1 @MartinDawson The solution lets you know how the keys are generated (and It truly is appropriate). Following building the private/community keys, you do should retailer them somewhere securely. That is what the password-encrypted file is for. Here's an case in point light-weight software that can be run in Python https://jeanz951dby5.wikinstructions.com/user