Did the version you have running on your test wallet manage to find the password?
Yes!
Would anyone happen to know what I would change in the scrypt below so that it would check for between 1 and up to 3 missing characters?
The reason I'm thinking this may be the problem is, I'm using a wireless keyboard and sometimes when typing if your sat in the wrong place the keystrokes aren't always picked up.
# delete one char
passphrase.length.times do |i|
testphrase = passphrase.dup
testphrase = testphrase[0,i] + testphrase[(i+1)..-1]
list << testphrase
end
Thanks
Checking for three missing characters will force the program to try an almost
incomprehensibly high number of solutions, since those characters could appear anywhere in the password. Even if such a script exists, I think you'd be looking at several months of constant bruteforcing before it found a password.
Did it try all combinations for your password?