passwords – How does the autofilling of private user credentials works?

In the one hand we have a google’s password store (or things like LastPass, 1Password, etc.) and it’s ability to autofill your credentials when you need it.

In the other hand we have a password manager like ‘pass’ or ‘passpie’, which provides you a local (not cloud) password store with ability to get your site’s password via a passphrase from it’s local storage. Also you need to store it in your clipboard before you can use it to fill an input form.

So, I can’t get it how is that google chrome autofill your service’s password form without you need to provide any passprase? Does it keep this passprase somewhere encrypted (as a global variable) or it works somewhat different?

wallet recovery – How can I recover the missing end of my private key?

You don’t need to bruteforce anything here (at least almost), and can recover the missing last 7 characters on an average PC at home within less than 1 second using a simple Python script!

In your picture there are 7 characters missing at the end of the private key (figured out by comparing with a test-printout using the same HTML file).

Yes, it is correct that this key format is using Base58 alphabet and therefore there are 58 possibilities per character, so for 7 characters you would need to try 58^7 possibilities (which would be about 2 trillions) in theory, but all these considerations are missing an important fact:

When such a private key (the format is called WIF short for Wallet Import Format, see also the reference documentation here) is encoded, at the end (after the actual private key) 4 bytes are added as a checksum. So if these 4 bytes are missing (at the end) you can calculate it from the rest.

Second: in your picture it looks like your private key starts with an L. This indicates that the Bitcoin address is based on a compressed public key. Don’t worry, this is a technical detail, but this helps you further:
Private keys for compressed pubkeys have another special byte added after the key (and before the checksum), namely a fixed 0x01 (see also in the reference documenation for WIF).

This means that the last 5 bytes of a WIF encoded private key (starting with L or K) are either static or can be computed from the rest.

So you are very lucky that the last 7 characters are missing (and not the first 7, because then you really would need to bruteforce 2 trillion possibilities).

What to do with this information:

If we apply this knowledge now to base58 we see that only a single character is missing and then we can calculate the rest.

Reasoning: first: a single base58 character carries ~5.85799 = log2(58) bits of information and second: we don’t need the last 40 bits (4 bytes checksum + 1 static byte for compressed key are 5 bytes = 40 bits).

So, if only 6 characters would be missing at the end (6 * 5.85799.. = 35.14794) we not need to bruteforce anything, because this would be still less than the 40 bits we don’t need.


As you are missing 7 characters we just need to bruteforce one single character (and this means just 58 attempts, not 2 trillions).
So we just attempt to add one of the 58 characters from the bas58 alphabet. For each attempt we calculate the full base58 string by adding the static compressed key flag byte (0x01) and after that the checksum and simply compare it with the rest of the key you have. If it matches it is a valid candidate.

At the end of these 58 attempts you will end up with 2 or 3 (at most) valid private key candidates, and just need to check these 3 keys, to see which one belongs to your address.

The Reddit user /u/dooglus/ (not me) pointed out exactly this in the first place in his comment on your post and he also added a snippet of Python code which does exactly I’ve described above.

Don’t trust anybody, don’t hand out your key to any stranger!

Now take your time, learn what the Python script below does (don’t trust me or any strangers) and when you feel safe, copy the Python snippet from /u/dooglus/’s comment, save it in a text-file named on a safe computer. After that take the computer offline and run the Python script by typing this into a commandline:

python3 L...-your-private-key-goes-here...yhub

and it will print 2 or 3 completed WIF private keys in less than 1 second.


For reference, I appended the Python script but it’s not my work, all credits go to /u/dooglus/. I just can confirm that it does what I described above (but ask others to confirm this and try it with other private keys before you trust it with your real private key):

#!/usr/bin/env python3

import base58, sys

partial = sys.argv(1)

if len(partial) != 45:
    print("partial key should be 45 characters")

results = {}
for c in '123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz':
    wif = base58.b58encode_check(base58.b58decode(partial + c*7)(:33) + b'x01').decode('ascii')
    if wif(:45) == partial: results(wif) = True

for k in results.keys(): print(k)

public key infrastructure – Certificate Authority generates private key for Extended Validation code signing certificate?

My company upgraded to an Extended Validation code signing security certificate, which was delivered via mail on a physical USB key, called a “token.” The token contains a private key and the digital certificate, both generated by the Certificate Authority (CA). I was surprised that the CA created the private key. It is my understanding that private keys should never be shared with a third party, including a CA. I’m used to the Certificate Signing Request (CSR) process, where a company keeps its private key private and only shares its public key.

My question: What security concerns are there with a private key being generated and initially owned by (in possession of) a Certificate Authority? Is this standard practice for EV certificates delivered on a physical token? We are told that the private key only exists on the token and there are no other copies.

