As could be noticed in the above mentioned implementation I wrote, the 6 methods to go from private crucial to ethereum address can be summarized as follows: This challenge "profanity2" was forked from the original challenge and modified to guarantee protection by structure. This suggests source code of the challenge https://australiand961daz5.wiki-jp.com/user