HD hardened key derivation in ebook "Mastering Bitcoin third", on the finish of web page 115.
There are some descriptions that I believe are unsuitable.
They’re accessible right here.
The ensuing “department” of keys can be utilized to provide prolonged
public keys that aren’t weak as a result of the chain code they comprise can’t be
exploited to disclose any non-public keys for his or her siblings or dad and mom.
I wish to know if there may be any relation between regular key derivation assault and little one chain code. Thanks.
