►
A
All
right,
so
we,
where
are
we
and
where
did
we
leave
off?
Well,
we
still
need
to
do
this
key
stuff.
So,
let's
so,
essentially
we
we
understand
that
you
know
we
can't
use
the
same
key.
We
got
to
use
a
different
kind
of
key
the
x
two
five,
five
one,
nine
key,
which
is
based
off
of
a
different
curve
instead
of
the
ed
two
five
five
one,
nine
key
yeah,
which
you
know
has
a
different
curve,
and
so
you
can
see.
A
In
this
bit
of
code
here
in,
I
guess:
okay,
h,
g
h,
yeah,
you
can
see
in
this
piece
of
code
alternately
pronounced
age
that
there's
some
some
some
funkiness
going
on
here
right.
So
there's
this
curve.
Two
five
nine
x
see
this
shared
secret,
fingerprint.
A
A
A
This
is
a
hazardous
materials
module.
You
should
only
use
it
if
you're
100
sure
that
you
know
what
you're
doing
this
module
is
full
of
landmine
dragons,
dinosaurs
and
and
dinosaurs,
with
lace
guns
all
right.
Well,
we're
gonna
hope.
We
know
what
we're
doing
here.
So,
let's
see
I
mean
I
trust
filippo,
so
I
think,
as
long
as
we
can
confirm
that
our
implementation
will
match
with
his
implementation,
then
we
should,
you
know
basically
be
very
happy
all
right
so
from
public
key
bytes.
What
is
this
from
private
bytes?
Okay?
A
A
A
And
we're
coming
back
up
one
two:
three
levels:
okay,
so
all
right,
so
we
got
some
keys
loaded,
private
key
from
bytes,
so
it
looks
like
okay,
so
here's
a
private
key,
bytes,
okay,
so
here's
a
generated
private
key
encryption,
algorithm;
no
encryption,
encoding,
encoding
raw
format,
raw
okay
from
cubites,
okay,
so
private
bytes,
okay.
So
what
is
this
key
generate?