Keystone bip39 https://rentry.co/p68weyby Checksum development: A checksum is created from this entropy making use of SHA-256 hashing, which allows verify the mnemonic's integrity later. Compared with standard wallets derived solely from the seed phrase, passphrase-guarded wallets are concealed from plain sight. They exist inside of a sort of cryptographic shadow https://www.plurk.com/p/3hf2syltjx