Two options for Download, either a [pre-built binary](https://git.hush.is/hush/SilentDragonPaper#binary-installation) or [you compile it yourself](https://git.hush.is/hush/SilentDragonPaper#source-code-installation).
SilentDragonPaper is available as pre-built binaries from our [release page](https://git.hush.is/hush/SilentDragonPaper/releases). Download the zip file for your platform, extract it and run the `./SilentDragonPaper` binary.
SilentDragonPaper is built with Rust. **To compile from source, you must [install at least Rust 1.51.0](https://www.rust-lang.org/tools/install).** Please report any issues if a particular version of Rust does not compile this, but I have successfully built this with `rustc 1.64.0 (a55dd71d5 2022-09-19)`.
To generate a Hush paper wallet, simply run one of the following below as the exact command will depend on the method you used to install or compile it.
This will generate 3 shielded z-addresses and their corresponding private keys, and save them in a PDF file called `sdp.pdf`
### Vanity Addresses
You can generate a "vanity address" (that is, an address starting with a given prefix) by specifying a `--vanity` argument with the prefix you want.
Note that generating vanity addresses with a prefix longer than 4-5 characters is computationally expensive. You can run it on multiple CPUs on your computer by specifying the `--threads` option.
When generating paper wallets that will store large amounts of crypto, please take special care to ensure the keys are generated and kept completely offline.
1. Please ensure you supply random entropy when you run `SilentDragonPaper`. Your entropy is mixed in with system-provided entropy to generate keys.
1. If you can, run with `unshare`, which will disable all network interfaces to a process, providing you with an additional layer of safety. (See next section)
1. After you've generated the keys, you can tear off the Address potion of the wallet and take it to your online computer/phone to send the address funds. Please always keep the private key offline.
1. When you're ready to spend the cold storage keys, import the private key into a full node, then don't re-use the key again.
If you are running a newish version of Linux, you can be doubly sure that the process is not contacting the network by running SilentDragonPaper without the network namespace.