Search content
Sort by

Showing 11 of 11 results by Maverick Zeng
Post
Topic
Board Bitcoin Discussion
Topic OP
A Preliminary Concept for RNG- and Physical-Trace-Resistant Private Keys
by
Maverick Zeng
on 15/08/2025, 13:15:21 UTC
This is an experimental security framework for private keys, designed to fundamentally address two chronic weaknesses in crypto asset protection: single-point trust and physical trace leakage.
It is not a simple “brain wallet” — instead, it combines decentralized entropy sources with a non-linear memory model to achieve unprecedented resilience.


---

Layer 1: Eliminate All Physical Traces & Attack Surfaces

This is the cornerstone of the mechanism. The private key’s generation and storage leave no tangible footprint — no hardware, no paper, no digital file. All critical elements (anchors, non-linear rules) exist only in your memory.
As a result, no form of physical theft, scanning, duplication, or disaster can compromise your key. Physical attack vectors are cut off at the root.


---

Layer 2: Decentralized Entropy Sources (Immune to RNG Attacks)

This framework completely abandons reliance on any random number generator (RNG), whether software-based or hardware-based.
Entropy comes from three unique, non-public real-world memory anchors — for example:

Tom’s full legal name

His partner’s full legal name

His neighbor’s daughter’s full legal name


These are combined under personal rules only you know. By shifting entropy from algorithmic RNGs to unverifiable human memory, the design eliminates the entire class of RNG backdoor or seed-prediction attacks.


---

Layer 3: Non-Linear Memory Model (Immune to Social Engineering)

Even if an attacker somehow guesses all three anchors, they still can’t reconstruct the private key.
Why? The combination rule is non-linear — e.g., “first 32 bits of key A + last 32 bits of key B”.
One anchor has no correlation with the other two, and all known fragments are scrambled and reassembled into a key structure impossible to reverse-engineer through brute force permutations.


---

Layer 4: Multi-Signature (Immune to Single Point Failure)

Each of the three individuals generates a base private key from their full name. Then:

Tom + partner = Key 1

Tom + neighbor’s daughter = Key 2

Partner + neighbor’s daughter = Key 3


These three keys (x, y, z) form a 3-of-3 multisig address, ensuring that no single party can act alone.


---

Layer 5: Social-Engineering Immunity

The mechanism leverages private, inaccessible human memory as its defense wall.
Any attempt to deduce the key through public records, relationships, or surveillance is futile — the anchors and the rules live only in your mind, not in any external data source.


---

Layer 6: Maximum Censorship Resistance

This is the endgame. Against state-level asset seizure or search warrants, the absence of physical evidence means the private key cannot be confiscated.
As long as your memory is intact, no external force can seize control of your assets. This is the ultimate form of personal financial sovereignty.


---

Operational Safety: Air-Gapped Signing

To keep transaction-time security equal to key-generation security, the model includes:

Air-gapped devices for signing

Offline authorization workflows

Avoidance of risks from software/hardware vendors



---

The Core Philosophy Grin

> “If I exist, the key exists. If I am gone, the key disappears.”



True absolute private ownership of assets

This is a conceptual security model, not a guaranteed unbreakable method. Posting here for critique and threat modeling.


Post
Topic
Board Electrum
Re: Electrum: BIP-39 SHOCK: Disordered Mnemonic Unlocks LIVE Bitcoin Wallet
by
Maverick Zeng
on 24/06/2025, 00:55:07 UTC
I have discussed all the intricate details with both Google Gemini and Grok, and they both found it to be incredible/unbelievable/impossible!!"
Because that will never likely happen unless there's a collision with the resulting binary seed from the jumbled and properly arranged mnemonic.

It's as if both you and 'Jack' have exactly the same 12 words in your mnemonic phrases, but just in a different order.
The mnemonic order 123456789101112 opens your private key.
Have you actually tested to create the wallet with the correct order of words and checked the addresses if they matched?
Or just assumed that it's the same wallet because it has transaction history?

Are you using a legit version of Electrum? With verified signatures from its developers.

