![](https://monero.town/pictrs/image/a286df1a-1081-4640-9e8a-f9febe5b2c5d.webp)
![](https://monero.town/pictrs/image/a5e4fa35-1fb9-41c5-a621-82531923d2fe.webp)
Great blog! does this have any benefit over a polyseed mnemonic where you also have a secret password? With polyseed as well as BIP39, even if your mnemonic is caught you can use that plain seed as a decoy that opens a fake wallet, while your real seed with your real funds can only be decrypted with the password, and this encrypted mnemonic by hand won’t result in a valid seed so the malicious actor can assume that a valid seed still exists and it still needs to be seized or brute forced?
I think this method is better when using steganography combined since the mnemonic looks like a blob of nothing when reading the contents of the file, while if an actual seed was used it could reveal there is a Monero seed hidden in that file, but then I think a better encryption method can be used since using digital files loses the benefit of not using a computer?
Based. I couldn’t find it on annas archive before