1 @MartinDawson The solution lets you know how the keys are generated (and It is really right). Soon after building the private/public keys, you do must keep them someplace securely. That is what the password-encrypted file is for. It is possible to entirely utilize the generated addresses to keep your https://greatw628usp1.azzablog.com/profile