Bip39 specification https://padlet.com/alexzhiglatyzbugt/bookmarks-68ta5bpd7yy3slro/wish/PVKBQO1nwDeMWj5x However on normal it'll get half enough time supplied within the tables underneath for an attacker to obtain the right passphrase It can be straightforward — if you do not be worried about copyright inheritance, no person else will — not your software or components wallet vendors, https://trackbookmark.com/story21851553/bip-39-github-the-single-best-strategy-to-use-for-bip39-word-list-txt-https-dzen-ru-bip39-phrase-com