchange where they can see the addresses you sent or received to\/from.\u00a0 They may have already hacked your email and know that you hold crypto on Binance and Coinbase.\u00a0 Non-KYC exchanges, mixers or P2P transfers are alternatives but be sure to check the laws affecting your jurisdiction.<\/p>\n<p>Make note of which wallet is the decoy.\u00a0 Your primary wallet <strong>should not have the majority of your crypto.<\/strong><strong>\u00a0 <\/strong>Wallet B could be the decoy\/duress wallet with the majority of your Bitcoin stored elsewhere like a passphrase wallet.\u00a0\u00a0<\/p>\n<p>Transfer a small, but meaningful enough amount of crypto in multiple transactions from various wallets to make it look like there\u2019s real activity. (Keep the remaining crypto in other ideally unconnected passphrase wallets)<\/p>\n<p>When forced to hand over the goods, remember to use the correct passphrase for the \u2018duress\/decoy\u2019 wallet which creates plausible deniability of your real holdings.<\/p>\n<p>Even the best laid plans are still susceptible to unknowingly making poor choices for your personal Bitcoin security. The most vulnerable crypto storage scenarios include:<\/p>\n<p>You\u2019re forced to open up your exchange or other mobile wallet app on your iphone and transfer your Bitcoin to the assailant.<\/p>\n<p>Your computer is compromised with malware that infiltrates your browser based wallet.<\/p>\n<p>A <a href=\"https:\/\/blog.stratus.io\/how-to-prevent-and-detect-bitcoin-dust-attacks\/\" target=\"_blank\" title=\"\" rel=\"noopener\">Bitcoin dusting attack<\/a> to dox your identity.<\/p>\n<p>Accidentally blind signing a smart contract and getting your wallet drained.\u00a0<\/p>\n<p>Losing your <a href=\"https:\/\/stratus.io\/blog\/how-to-recover-your-cold-wallet-with-24-word-seed\/\" target=\"_blank\" title=\"\" rel=\"noopener\">Bitcoin backup recovery seed<\/a> because you outsmarted yourself.<\/p>\n<p>Hidden wallets with passphrases on cold storage devices offer reliable protection against attack as long as you keep them secret and maintain a backup recovery plan.\u00a0\u00a0<\/p>\n\n\n<p>Note: Stratus does NOT provide investment, legal or tax advice.\u00a0 All information in this article is for educational purposes and should not be interpreted as investment, legal or tax advice.\u00a0 The opinions expressed are those of the author for informational purposes and neither Stratus nor the author are liable for any errors, inaccuracies or omissions.\u00a0 Digital assets, such as cryptocurrencies or decentralized finance, present unique risks for investors.\u00a0 For investment, legal, tax, or other financial guidance you should consult your own advisor.\u00a0\u00a0<\/p>\n<p>The post <a href=\"https:\/\/blog.stratus.io\/how-to-create-secret-bitcoin-wallets-with-passphrases\/\">How to Create Secret Bitcoin Wallets with Passphrases<\/a> first appeared on <a href=\"https:\/\/blog.stratus.io\/\">Stratus Crypto<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Modern HD Wallets enable the wallet owner to create an infinite number of secret wallets backed up with one single recovery seed plus the 25th word passphrase.\u00a0\u00a0 Hierarchical Deterministic wallets, also called HD Wallets, were introduced as part of the Bitcoin Improvement Proposal #32 (BIP 32).\u00a0 Key Terms HD Wallet Passphrases: BIP: Short for Bitcoin [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":113903,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-113902","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/113902"}],"collection":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=113902"}],"version-history":[{"count":0,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/113902\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/media\/113903"}],"wp:attachment":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=113902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=113902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=113902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}