Guys keep in mind, regardless of the length of your passphrase, bruteforcing will eventually find accounts. I'm actually surprised this hasn't become more prevalent. Since each wallet is ONLY a passphrase and not a username and passphrase to authenticate against, and there is not a lockout on accounts for how fast you can check a passphrase (unless the blockchain does it). All someone needs to do is bruteforce continually till it happens upon a account. Since everyone is essentially using one username which is identical for all of us and it's impossibly hard to change it once you have one (replotting).
Luckily mine is huge, but with time it will also be broken by a brute force. I'm not certain of the speed at which you could check passwords, but I assume with scripts and modern GPUs you could do some serious bruteforcing on Burst.
"mine is huge" [passphrase] .... that sounds like you get a longer BURST address when you have a longer passphrase.
When you create a new wallet, it will tell you that it is new. So, do watch for that message, ... or otherwise you could clean out that found account, ...
Short, each passphrase gives you one and only one BURST address, but one BURST address can be created with multiple passphrases.
If you create a new passphrase a new BURST address, you could then add one character to see how the BURST address would have changed. Maybe you are lucky, or maybe you find a pattern to predict the next one.
1 => BURST-X5JH-TJKJ-DVGC-5T2V8
2 => BURST-LTR8-GMHB-YG56-4NWSE
11 => BURST-FXHG-6KHM-23LE-42ACU
12 => BURST-DQXP-7DS6-9Q9S-74XRT