|
|
|
@ -171,7 +171,7 @@ frontends (which don't require private keys) from signing operations
|
|
|
|
|
(which do require private keys). For example, Alice's frontend
|
|
|
|
|
distributes her public keys to people wanting to pay her. Later, when
|
|
|
|
|
she wants to spend the received money, she can provide the key tweaks
|
|
|
|
|
she used to a _hardware signing device_ (sometimes confusingly called a
|
|
|
|
|
she used((("hardware signing devices"))) to a _hardware signing device_ (sometimes confusingly called a
|
|
|
|
|
_hardware wallet_) that securely stores her original private key. The
|
|
|
|
|
hardware signer uses the tweaks to derive the necessary child private
|
|
|
|
|
keys and uses them to sign the transactions, returning the signed
|
|
|
|
|