1 @MartinDawson The answer informs you how the keys are generated (and It can be proper). Immediately after producing the private/public keys, you are doing ought to keep them somewhere securely. That is what the password-encrypted file is for. How can they be used by hackers to steal your coins? https://vanity-trx21841.blogofoto.com/61924142/myetherwallet-download-no-further-a-mystery