-
Notifications
You must be signed in to change notification settings - Fork 526
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
12 WORD SEED PHRASE NOT ACCEPTED ON BLOCKCHAIN.COM WALLET ALTHOUGH ITS CORRECT #6266
Comments
|
Un'unica app per tutte le esigenze di Word, Excel, PowerPoint e PDF. Scarica l'app Microsoft 365: https://aka.ms/GetM365
Inviato da Outlook per Android<https://aka.ms/AAb9ysg>
|
22486031349709 |
Basically for those who are technically inclined, the issue is that that wallet file is that it was a V3 wallet, structured just like any V2+ wallet. (PBKDF2, 5000 iterations, etc...)
The issue comes in that for some reason, the files encrypted with the second password weren't using the "modern" encryption for the second password hashing. (Which includes information about the the pbkdf2 iterations, etc, within the body of the JSON that is decrypted with the main password) What makes this extra strange is that all of this information is actually in the decrypted JSON, but doesn't reflect the parameters used to encrypt the data which is protected by the second password. (In the sample wallet provided, the password was only hashed with 10 SHA256 iterations, just like in a V0 wallet)
Anyways BTCRecover has been updated so as to automatically handle this so as to correctly find the password as well as decrypt/dump the wallet and private keys.
Originally posted by @3rdIteration in #3095 (comment)
The text was updated successfully, but these errors were encountered: