I'm understanding that is a paper wallet generator, and possibly can be used to create keys from a phrase as well
It's not a paper wallet generator, despite the appearance of a QR code graphic ...
A deterministic wallet is a system of deriving keys from a single starting point known as a seed. The seed allows a user to easily back up and restore a wallet without needing any other information and can in some cases allow the creation of public addresses without the knowledge of the private key. -
https://en.bitcoin.it/wiki/Deterministic_WalletThe first feature is your one ring to bind them all deal. The magic (seed) phrase collect house buttery stable will enable me to recover all of the privkeys generated from this seed (the
parent private key or privkey) and thereby enable to me to take control of any and all UTXOs associated with those privkeys (which, AIUI, are actually an encoding of the parameters for the selected ECC scheme).
The second feature is important for online sales, allowing a merchant such as myself (they are
really cool digital prints) to enable my remote server to create receiving addresses for incoming payments without needing the privkey (which otherwise would be exposed to attack on the server).
Like most people I'll wait for the one click version.
Unfortunately (1), that
is the one-click solution.
Unfortunately (2), to be effective, one-click solutions require that users
already have a reliable mental model that is sufficiently accurate and detailed to adequately inform the choice that they are faced with. Few people would be comfortable with a one-click solution for submitting tax returns that basically translated to: Here's all my money, take whatever you want.
Users aren't always in the best position to articulate their interface requirements because they typically don't have access to domain fundamentals such as ...
The levels-of-processing effect, identified by Fergus I. M. Craik and Robert S. Lockhart in 1972, describes memory recall of stimuli as a function of the depth of mental processing. Deeper levels of analysis produce more elaborate, longer-lasting, and stronger memory traces than shallow levels of analysis. Depth of processing falls on a shallow to deep continuum. Shallow processing (e.g., processing based on phonemic and orthographic components) leads to a fragile memory trace that is susceptible to rapid decay. Conversely, deep processing (e.g., semantic processing) results in a more durable memory trace.
-
https://en.wikipedia.org/wiki/Levels-of-processing_effectThe above is broadly describable as falling under the remit of user task analysis and user information requirements analysis- what the task is in terms of cognitive processes and their functioning, what information is known to be required to inform those cognitive process, how that information is best presented to integrate effectively with the cognitive processes, how to account for known effects of perceptual distortions, characteristics and limitations of short-/long-term memory performance and ditto for the limits of attentional performance.
The ability to selectively process information (attention) and to retain information in
an accessible state (working memory) are critical aspects of our cognitive capacities.
While there has been much work devoted to understanding attention and working
memory, the nature of the relationship between these constructs is not well understood.
Indeed, while neither attention nor working memory represent a uniform set of processes,
theories of their relationship tend to focus on only some aspects. This review of the
literature examines the role of perceptual and central attention in the encoding,
maintenance, and manipulation of information in working memory. While attention and
working memory were found to interact closely during encoding and manipulation, the
evidence suggests a limited role of attention in the maintenance of information.
Additionally, only central attention was found to be necessary for manipulating
information in working memory. This suggests that theories should consider the
multifaceted nature of attention and working memory. The review concludes with a
model describing how attention and working memory interact.
-
http://visionlab.harvard.edu/Members/darylfougnie/Daryl_Fougnie_%28Academic%29/Home_files/Fougnie-in%20press-chap%201.pdfAs a cognitive psychologist by discipline, to me this stuff is just basic characteristics of the standard i/o routines known to be reliably present in the typical installation of the HomSap v1.0 wetware OS and it's just an irrational aberrance of modern life that people are, by and large, comfortably oblivious to the (entirely predictable) limitations of their own particular installation of HomSap 1.0.
Cheers
Graham
The UI for addresses is pretty naff
Q.E.D.