Discussion
Interesting, thanks. Would it be similar to bip-85 in the sense that multiple keypairs can be created based off the root keypair, with no way to reverse engineer a compromised delegated keypair to find the root?
Interesting, thanks. Would it be similar to bip-85 in the sense that multiple keypairs can be created based off the root keypair, with no way to reverse engineer a compromised delegated keypair to find the root?