Perhaps I’m missing the point. Maybe it’s more about establishing trust with a CA, and therefore we should also trust that the private key was handled correctly and that we have the only copy (E.g., why do business with them if we don’t trust them). At the same time, alerts go off because a third party had our private key. I realize that it might not be practical to create a token unless the private key is present, so maybe it’s inevitable that the CA possesses it at some point.

private $query = ""; –> syntax error, unexpected T_STRING, expecting T_OLD_FUNCTION…

Hello dear MySQL developers, i am mere user and i want to ask you if you can please let me know what is wrong in the file backend/mysql.class.php

I am asking because the script i have uploaded says this:

Line 23 is:…

private $query = ""; –> syntax error, unexpected T_STRING, expecting T_OLD_FUNCTION…

linux – What should I use or need to ssh log to another computer assuming I have private and public key of a known host?

From PuTTY, I can ssh log to a remote server since my public key has been “registered” to this server.
By now I can access this server through only this computer running PuTTY.

However I’d like to gain access from my laptop running Linux debian 9.
How can I use key, the private one or the public one or both, to log to that server?
(without, if possible any configuration on the remote side)

Is there any value in redacting my private IP addresses when posting network questions online?

I recently filed a bug report with Scapy, and while posting screenshots of Wireshark captures for reference, I decided to blank out my private addresses because I’m just getting into InfoSec, and am trying to be mindful of leaking potentially sensitive information:

Redacted IPs

In retrospect though, this seems overly paranoid.

I understand that private addresses aren’t routable, or unique. In theory though, if someone were to gain access to my home network illegitimately, either remotely or by getting into my router via some exploit, would not knowing what subnet all the hosts exist on realistically hinder them?

My thinking is probably no, because that information could likely be found easily; either on the infected computer used as the entry point, or by some other means.

Is there any value in hiding private IP addresses in a public setting?

Deploy Virtual Private Server In Under 5 Minute. Swiss-VPS.

Every Virtual Private Servers we offer includes full root access, enabling you to run whatever you wish whenever you want to.
Easy payments methods!
Best Cheap VPS Server for your online resource! What will you choose: VPS or Shared Hosting? High quality Best Cheap VPS Hosting!
Try now, 100% win-win program

Just try our hosting without risk for 30 days!
Absolute protection program 100% return guarantee. If a low-priced hosting from Swiss-vps does not satisfy you, or you just decide to cancel it within the next 30 days, let us know. We will instantly refund your money without any questions.

VPS Server Features

-Choose VPS Server Location
-ISPmanager or cPanel
-Linux VPS SSH
-SolusVM Control Panel
-Support Quality
-Windows or Linux OS
-Guaranteed Dedicated RAM
-Instant Setup
-Windows VPS RDP

Security and SSL protection

Pay less, save more! Cheap hosting plans Xen VPS and SSD VPS. In addition, for greater security and efficient SEO, we provide a free SSL certificate for Business Plan owners. Get a free domain and security and SEO orientation with an SSL certificate for your website or online store. Be calm and take advantage of this offer right now. Create your online project in the blink of an eye.

# 1 Cheap hosting PHP, MySQL and FTP sites

Low price and high quality – inexpensive premium hosting exists! Thanks to our cloud hosting technology, today cheap website hosting with MySQL, FTP and PHP offers more features. Let us help you create and run quality websites while saving money. Almost unlimited cheap website hosting. Try our free hosting service if you are still new to website development.

SSD VPS Hosting

$9.95/ month
CPU 1хE5-2680
Dedicated RAM 2 GB
Disk Space SSD 20 GB
Bandwidth 2 TB Bandwidth


$9.95/ month
CPU 1хE5-2680
Dedicated RAM 2 GB
Virtualization KVM
Disk Space SSD 20GB
RAID -10 Yes
Setup Fee Free
Bandwidth 2 TB per Month
Port/Uplink 1 Gbit/s
RDP – mstsc.exe Yes
SolusVM Yes
Reboot, Reinstall Yes


$19.95/ month
CPU 2хE5-2680
Dedicated RAM 4 GB
Virtualization KVM
Disk Space SSD 30GB
RAID -10 Yes
Setup Fee Free
Bandwidth 4 TB per Month
Port/Uplink 1 Gbit/s
RDP – mstsc.exe Yes
SolusVM Yes
Reboot, Reinstall Yes

Dedicated Server

$79/ month
CPU E5-2670
Dedicated RAM 16 GB
Disk Space SSD 100 GB
Bandwidth 10 TB Bandwidth

Server E5-2670

$79/ month
CPU Intel® Xeon E5-2670
Dedicated RAM 16 GB
Disk Space SSD 100GB
IP IP’s 1
Bandwidth 10 TB per Month
Switzerland, Zurich
Port/Uplink 1 Gbit/s

Dual E5-2670

$349/ month
CPU Intel Xeon 2xE5-2670
Dedicated RAM 128 GB
Disk Space SSD 4 X 1TB
IP IP’s 1
Bandwidth 50 TB per Month
Switzerland, Zurich
Port/Uplink 1 Gbit/s

Windows VPS

$11.99/ month
CPU 2хE5-2680
Dedicated RAM 1 GB
Disk Space SSD 25 GB
Bandwidth 1 TB Bandwidth


