Skip to content

Latest commit

 

History

History
20 lines (13 loc) · 1.91 KB

howto.md

File metadata and controls

20 lines (13 loc) · 1.91 KB

compressor: words delivered from file. file name provided via command line. there're -secretkey,-wif24 and -hex32_24 options

dcompressor: base58 encoded thing or hex string provided via command line. there're -secretkey, -wif24 and -hex32_24 options

msvc 2019 project with cmake build support(option during msvc setup). open folder in msvc
in windows you should have libcrypto.dll next to .exe files. included to binaries here Also can be found in poco project or in compiled and linked openssl sources Any edition where it's called so will work for sure
wif key is 27 words. 24 words or less with -wif24 option.
-hex32_24 option is for tranfering private keys in hex
-secretkey is for cryptocurrencies that use edwards25519 curve. say if you wanna account on mango markets. [] thing (used in id.whatever) is supported in mfc edition but not here. too long to be an arg

for bc1q address you can import stuff from compressor. Even if you'd used uncompressed wif in decompressor
P2WPKH

leading zeroes concept is kept despite that the tool can't be applied to private keys with zero bytes at start , it will deny to work in this case so you'll not see phrase at all. Yet new tool could be made out of original base58 by just replacing the byte value range [0..255] with [0..2047] one there. in case soomeone will lose access to this one. With some effort and programming skills key still can be decoded havin zero knowledge about how this app is coded

use case:
say you gonna use wif you have in electrum to set up new wallet in glow . first setup new wallet in glow then 'import wallet' , they have 'private key' option. latter could be done by tool3_2048. first copy-paste your wif there , do decompressor, select edwards25519 and do compressor . you'll see private key needed
image