One @MartinDawson The answer tells you how the keys are generated (and It is really accurate). Soon after producing the private/public keys, you are doing ought to shop them someplace securely. That is what the password-encrypted file is for. This can be carried out through the use of different addresses https://stephenj331nro1.csublogs.com/profile