The first is that I would prefer to split the seed in its hex form instead of its word mnemonic form. When I run "electrum getseed" though it only outputs the words. Is there an option or way to access the hex seed without manually creating one myself and restoring from it?
For old-style (Electrum 1.x) wallets, type this in the console:
wallet.get_seed(gui.password_dialog())
For new-style (Electrum 2.x) wallets, it's:
wallet.get_master_private_key('x/', gui.password_dialog())
Please note that for new-style wallets, if you keep only the master private key (and later restore from it), there's no way to get the mnemonic (seed words) back. This isn't a problem from a bitcoin funds point of view, but it might be an inconvenience in the future if you ever want to use your mnemonic as a backup later.
Second is that now Electrum can generate a 256-bit seed. Is there a practical benefit to this since a Bitcoin private key can only have at most 160 bits of security?
A Bitcoin private key has at most
128 bits of security. There's no advantage of using more than 128 bits of good entropy,
however it's very hard to know if your entropy is good or not.
If you're not certain of your entropy source, it might be beneficial to use more entropy. IOW, if you have 256 bits of entropy from some source, and if that source actually (unbeknownst to you) has only one bit of entropy for every two bits of output, then you end up with a 256 bit number with only 128 bits of entropy. In short: longer can't hurt, especially if the entropy source is questionable, though it may be inconvenient.
Third, I want to roll some dice and put in that as some extra entropy. If I use the --entropy option to do this would there be a problem if the dice turned out to be biased or would this option at worst only provide no benefit?
-or-
would it be better to hash a bunch of dice or a deck of cards and use the restore function?
thanks.
Using the --entropy option with poor entropy
does hurt: entropy entered via this method
replaces some of the entropy (or
all of it for the restore method) normally gathered from the OS. If your provided entropy is
worse than what the OS can provide, this could be a problem.
Note that you can use the --entropy option with, say, a deck of cards (which is easier than dice IMO), see here:
https://bitcointalksearch.org/topic/m.10644190. If you're truly paranoid, you could ask for a 256 bit seed, and use the method in that last URL to provide 128 bits of entropy from a shuffled deck. That way, you'd get 128 bits from the deck, and 128 bits from the OS.