BITCOIN
2. The transaction's ID
ETHEREUM
2. The transaction's ID
LITECOIN
2. The transaction's ID
SOLCOIN
2. The transaction's ID
5. Latest Blockhash
TOOLS
Customize Mnemonic
The last word of a valid mnemonic phrase serves as a checksum for the other words, so you cannot specify all the words yourself, and the number of words is limited to 12, 15, 18, 21, or 24.
Here you can customize your mnemonic words (for example, choose familiar words that are easier to remember). You can specify any words except for the last one, but the more words you specify, the lower the security. After all, human-selected words have poorer randomness compared to those randomly chosen by the system, making them easier for others to guess. Therefore, the principle to follow is to specify as few words as possible.
Number of Mnemonic Words:
Mnemonic Language:
Generate QR Code
Create a QR code for the public key, address, ENS domain name, and other information, save it on your phone for easy sharing with others or convenient scanning when needed.
Note: You can turn your private key or recovery phrase into a QR code (it is best to protect it with a password first), but be sure not to store it on mobile devices (such as phones, tablets, etc.) or scan it, as mobile devices are the least secure!
Content saved on the QR Code:
QR Code Head: Tail:
Image Steganography
Hide some sensitive information in an image and then share the image with others to achieve the purpose of exchanging sensitive information. It's allowed to encrypt before hiding; if someone obtains the image but does not have the password, they still cannot access the information. However, there are now some software tools that can detect information hidden in images, so it is recommended to encrypt before steganography.
Note: It is best to choose landscape paintings with strong layering, such as those with blue skies, white clouds, grasslands, and seas. Do not use small images with a transparent background. On average, 8 pixels can preserve one Chinese character, and 3 pixels can preserve one character.
For some confidential information, the best practice is to: store the confidential information in a file, then encrypt the file using "symmetric encryption/decryption" (see the menu below on this page), and then hide the encrypted file in an image. If possible, add a password during the hiding process.
It is not recommended to transmit private keys in this way. If it really must be done this way, the private key should first be encrypted before being hidden in an image.
Password:

Choose a Picture:
Is the extracted information saved to a file? Yes
Signature / Verification
The signature on a document is used to confirm the owner of the document, similar to a handwritten signature in real life. A private key is used to sign, and a public key is used to verify the signature. The text after signing cannot be altered; otherwise, the signature verification will fail. The other party must obtain the original document, the public key, and the signature to verify the signature.
The keys of cryptocurrencies are generally not used to sign files, as the public key needs to be disclosed, which compromises privacy. In everyday life, PGP-compatible keys are typically used for signing and verifying signatures.
Orginal File:
Signature File:
PGP Private Kye:
Private Key Protection Password:

PGP Public Key:
Fingerprint:
Generate a new key? Yes
Symmetric Encryption / Decryption
This implements symmetric encryption and decryption based on the OpenPGP standard, compatible with open source tools like GnuPG and gpg4win. The so-called 'symmetric encryption/decryption' means that the same password is used for both encryption and decryption.
Password:

Asymmetric Encryption / Decryption
Use the public key to encrypt the file and the private key to decrypt the file. If the encryption/decryption is for securely exchanging information with others, it is not very appropriate to use the public and private keys of a cryptocurrency, as this will leak the public key. It is still recommended to use PGP keys.
Select the encrypted file:
PGP Private Key:
Private key protection password:

PGP Public Key:
Generate a new key? Yes
Conversion between UTF8 and HEX
UTF8 text (such as Simplified Chinese) is converted to and from hex encoding.