Thank you! Will do it. First question.
Here is the order of operations I'm trying to discern:
1. Create hash (sha-256 ?)
2. Hash to create private key
3. Private key to create public key
4. Choose relays to use
5. Public key, private key, and chsen relays to create verifiable identity
Where am I incorrect?
