Technically, yes... it does offer "more" security... but it's like saying that it's more difficult to get to Pluto than to Jupiter because it's further away... they're both a looooooooong way away and very difficult to get to... but one is technically further away than the other. Same with 128bit vs. 256bit entropy... the latter is theoretically "harder" to bruteforce than the other by sheer fact that it's so much bigger, but the former is already "impossible" to bruteforce anyway.
But for an attacker, they are both stupidly hard to brute force. If a person can't go to space you don't care if it's Pluto or Jupiter. It doesn't make anything harder for the attacker. Actually 24 words makes it harder for the user, because of
possible mistakes.
Because attempting to memorise 12 words and keep them memorised over a long period of time is a recipe for disaster. There are countless threads on these forums where people struggle to remember all sorts of things (wallet passwords, words from mnemonics, what software they had installed, when they did things etc)
I fully agree, I just didn't mention about the back up. Of course you'll have to write down your words too, but trying to memorize them wouldn't be that bad. For example, if you know the first 9 words, but have lost your paper for a million different reasons, you can use
a tool to get your mnemonic back.
To be technically compliant with BIP39... they should be 12, 15, 18, 21 or 24 words. The BIP39 specification says the initial entropy needs to be between 128 and 256 bits.
I saw that
iancoleman allows you to generate 3, 6 or 9 words and I thought that it is right. He does warn that it may be guessed by an attacker, though.
One scenario I imagine is if you split your seed into three to store as 2 of 3 factors of authentication, in case of 24 words, attacker would have to crack more words if they get their hands on one copy versus if you were using 12 words.
IMO, you should never store anything halved or not completed. Even if someone stoles it, it is your problem to think where to hide it. Whoever finds it must have access and he must not need another factor of authentication to spend the funds.
If equal number of words were missing from a mnemonic (eg. missing 3 words) then brute forcing a 24-word mnemonic is a lot easier than brute forcing a 12-word mnemonic because of a much bigger checksum used by 256-bit entropy that provides less collision ergo it requires a lot less full checks.
I don't get that, why should all seeds have a valid checksum? We generate a random number and then we put a valid checksum, but for what reason?