Rename folders and files
This commit is contained in:
parent
29874443e8
commit
064ef4eed0
|
@ -1,5 +1,5 @@
|
|||
# Mersenne Twister 32 bit seeding | bx PRNG consumption pattern | BIP39
|
||||
# Mersenne Twister 32 bit seeding => bx PRNG consumption pattern
|
||||
|
||||
See https://milksad.info/disclosure.html for 32 bit to 8 bit output truncation PRNG consumption pattern details.
|
||||
|
||||
The `libbitcoin-explorer` tool `bx` is very flexible and can create BIP39 and non-BIP39 keys of different key sizes. However, there may be other vulnerable software which does so.
|
||||
The `libbitcoin-explorer` tool `bx` is very flexible and can create BIP39 and non-BIP39 keys of different key sizes. However, there may be other vulnerable software which creates the same weak keys.
|
|
@ -15,8 +15,6 @@ See also:
|
|||
|
||||
### Hashed Mnemonic Seed of Discovered Wallets
|
||||
|
||||
File: `cakewallet_weak_bitcoin_seeds_hashed_sorted_version1_2023_11.txt`
|
||||
|
||||
A collection of hashes over the mnemonic secrets for all vulnerable wallets we discovered at the time of data set creation.
|
||||
|
||||
* Creation date: around 2023-11-24
|
||||
|
@ -36,6 +34,6 @@ The example is a valid mnemonic but was unused at the time, and is therefore not
|
|||
|
||||
#### Publication Details
|
||||
|
||||
We provided this data set to the `Cake Wallet` vendor on 2023-11-24 for public adoption into patched new app versions. The data allows for client-side checks in the application to spot and warn of a continued use of known-vulnerable wallets.
|
||||
We provided the 11/2023 version of this data set to the `Cake Wallet` vendor on 2023-11-24 for public adoption into patched new app versions. The data allows for client-side checks in the application to spot and warn of a continued use of known-vulnerable wallets.
|
||||
|
||||
They merged it via https://github.com/cake-tech/cake_wallet/pull/1238/files on 2023-12-18.
|
Loading…
Reference in New Issue