Perhaps my Google Translate English didn't perfectly convey what I wanted to say.
I am absolutely certain that the 'chaotic combination' mnemonic and the Facebook scammer's mnemonic consist of the exact same 12 words; only their order is different.
The normal sequence (1, 2, 3, 4, 5, 6... 12) results in the scammer's wallet.
However, the interleaved, 'chaotic' sequence (1, 7, 2, 8, 3, 9...) results in that third-party Bitcoin private key wallet.
What I can definitively confirm is that this third-party Bitcoin private key wallet was not newly created by Electrum during my import process. This is because the third-party Bitcoin wallet has existed for several years and has recent Bitcoin transactions from the last ten days or so, with single transaction amounts around 0.003 Bitcoin.
I used the legitimate Electrum application from the Google Play Store, and I also downloaded it from the official Electrum website.
After saying all this, I wonder if Google can fully translate what I'm trying to express, hahaha."
Post
Topic
Board Electrum
Re: Electrum: BIP-39 SHOCK: Disordered Mnemonic Unlocks LIVE Bitcoin Wallet
by
Maverick Zeng
on 24/06/2025, 00:41:54 UTC
In other words, it was an extremely, extremely low-probability, accidental discovery.
The chances of collision is so low that it is impossible only if you created the seed phrase yourself using a strong random number generator. But this is not the case here. You say you have found these words on the internet (on Facebook) and you claim it is a scam attempt.

The chances of it is actually very high to see the words used in the same order they were posted to generate a wallet with transaction history (the "scammer" did that intentionally).

Since my previous posts mentioned specific mnemonic word orders, I cannot disclose the detailed mnemonic phrases. If I did, others could use the number sequences I previously mentioned to open that third-party Bitcoin wallet, which would expose their private key and compromise their privacy. Please forgive me if my Google Translate English isn't perfectly accurate!"
"Regarding what you mentioned: if those 12 mnemonic words are combined in the normal sequence (1, 2, 3, 4... 12), the resulting wallet is that of the Facebook scammer."
"However, using the exact same 12 mnemonic words, but in an interleaved sequence like 1, 7, 2, 8, 3, 9, etc., results in that third-party Bitcoin wallet. The key point is that this third-party Bitcoin private key wallet is completely unrelated to the scammer's wallet – they share the same mnemonic words, but the order is different!"
"Most importantly: that third-party wallet, generated by the 'chaotic combination,' was not newly created by Electrum during the import process. It has existed for several years and has recent Bitcoin transaction history from the last ten-odd days. This is truly bizarre/magical."
"I'm not sure if Google Translate perfectly conveys my meaning in English, haha."
Post
Topic
Board Electrum
Re: Electrum: BIP-39 SHOCK: Disordered Mnemonic Unlocks LIVE Bitcoin Wallet
by
Maverick Zeng
on 24/06/2025, 00:29:59 UTC
Importing the mnemonic in the 'correct' order leads to the phishing scam wallet associated with Facebook.
Using the mnemonic in the order 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12 results in that scam/phishing wallet.
What's the purpose to have your whole post in bold face? (Removed for sanity)

I don't care about Facebook and won't look or search there. Are the recovery words of what you label as phishing scam wallet public?
If yes, then you can disclose them here. It's just that I don't believe you. You know the drill: don't trust, verify!

However, using the mnemonic in the order 1, 7, 2, 8, 3, 9, 4, 10, 5, 11, 6, 12, I tested and found a third-party Bitcoin wallet with actual transaction records.
This is your claim and so far we can't prove your claim. I say again, I don't believe you, because first, it's, as you said, highly unlikely that the different word order produces a valid BIP39 word sequence with proper checksum. Second, why would someone else have funded addresses even partially equal to such an invalid BIP39 wallet?

I can confirm what nc50lc said, Electrum clearly warns about an invalid checksum when you change the order of a given valid BIP39 recovery word sequence but still lets you derive a wallet from the invalid sequence.

In other words, it was an extremely, extremely low-probability, accidental discovery.
Yadda, yadda, ... show proof or it didn't happen!

This is my first time using this forum, and I don't understand many of its functions. My English is also translated using Google Translate."
"I wrote all this just to express my curiosity, confusion, and lack of understanding regarding that event."
"Regarding what you said about importing that 'chaotic combination' into the Electrum wallet under the BIP-39 format option, the third-party Bitcoin wallet that was opened was definitively not newly created by Electrum during the import!"
"I also tried importing various combinations of other brand-new BIP-39 format mnemonic phrases into Electrum again, but the results were always empty, invalid addresses. So, my point is, was hitting and opening that third-party Bitcoin address a completely incredible coincidence/probability?"
Post
Topic
Board Electrum
Re: Electrum: BIP-39 SHOCK: Disordered Mnemonic Unlocks LIVE Bitcoin Wallet
by
Maverick Zeng
on 24/06/2025, 00:14:06 UTC
Note that the checksum in BIP39 seeds is weak. A 12 word BIP39 seed only has a 4 bit checksum. There is a 1/16 chance that a random selection of 12 words from the wordlist is a valid seed.

