Examples: query, "exact match", wildcard*, wild?ard, wild*rd
Fuzzy search: cake~ (finds cakes, bake)
Term boost: "red velvet"^4, chocolate^2
Field grouping: tags:(+work -"fun-stuff")
Escape special characters +-&|!(){}[]^"~*?:\ - e.g. \+ \* \!
Range search: properties.timestamp:[1587729413488 TO *] (inclusive), properties.title:{A TO Z}(excluding A and Z)
Combinations: chocolate AND vanilla, chocolate OR vanilla, (chocolate OR vanilla) NOT "vanilla pudding"
Field search: properties.title:"The Title" AND text
Back to post

Revisions 10

one year ago
Is it hypothetically possible to access other people's wallets using brute force?
Is it hypothetically possible to access other people's wallets using brute force?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many possible combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of finding a mnemonic that holds money are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection other than the mnemonic? If I owned a hardware wallet for Toncoins and locked it in a physical safe, but someone brute forced different mnemonics and found mine, they would still be able to withdraw my funds?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many possible combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of finding a used mnemonic are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection other than the mnemonic? If I owned a hardware wallet for Toncoins and locked it in a physical safe, but someone brute forced different mnemonics and found mine, they would still be able to withdraw my funds?
#cryptography #mnemonic
#cryptography #mnemonic
one year ago
Is it hypothetically possible to access other people's wallets using brute force?
Is it hypothetically possible to access other people's wallets using brute force?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many possible combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of finding a used mnemonic are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection other than the mnemonic? If I owned a hardware wallet for Toncoins and locked it in a physical safe, but someone brute forced different mnemonics and found mine, they would still be able to withdraw my funds?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many possible combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of finding a used mnemonic are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection other than the mnemonic? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
#cryptography #mnemonic
#cryptography #mnemonic
one year ago
Is it hypothetically possible to access other people's wallets using brute force?
Is it hypothetically possible to brute force access to other people's wallets?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many possible combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of finding a used mnemonic are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection other than the mnemonic? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many possible combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of finding a used mnemonic are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection other than the mnemonic? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
#cryptography #mnemonic
#cryptography #mnemonic
one year ago
Is it hypothetically possible to brute force access to other people's wallets?
Is it hypothetically possible to brute force access to other people's wallets?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many possible combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of finding a used mnemonic are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection other than the mnemonic? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of finding a used mnemonic are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection other than the mnemonic? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
#cryptography #mnemonic
#cryptography #mnemonic
one year ago
Is it hypothetically possible to brute force access to other people's wallets?
Is it hypothetically possible to brute force access to other people's wallets?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of finding a used mnemonic are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection other than the mnemonic? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of finding a used mnemonic are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
#cryptography #mnemonic
#cryptography #mnemonic
one year ago
Is it hypothetically possible to brute force access to other people's wallets?
Is it hypothetically possible to brute force access to other people's wallets?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of finding a used mnemonic are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of colliding are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
#cryptography #mnemonic
#cryptography #mnemonic
one year ago
Is it hypothetically possible to brute force access to other people's wallets?
Is it hypothetically possible to brute force access to other people's wallets?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying random word combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of colliding are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying different combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of colliding are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
#cryptography #mnemonic
#cryptography #mnemonic
one year ago
Is it hypothetically possible to brute force access to other people's wallets?
Is it hypothetically possible to brute force access to other people's wallets?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying different combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of colliding are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper, get the same mnemonic as me and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying different combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of colliding are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
#cryptography #mnemonic
#cryptography #mnemonic
one year ago
Is it hypothetically possible to brute force access to other people's wallets?
Is it hypothetically possible to brute force access to other people's wallets?
On TON (and other blockchains that I know of) word mnemonics are like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying different combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of colliding are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper and get the access to my wallet? It would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
On TON (and other blockchains that I know of) word mnemonic is like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying different combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of colliding are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper and get the access to my wallet? I understand that it would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
#cryptography #mnemonic
#cryptography #mnemonic
one year ago
Original
Is it hypothetically possible to brute force access to other people's wallets?

On TON (and other blockchains that I know of) word mnemonic is like both login and password at the same time. So if I get it right, technically nothing stops a malicious person from trying different combinations in hopes to get hold of other people's wallets, but there are just too many combinations so these attempts are probably useless. Indeed, the words are taken from a 2048-word dictionary, so a number of possible 24-words combinations is insane (2048 to the power of 24, I guess?), and the chances of colliding are extremely small. So I understand that it's probably nothing to worry about in a practical sense. But I would like to understand everything theoretically, so I want to know: 1. Do I get it right that new wallet mnemonics are generated in a (pseudo-)random way, so purely hypothetically they could collide? Could someone try creating a new wallet with Tonkeeper and get the access to my wallet? I understand that it would probably happen to no one in a million years, but does the possibility exist? 2. If someone tried to brute force (try as much random mnemonics as possible) to get hold of existing wallets, what is the number of mnemonic per second they could check using a powerful server? And would adding a second server double that speed? Is there some limit on the possible brute forcing speed and how high it is? 3. Do I get it right that there is no other form of protection? If you own a hardware wallet for Toncoins and it's locked in a physical safe, but someone brute forced different mnemonics and found yours, they would still be able to withdraw your funds?
#cryptography #mnemonic