One @MartinDawson The answer informs you how the keys are generated (and It truly is right). Just after producing the private/public keys, you do should shop them someplace securely. That's what the password-encrypted file is for. For all the more enjoyment on etherscan.io, try out typing from the ENS name https://tokenaddress42063.yomoblog.com/32941110/the-smart-trick-of-vanity-eth-that-no-one-is-discussing