Please also note, the crux of the issue lies in this alleviation/mitigation.
That chaotic combination of mnemonic phrases is a BIP-39 seed, but it cannot be imported into other mainstream wallets like Trust Wallet, Phantom, or MetaMask, even though these wallets do support BIP-39 seed phrases!!"
"That chaotic combination of mnemonic phrases can only be successfully imported into Electrum wallet using the [BIP-39] format option, which is the strangest part."
"All I've said so far is to express my suspicion that Electrum might have some unknown mechanism that causes this result
Post
Topic
Board Trading Discussion
Topic OP
"[525,020.238 USDT Stolen],
by
Maverick Zeng
on 23/06/2025, 11:58:22 UTC
The stolen asset is 525,000 USDT on the TRON (TRX) blockchain.
It's highly probable that a screenshot of the mnemonic phrase was accidentally leaked.
The main suspect is a friend, a Taiwanese individual.
The stolen wallet address is TA7dqsa3vDSNqkVhqgKzQS5y17wb8o4SnW.
The thief's address is TVgDXxpuzLwHMUvdPNGYyTUPJxZRpT8Vos.
The funds were only transferred through one address and have not been moved further.
This is likely because a certain amount of TRX is required as a gas fee to transfer USDT assets from that wallet address.
Prior to the theft, a normal payment in USDT was made from TA7dqsa3vDSNqkVhqgKzQS5y17wb8o4SnW to another address belonging to the suspected friend, TLnHpVoGK1b8phRGfHQUPx7qocfdkrUVLY. Several associated transactions linked to this friend's address later had transfer records involving the thief's address: TVgDXxpuzLwHMUvdPNGYyTUPJxZRpT8Vos, specifically for transferring TRX as gas fees to these associated wallet addresses.
The prime suspect is almost certainly that friend with whom I had a USDT payment relationship. Within minutes of the theft, those suspicious associated wallets also transacted a certain amount of TRX for gas fees.
Are there any effective ways to recover the losses?"
Post
Topic
Board Electrum
Re: Electrum: BIP-39 SHOCK: Disordered Mnemonic Unlocks LIVE Bitcoin Wallet
by
Maverick Zeng
on 23/06/2025, 11:18:23 UTC
Importing the mnemonic in the 'correct' order leads to the phishing scam wallet associated with Facebook.
Using the mnemonic in the order 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12 results in that scam/phishing wallet.
However, using the mnemonic in the order 1, 7, 2, 8, 3, 9, 4, 10, 5, 11, 6, 12, I tested and found a third-party Bitcoin wallet with actual transaction records.
[This should be a near-zero probability coincidence, an unreplicable event. Testing with other mnemonics consistently produces new, empty addresses.]
In other words, it was an extremely, extremely low-probability, accidental discovery.
I was using the official Electrum wallet application from the Google Play Store."
   
