How does bip39 work https://www.giantbomb.com/profile/blathayqvn/ Checksum creation: A checksum is created from this entropy using SHA-256 hashing, which can help validate the mnemonic's integrity afterwards. Because of the cryptographic style and design of BIP-39, a weak passphrase doesn't lessen the protection of one other wallets or aid reveal the seed https://socialwoot.com/story22308744/bip39-bip44-the-smart-trick-of-bip39-word-list-github-that-no-one-is-discussing-https-x-com-tundra838554