Cryptography & Encryption

Ethereum Account Generation & How MyCrypto Gets Entropy

MyCrypto uses the window.crypto method which is a cryptographically secure pseudo-random number generator. It does not matter if you are online or offline. A key will not be generated if this method is not supported by a particular implementation or if something fails during the initialization of the crypto method. In our opinion, it is more secure to generate a key using only this method instead of adding complexity and opening ourselves up to failures or half-failures by combining different…

Read More

How Do Secret Recovery Phrases Work?

A Secret Recovery Phrase , mnemonic phrase , or Seed Phrase is a set of typically either 12 or 24 words, which can be used to derive an infinite number of accounts. Often times these phrases are used by cryptocurrency hardware wallets, to be written down on a piece of paper by the user to safely back up the users' funds. For example, a 12 word Secret Recovery Phrase looks like this: Sometimes these are referred to as recovery phrases , seed phrases , or 12-word phrases by other wallets…

Read More

On Keypairs & Encryption

The Ledger (and other hardware wallets) are essentially USB sticks but with really really really really really really hardcore software / firmware / hardware that makes it so your key cannot be accessed or moved, even if your computer is compromised. With a regular USB drive, 1337 h4x0r can pull crazy maneuvers to get the info from it via hardware alone, watching the read / writes, or simply searching for your private key, Secret Recovery Phrase, or keystore file on the USB drive. Ledger…

Read More