1 @MartinDawson The solution lets you know how the keys are generated (and It really is suitable). Following building the private/general public keys, you need to do have to retail store them somewhere securely. That's what the password-encrypted file is for. Not long ago this information came to my notice https://base-directory.com/listings12706274/top-eth%E5%9C%B0%E5%9D%80-secrets