Thanks for all the replies. I'm not too worried about my reddit account. I was just surprised that it was banned as soon as I posted *on my own account page* about bitcoin recovery services.
To answer some questions:
- No, I have not cracked my own password yet. I've tested the software, and it's generating passwords the way I intend it to. I'm doing small runs of 5-10 billion passwords, and modifying the parameters after each run. The password is 20-30 characters long, so doing a straight brute force is impossible. I'm afraid I might not ever find it, but it isn't because my software isn't working.
- The way my password recovery tool works depends on knowing pieces of the password and possible variations. It's probably not any better than other proprietary services, but it's better than anything I've found on the public internet. I'm a programmer, and trying to explain how the pieces of my password fit together felt like writing a program. So I did that instead of using a wallet recovery service. In the process I created a language/format for specifying pieces of a password with varying probabilities, and generating the ones with the highest probabilities first.
- This is currently a closed source tool for a few reasons. Without documentation, it would be completely unusable to anyone else. The translation of a password guess description into the domain specific language that the tool uses would take a bit of work and deep knowledge of how the tool works. The infrastructure to set up the password cracking would be expensive and complex. It's not just a program running on one machine. Also, I've put a lot of work into it, and I don't feel like just giving it away at the moment. Yes, I have contributed to other open source projects.
- Regarding the password hash, ABCbits is correct. The password is stored as a hash, and if you know the algorithm to generate the hash, you run as many passwords as you want through that algorithm to see if you get a match. It's a completely different thing than the private keys. I made a guide for extracting the hash on windows without having to deal with installing anything. I'll probably post that when I find the appropriate place on the board.
I'm planning on making a post to the services board with a better write-up. Thanks for the advice and feedback. I probably need to make it clear that it's not a service to brute-force an unknown password, but a specialized algorithm for testing the best passwords based on some known information. In the meantime, if anyone wants to send me an empty wallet hash, feel free.