Just a little additional explanation, not an official hint to solve the puzzle
I've been using
PassCard to manage my strong passwords for over 8 years (with two or three versions iterated in that time). These passwords are used to sign up for various websites or services, and that's odd, I never thought of saving seed phrases in this way (considering I've been into bitcoin mining for 13 years now).
A chance encounter made me want to share my approach to password management, and I've even written an article about this approach, which I call the "
Rule-Based Multi-Table Substitution Strong Password Management Method and Tool". In that article I compare the password management tools available on the market and give a lot of examples to illustrate what the "rule-based" approach is. I claimed that the security of passwords depends on the security of the rules, not the substitution tables. Even if the information on the PassCard is made public, it still doesn't compromise the security of all my passwords, and even if it is coupled with one password compromised by a phishing attack, it doesn't compromise the security of other passwords with the same rules and the same substitution table.
I realize I may have blown it a bit.Using it myself is one scenario, and letting more people use it is another, the attack exposure increases so many times that I need to perform a more extensive security validation for the sake of prudence, but haven't been able to come up with a proper test plan.
Just about 1 month ago, I happened to see
Asanoha's nostr post on the Seed Cipher, which I think is a tool/artifact related to seed phrase encryption, and he then launched a Puzzle challenge. By the way, that was a brute force cracking challenge that still has no challenger declared successful, anyone interested can learn about it from
this link.
That inspired me, but there are still some differences between passwords and seed words, at the most basic level, (BIP39) seed words are limited to a 2048 word dictionary, and even including SLIP39 and Electrum, there are only 3210 selectable words, which makes brute force cracking considerably less difficult. In order to make rule-based multi-table substitution encryption work for seed words, I've made a simple upgrade to the
CipherCard, which makes the two cards you just saw very different from the stainless steel one I had in my poket, and a new set of two cards (laser-cut + laser-engraved) is being customized to be received very soon, I think.
So I decided to put up 0.1 BTC to start this challenge, I'm not sure if that reward is attractive enough, after all there are hundreds of BTC worth of challenges out there. Let's see, maybe I'll pump more prizes into the pool, maybe someone else will offer a sponsorship to the pool, maybe this challenge will only survive for a week or two before it's cracked, who knows?
I just hope this challenge lasts a little longer, because I need time to update my article, add chapter about seed phrases, and also replace the pictures in the article with pictures of the new CipherCard so that all the examples I've given will need to be rewritten based on the new CipherCard as well.
As I said, security depends on the rules, not the information on the card, and even if this challenge is solved, it only means that the rules I set were too simple, and maybe I'll re-initiate a more difficult challenge with more complex rules while offering higher prizes, who knows?
If luck isn't on the challenger's side, I think I'll offer to end the game at some point, reveal the real method, share the revised and finished article to make this kind of method available to everyone for free, And maybe a little extra bonus for some of the active challengers/sponsors, who knows?