Bip39 table https://www.spreaker.com/podcast/palerioiwk--6670096 However on common It's going to choose fifty percent the time specified from the tables underneath for an attacker to obtain the proper passphrase It can be simple — if you do not worry about copyright inheritance, no person else will — not your software or hardware https://letsbookmarkit.com/story20320213/bip39-rust-crate-helping-the-others-realize-the-advantages-of-bip39-recovery-tool-https-dzen-ru-bip39-phrase-com