Q & A
Is there a risk associated with deriving for different cryptographic algorithms from the same source of entropy?
This is avoided by using hardened hierarchical deterministic derivation which
is designed to ensure that each node in the derivation tree is isolated.