вот понравилось сообщение от Deleterium... для паникеров насчет фразы в 12 слов:
Let's imagine user A create an acccoun XYZ with words. So an attacker B wants to steal the funds. First thing to know is if the account XYZ has a public key associated. If there is no public key, then attacker can generate a passphrase (does not matter if it is words, or random chars) resulting in acount XYZ and get the funds (change is 1 in 2⁶⁴ each try). Attacker sends a transaction signed with his new public id and lock the account to his passphrase. When user A tries to get the funds, he will sign the transaction with his passphrase but the node will deny the operation because his public key does not match the publick key stored on chain. A lost his funds and the attacker does not need to transfer the amount, just activate the account with his passphrase.
Other option is that the attacker checks that there are a public key. So the chance to generate a new passphrase that will create same ID is 1 in 2⁶⁴, but this is not enough.. He needs a passphrase that will generate the same public key and now the chance is 1 in 2²⁵⁶. But the attacker can guess that the passphrase is 12 words long with som 2048 predefined. Using this scheme he will have a chance to find the same passphrase is 1 in 2048¹² = 1 in 2¹³². This is easier than try random chars with the 1 in 256-bit chance.
But you can think that 64 bit is weak.... Let's check how many tries are needed to have a 50% chance discovering the passphrase with 64 strength. Using the maths
https://www.statology.org/probability-of-at-least-one-success/ numberOfTries = log(1 - desiredChance)/log(1 - findingChance). -> numberOfTries = 1,27*10^²⁰
If you can hash at 10M/s (10⁷) -> this 50% chance to find the passphrase will take 1,27*10¹³ seconds = 402714 years.