ah ha!!!!!!!
I see an admission, there.
First things first - you “see” shit.
Oh my, aren't you all worked up over nothing.
Secondly, what are you referring to? The “troll” part, or what can they achieve against an army of professional liars?
I kind of wished that you would have had said "professional trolls" and "liars" rather than "trolls" and "professional liars," then at least you would have had been more accurate in your descriptive attempts at a snipe.
Thirdly, I didn’t admit to anything - it was a sarcastic statement.
You are digging ur lil selfie in deeper and moar deeper.
Don't you have anything better to do? Weren't you at least going through a prior stage of describing some of your "hot babes" experiences? Have your hot babe experiences run dry? Maybe the hot babes got annoyed with your personality? or lack thereof. hahahahahaha
Maybe work on getting back to improving your hot babe experiences, then at least you might be able to cheer up ur lil selfie and maybe even produce some off-spring, not that I should encourage such things, in your case it might be better to NOT enable you in that direction.
If true, that seems neither "sweet" nor unusual enough to be pointed out as any kind of a "gotcha."
Please
'splain
selfie.
Jay, Juan and Gee, I’m not really into debating with AI’s.
Ok. don't then.. No problema.
That said, what amazes me about your registration date, is how advanced AI’s are in the private and military sector.
In short, chatGPT my ass.
Again, you are back to being sweet.
Can you make up your mind about whether you would like to be sweet or you would like to be the lil turd that is in your more true nature (or are you just acting like a little turd because your that's how your handlers prefer it).
Why not actually get involved with some substantive discussions of lillie fiend, rather than trying to be a lillie fiend wannabe... This lillie fiend wannabe is not really working so well for you anyhow, is it?
[edited out]
To clarifiy, I don't use any shamir secret sharing or similar tech as you seem to assume.
Sure, I might have misunderstood, but I was not presuming the use of shamir.. I was merely presuming having a seed and then splitting it into two parts.. So I may well have had been confused about what it was/is that you were/are doing. Accordingly, I thought that they were in plain text, so maybe partially I was asking for myself, but also for anyone else who might not have understood what you meant by what seemed to have had been a back up that was split into two parts.
The backup and the "original" are fully identical. Before writing it down I just xor the original 2048bit key that results in a valid seed for electrum with a password and store that value as BIP39 encoded seed words. Xor that again with the valid password and you get the original and valid electrum seed back.
I tried to look up Xor but I don't really understand what that is.. I guess it is creating a hash and then reverse hash or something like that, so yeah, maybe I am missing something in regards to what you are doing since I don't really know how to xor anything... at least not so far in my bitcoin journey (or otherwise in my personal life - not that I know about.. maybe I had been XORing things without realizing that was what I was doing all this time).
Regarding the other (very valid) concerns like storing in different locations etc. that you bring up, these have been well considered and in my view sufficiently addressed but due to obvious opsec reasons I'd prefer not to go into too much detail.
Well that was what I thought was my main point...(Or question).. so that if you have ONLY one back up, then that could be dangerous, but if you have two back ups that would be better with some sufficiency in terms of different locations.. and sure none of us necessarily need to know details, but mostly inquiring upon the different locations having had been taken into account. On a personal level I have a few different locations that I trust, but it is not like anything is exactly locked in time, and there could be times in which passwords are being updated in which the information is all located in one location. which could sometimes make systems more vulnerable when the parts are brought together, to the extent that they might need to be or if there might be some other way of updating the various parts without necessarily bringing the parts together.
So in some sense I am not necessarily specifically wanting to talk about you, but to talk about some of these kinds of vulnerabilities that any of us could have when we are either creating our back up systems or if we might be administering our systems from time to time.... including that sometimes when I am travelling, I might create new wallets and/or passwords for new products and/or services, but these might have temporary back ups that are not as adequate as my more permanent back ups, but I might not update my longer term (more permanent) back ups for several months and maybe even it could approach a year before some of the later created systems (passwords and/or seeds and/or other important information) get merged into the older (and considered to be more permanent and cold) back up password systems.