One @MartinDawson The solution informs you how the keys are generated (and It is really suitable). Immediately after building the private/general public keys, you need to do ought to retailer them somewhere securely. That's what the password-encrypted file is for. This job "profanity2" was forked from the original challenge and https://simonwvsql.angelinsblog.com/29310612/top-guidelines-of-enter-your-personal-trx-address