Yes, there is no way to decipher the ciphertext. Only with a unique key that only you know.
Nothing happens, there is no link between the stored codes and the specific device. In addition, the Seeder contains a PIN and after 3 unsuccessful attempts the Seeder contents are erased. You simply buy a new Seeder.
It's the Vernam cipher. It's the only cipher that's fundamentally unbreakable. The encryption results in a random string that cannot be broken in any way.
To decipher it, Seeder uses a ciphertext that only you know which can be used to crack the ciphertext.
Any amount. There is no limit to the number of seeds.
The texts are stored directly on the blockchan. They are therefore publicly available at any time, and no one can delete or damage them.
No, never. The seeder stores only the ciphertext, which can be used to encrypt new and decrypt encrypted seeds.
No, you can't do that on principle.
No, only an encrypted message is sent over the communication channel, which cannot be decrypted.
No, he can't. It is a single-purpose device without an operating system. It is an offline device with no remote management capability. all software is opensource and the source code content can be verified on GitHub and the current version uploaded at any time.
If they are sent to the blockchain, you can forget about them... when you need them you can simply decrypt the seed.
Through the wallet.
The data is stored on the blockchain and can be viewed at any time outside our website via chainscan. The codes are therefore available at any time.
No, the encryption and all the work with the seed happens only in RAM. Its contents are deleted when the device is switched off.
The code is always 215 characters long. It is generated according to a special logic from your secret text, which must have at least 250 characters, 20 words, punctuation, upper and lower case letters.
Yes that's true, but only partially. This condition is only valid in 2 bit encoding, because it can be broken by the XOR function. This is not the case here. In addition, based on your text, a unique string is always generated, which is used to encrypt the seed. this string is always unique, so that every attempt to encrypt the same seed also results in a unique text.
Yes, although it is clear that the result must be a text containing the 24 pre-known words specified in BIP-39, any attempt at a BF attack has the same success rate as an attempt to guess a random combination, or the establishment of all wallets.
Yes, there is. In the seeder itself it is possible to generate a real random series of numbers generated by a mathematical operation using the HW inputs of the seeder. The numbers are generated from decoding the noise level from the microphone and analog inputs and the touchscreen. However, this generated number series needs to be backed up outside the Seeder itself, as it is a completely random number series that can never be replicated.
The encoded seeds are attached to the transaction. A transaction fee must be paid to store the seed on the blockchain. The text attachment of this transaction is the encoded seed. Once the wallet is connected to the seed administration, all transactions and thus the seeds to the current wallet are loaded.