8 lines
278 B
Markdown
8 lines
278 B
Markdown
|
# Q & A
|
||
|
|
||
|
## Is there a risk associated with deriving for different cryptographic algorithms from the same source of entropy?
|
||
|
|
||
|
This is avoided by using hardened hierarchical deterministic derivation which
|
||
|
is designed to ensure that each node in the derivation tree is isolated.
|
||
|
|