@ -10,7 +10,7 @@ developers over the years have worked to design systems that allow users
to recover access to their bitcoins after a problem without compromising
to recover access to their bitcoins after a problem without compromising
security the rest of the time.
security the rest of the time.
In this chapter, we'll examine some of the different methods employed by
In((("wallets", "key generation", "independent", id="wallet-keygen-independent")))((("key generation", "independent", id="keygen-independent")))((("independent key generation", id="independent-keygen")))((("public key cryptography", "wallet recovery key generation", see="key generation"))) this chapter, we'll examine some of the different methods employed by
wallets to prevent the loss of data from becoming a loss of money.
wallets to prevent the loss of data from becoming a loss of money.
Some solutions have almost no downsides and are universally adopted by
Some solutions have almost no downsides and are universally adopted by
modern wallets. We'll simply recommend those solutions as best
modern wallets. We'll simply recommend those solutions as best
@ -20,13 +20,17 @@ In those cases, we'll describe the various options available.