Bip39 copyright http://www.mediafire.com/file/uilrjfajg2ami24/pdf-14673-57158.pdf Checksum creation: A checksum is produced from this entropy applying SHA-256 hashing, which can help validate the mnemonic's integrity later on. It can be straightforward — if you don't be worried about copyright inheritance, no person else will — not your software program or components wallet distributors, https://500px.com/p/alexzhiglatyxrnxb