Bip85 vs bip39 https://rentry.co/p68weyby Checksum generation: A checksum is generated from this entropy using SHA-256 hashing, which aids validate the mnemonic's integrity afterwards. Because of the cryptographic style and design of BIP-39, a weak passphrase isn't going to reduce the protection of the other wallets or assistance reveal the seed https://madbookmarks.com/story20518720/bip39-html-not-known-details-about-bip39-word-list-txt-https-linktr-ee-bip39