With BIP38 we can also generate an intermediate code (or passphrase code) and give it to untrusted party to generate encrypted key/address but not be able to decrypt the key without the passphrase.
This intermediate code can be used to generate any number of encrypted keys by the untrusted party.
So my question is, is it safe for the untrusted party to save this intermediate code and re-generate new encrypted keys using the same when it's run out of keys?. Is this intermediate code more vulnerable than bruteforcing the encrypted key to guess the passphrase?
Of course there's a possibility of the code getting hacked and changed with some other code which if used would generate encrypted keys not belonging to the original user but consider that's been taken care of.