Bip39 seed phrase list https://jaspermuxp089.yousher.com/top-5-online-bip39-generators-for-effortless-copyright-security Checksum development: A checksum is created from this entropy using SHA-256 hashing, which aids validate the mnemonic's integrity later. Because of the cryptographic structure of BIP-39, a weak passphrase will not lessen the protection of the opposite wallets or ass... https://directmysocial.com/story5234052/bip39-mnemonic-code-a-secret-weapon-for-bip39-mnemonic-https-linktr-ee-bip39 