$11.99/ month
CPU 2хE5-2680
Dedicated RAM 1 GB
Virtualization XEN
Disk Space HDD 25GB
RAID -10 Yes
Setup Fee Free
Bandwidth 1 TB per Month
Port/Uplink 1 Gbit/s
RDP – mstsc.exe Yes
SolusVM Yes
Reboot, Reinstall Yes


$89.99/ month
CPU 2хE5-2680
Dedicated RAM 8 GB
Virtualization XEN
Disk Space HDD 150GB
RAID -10 Yes
Setup Fee Free
Bandwidth 6 TB per Month
Port/Uplink 1 Gbit/s
RDP – mstsc.exe Yes
SolusVM Yes
Reboot, Reinstall Yes

Any more questions? We are waiting for You on our website

Servers from are worth trying.
24/7 support MEANS 24/7 support unlike other hosts. Very helpful and friendly; they don’t play the blame game and resolves issues quickly.


[WTS] Quality Anonymous VPS: Good Price, Great Uptime, Private Networking!

MyDreams innovations s.r.o. is a company that has been operating in the field of hosting services since 2004. First as a self-employed person and now as a company. MyDreams team members are people with many years of experience in hosting, VPS servers and dedicated servers. We offer Anonymous Hosting – Virtual Private Server. "No questions, it just works!" – Best Anonymous Hosting in the City (in Europe and in the World)!

What is Anonymous Hosting?

The literal definition of Anonymous hosting is the process of your hosting your data in a different country other than your own or with the needs of more privacy than usual. However, there are more characteristics to Anonymous hosting. One definition of them may be the sentence: "No questions, it just works!"

Anonymous VPS Hosting can offer you:

  • not to expose your identity
  • extra quick set-up: you can have your server in 10 minutes
  • extra quick cancellation policy – your server evaporate instantly (we use disk data shredder)
  • direct, non-filtered and high speed internet connection
  • lot of Payment options such as: Bitcoin, Ethereum, Ripple, PayPal, Credit Card, bank transfer or cache
  • "No questions, it just works!"

What can you host with our Anonymous hosting solutions? For whom is our Anonymous hosting solutions meant?

  • for those who wish get maximum privacy;
  • for those who want to host adult, online marketing, private networking, high secure solutions
  • for those who wish to host their data outside of their own country;
  • for those who do not want their data or identity shared with third parties;
  • for those who want to express themselves through freedom of speech;
  • for those who likes sentence – "No questions, it just works!"

Check out our Anonymous VPS Plans. Take the offer of the powerful VPS server on KVM virtualization that provides a full-featured virtualization environment for your projects. VPS server is designed for anyone for whom the efficiency or capacity of classical webhosting is not sufficient, or needs a special server setup.

Parameters Anonymous VPS – Full

  • KVM Virtualization (Kernel-based Virtual Machine)
  • Guaranteed memory 5 GB RAM
  • Guaranteed place on physical disc, Systém + Data 100GB
  • Guaranteed CPU 2×2.6 GHz
  • VNC/Spice remote display
  • Unmanaged, root access
  • Emails on the hosting server Free of charge
  • Free on request MyDreams Watcher(Read only monitoring)
  • Unlimited traffic
  • Configuration suitable for email marketing or VPN server too.
  • Operating system: CentOS 7, CentOS 8, Debian 10, Ubuntu 18.04
  • Up to 10 IP Addresses

Starting from $20/mo – ORDER NOW

Do you need administration?
– VPS Server Full with basic administration and ISPConfig3 administration interface HERE

Individual VPS server
– Do you need to create a VPS server with customized parameters? Contact us and we will create your VPS server as you wish.


  • Backed up connection to the backbone network
  • 1x IPv4 address
  • The location of the physical server is in the Master Praha datacenter in the new server room with high-performance racks. We have fully redundant full-duplex 10Gbps connectivity to NIX and abroad. Virtual servers have a 100Mbps Ethernet interface and share server connectivity.

Other features:

  • Everything runs in a fully virtualized environment
  • The client can use a custom installation of the system. We will gladly help with installing your own system.
  • Complete download of system image and thus fast migration / backup of VPS

If you have any questions, you are free to CONTACT US!

This doesn’t mean that you can engage in illegal activities, which we strictly forbid. This includes, but is not limited to, direct spam, phishing, fraud, some kind of pornography or anything which violate the Czech Republic or European Union laws.

.(tagsToTranslate)webmaster forum(t)internet marketing(t)search engine optimization(t)web designing(t)seo(t)ppc(t)affiliate marketing(t)search engine marketing(t)web hosting(t)domain name(t)social media

Does a signing provider has my private key (digital signatures)

For my essay im writing about digital signatures. Lets talk about an advanced digital signature which works with PKI (private-public key infrastructure). For example, im using ValidSign or GlobalSign service to digitally sign my document, do they have my private key to sign the document, or is it on my own machine? Im trying to understand why I should upload my document to a signing provider, why cant I just sign it on my machine and send it to the receiver?