One @MartinDawson The solution tells you how the keys are generated (and It truly is right). Immediately after producing the private/general public keys, you need to do really need to retailer them someplace securely. That's what the password-encrypted file is for. 3. Develop an Ethereum (ETH) Account: Use your hardware https://ethvanity07418.blogproducer.com/36963410/the-fact-about-vanity-address-ethereum-that-no-one-is-suggesting