I think 8 segments of keys would go back together pretty easily and I don't think I'd call it bruteforcing at that point. I'm not sure how much it would be exactly but 8! Is only 40000 and there is a checksum in the private key so it'll only go back together one way (unless you're fortunate/unfortunate).
Yesterday I thought more about it and realises I can simply create a p2sh multisig and have 1 private key exposed and still be safe if 2/12 pieces contains the second provided key and redeemscript, correct? With privkey I can make pubkey correct?
Don't make your wallet too complex, a 2 of 6 multisig is as secure as a 2 of 3 (imo) and a 2 of 3 is cheaper.
I understand but what if I lose 3 xprivs. I'd have other 4 as backup.
I don't know if your public keys can be derived into an extended public key though in some circumstances.
For a multisig don't you have to put xpubs at wallet ( descriptor) my problem is if node gets compromised. And one of the xprivkeys but I see your point with hard derivation path. They'd still need all xprivs.
It's best practice to not release any of your private keys also and your public key and signature are the only things you should be using an offline wallet to obtain.
I plan using the offline device that creates keys to sign psbts
Thank you and o_e_l_e_o for the answers.
New question: from a fresh linux and bitcoincore and ian coleman I guess, how do I create a multisig using 3/5 HD bip39 or bip44 I think I'd like to use the passphrase (salt) is it only possible using bip39?
My objective is to get a dvd with linux, a cdrom with everything necessary bitcoincore ian coleman etc... (libs, dependencies etc... to install from cd rom in linux (ubuntu 22.04)) install everything on 2 laptops without network/bluetooth/etc... adapters, create the 5 HD wallets, 3 in first laptop, 2 in second laptop. I want hard derivation so the xpubs that I will input in the node cannot compromise children or parent keys, but still create adresses which this reassured me is safe
" (To counter this risk, HD wallets use an alternative derivation function called hardened derivation, which "breaks" the relationship between parent public key and child chain code. The hardened derivation function uses the parent private key to derive the child chain code, instead of the parent public key. This creates a "firewall" in the parent/child sequence, with a chain code that cannot be used to compromise a parent or sibling private key. The hardened derivation function looks almost identical to the normal child private key derivation, except that the parent private key is used as input to the hash function, instead of the parent public key, as shown in the diagram in Hardened derivation of a child key; omits the parent public key. -
https://github.com/bitcoinbook/bitcoinbook/blob/develop/ch05.asciidoc#generating_entropy_and_encoding)".
After getting everything installed, create wallets (5hd), create multisig 3/5, backup only HD seeds with instructions how to use them, and use the 2 laptops to sign the psbts created from full node.
Do HD bip39 bip44 prevent multisig wallet creation and if not is the multisig created a new HD seed(wallet)? For example p2sh 2/3 you need all public keys to create the multisig which has to be done in same order for recreating the address but it does not allow for HD/D using p2sh.
How to create multisig using HD wallets?
I'd like to learn how to do the above basically, if not answers, material I can read to achieve this would be great, I've been reading alot but too much out there to read, atleast I've been learning.
Thanks everyone.
Ps: my main question atm is if I create a multisig using several HD with bip39 for example will this create a new seed or is it not possible to have multisig using HD wallets except using same address ?