Post
Topic
Board Electrum
Re: Electrum: BIP-39 SHOCK: Disordered Mnemonic Unlocks LIVE Bitcoin Wallet
by
Maverick Zeng
on 23/06/2025, 07:36:05 UTC
The current situation is that I have successfully imported and opened a third party's Bitcoin wallet address using that scrambled mnemonic phrase, and I now have full control over it.
It's as if both you and 'Jack' have exactly the same 12 words in your mnemonic phrases, but just in a different order.
The mnemonic order 123456789101112 opens your private key.
While the mnemonic order 789101112123456 opens Jack's private key. I originally intended to open your private key, but in a random, scrambled order, I accidentally opened Jack's private key and gained full control of his Bitcoin wallet address...
I have discussed all the intricate details with both Google Gemini and Grok, and they both found it to be incredible/unbelievable/impossible!!"
Post
Topic
Board Electrum
Re: Electrum: BIP-39 SHOCK: Disordered Mnemonic Unlocks LIVE Bitcoin Wallet
by
Maverick Zeng
on 23/06/2025, 07:00:08 UTC
I'm still a bit unclear. I used a scrambled, incorrect mnemonic phrase from that Facebook phishing scam, and it successfully imported into Electrum wallet using the [BIP-39] format option. However, when I tried to import it into other mainstream wallets using their BIP-39 format, they all failed!
Furthermore, the wallet address that Electrum opened after successfully importing it with the BIP-39 format option was not a newly created Electrum wallet. Instead, it was an address that someone else had been using for several years, and it even had usage records from just the past few days.
This means I inadvertently opened someone else's actively used Bitcoin wallet with a completely random and scrambled mnemonic phrase, and I can now directly control that Bitcoin wallet...
This scrambled, incorrect mnemonic phrase consists of the exact same 12 words as the phishing scam's mnemonic on Facebook, just in a completely different order. Yet, it somehow opened a third party's Bitcoin wallet..."
Post
Topic
Board Electrum
Topic OP
Electrum: BIP-39 SHOCK: Disordered Mnemonic Unlocks LIVE Bitcoin Wallet
by
Maverick Zeng
on 23/06/2025, 03:46:50 UTC
Subject: Electrum BIP-39 Anomaly: Disordered Mnemonic Unlocks Live Wallet – Near-Zero Probability!!
As a non-programmer with a foundational understanding of Bitcoin private keys, addresses, and mnemonics, I've unexpectedly encountered a highly peculiar and seemingly improbable, yet genuinely observed, probabilistic event. This is my first time posting in this forum, so please bear with any translation inaccuracies, as my English relies entirely on Google Gemini.
I recently stumbled upon a phishing attempt on Facebook involving a publicly displayed mnemonic seed. The image presented the mnemonic in a two-column, vertically ordered format, specifically numbered 1.7.2.8.3.9.4.10.5.11.6.12 for its 12 words. The intended phishing scam required users to rearrange these words into the standard 1-12 sequential order to import them into a wallet.
(  As this is my first time posting on this forum, I'm unfamiliar with how to embed images. Please excuse any formatting issues )
However, [a highly peculiar problem] has arisen:
Through an accidental misreading of the image, I incorrectly interpreted the mnemonic's order as a standard sequential 1.2.3.4.5... (horizontal) layout, rather than its intended 1.7.2.8.3.9... vertical arrangement.
When attempting to import this incorrectly ordered mnemonic into various mainstream wallets like Trust Wallet, MetaMask, and SafePal, they all correctly displayed "Invalid Mnemonic."
But then, astonishingly, upon importing this very same "incorrectly ordered mnemonic" into Electrum Wallet under the BIP-39 format option, it succeeded! And what emerged was a completely new, active Bitcoin wallet with recent transaction history from just a few days ago!
This means that the original phishing mnemonic (intended to be arranged correctly) and the mnemonic that successfully imported into Electrum (which was the exact same set of words, but in an incorrectly assumed sequential order) are one and the same, merely differing in their word sequence.
This should be an impossible event, yet it has inexplicably occurred.
I hope someone can shed light on my confusion and curiosity. Many thanks!
Post
Topic
Board Development & Technical Discussion
Topic OP
BIP-39 SHOCK: Disordered Mnemonic Unlocks LIVE Bitcoin Wallet ???
by
Maverick Zeng
on 23/06/2025, 03:35:36 UTC
Subject: Electrum BIP-39 Anomaly: Disordered Mnemonic Unlocks Live Wallet – Near-Zero Probability!!
As a non-programmer with a foundational understanding of Bitcoin private keys, addresses, and mnemonics, I've unexpectedly encountered a highly peculiar and seemingly improbable, yet genuinely observed, probabilistic event. This is my first time posting in this forum, so please bear with any translation inaccuracies, as my English relies entirely on Google Gemini.
I recently stumbled upon a phishing attempt on Facebook involving a publicly displayed mnemonic seed. The image presented the mnemonic in a two-column, vertically ordered format, specifically numbered 1.7.2.8.3.9.4.10.5.11.6.12 for its 12 words. The intended phishing scam required users to rearrange these words into the standard 1-12 sequential order to import them into a wallet.
(  As this is my first time posting on this forum, I'm unfamiliar with how to embed images. Please excuse any formatting issues )
However, [a highly peculiar problem] has arisen:
Through an accidental misreading of the image, I incorrectly interpreted the mnemonic's order as a standard sequential 1.2.3.4.5... (horizontal) layout, rather than its intended 1.7.2.8.3.9... vertical arrangement.
When attempting to import this incorrectly ordered mnemonic into various mainstream wallets like Trust Wallet, MetaMask, and SafePal, they all correctly displayed "Invalid Mnemonic."
But then, astonishingly, upon importing this very same "incorrectly ordered mnemonic" into Electrum Wallet under the BIP-39 format option, it succeeded! And what emerged was a completely new, active Bitcoin wallet with recent transaction history from just a few days ago!
This means that the original phishing mnemonic (intended to be arranged correctly) and the mnemonic that successfully imported into Electrum (which was the exact same set of words, but in an incorrectly assumed sequential order) are one and the same, merely differing in their word sequence.
This should be an impossible event, yet it has inexplicably occurred.
 :)I hope someone can shed light on my confusion and curiosity. Many thanks!