Alice generates a critical pair on her Laptop or computer then deliver the generated general public critical and the wanted prefix to Bob. It can be carried out by e mail, very little is key. Nevertheless, Alice has to maintain securely the private essential and never expose it. - The https://vanity-address.org