One @MartinDawson The solution lets you know how the keys are generated (and It really is proper). Just after building the private/general public keys, you need to do must retail store them someplace securely. That is what the password-encrypted file is for. For even more pleasurable on etherscan.io, try out https://trumanp642pxe9.blogpixi.com/profile