windows – Recovery of the GPG private key from a Linux server to decrypt files on a Win 10 computer in production

I need to automatically retrieve the GPG private key from a Linux server to decrypt files on a Windows 10 computer in production.

There are some challenges here:

  1. How do I assure Windows 10 SCP to the Linux server that not everyone operating on the machine can perform this task?
  2. Where to store the private key to decrypt the material? I don't want the private key to be stolen by anyone. I've been thinking of a script that gets the key, imports it into a temporary GPG keystore, decrypts it and then deletes the keystore securely. But this goes far beyond security because everyone who has a little knowledge of batch scripts can recover the key anyway (see point 1).

Anyone have an idea for a secure design how to handle this?

fraud – How to obtain a private key for this address

Please note that you should never pay for a private Blockchain Wallet key. To receive bitcoin, you just need to provide the sender with a bitcoin address from your wallet.

I am sorry to hear about your experience. Very unfortunately, fraudsters have recently taken advantage of new users in the cryptocurrency space and their potential lack of knowledge about private keys, as well as certain features of our wallet. Our portfolio can NOT be used for mining and should NEVER be purchased, created or viewed by a third party. Anyone or party claiming otherwise should be considered malicious and avoided. If another party has NEVER had access to the wallet, it should be considered unsafe and should never be used to store funds. Indeed, any funds added or stored in such a wallet could still be compromised using its save phrase, despite changes to the password or two-factor authentication enabled.

Please note that in our wallet, a Bitcoin public address can be imported into the wallet as “ watch-only or non-spendable funds ''. This can be done with absolutely any address on the entire bitcoin network. This feature is often used by those who may have paper wallets or addresses stored in other wallets as a way to view and track funds without actually importing the private key of the bitcoin address into our wallet. The balance of addresses imported as “ funds to watch only or not spendable '' will NOT appear in the main balance of the wallet, because without the private key of this address, these funds are not spendable.

  • A private key is a data string that shows that you have access to bitcoins in a specific address. Think of a private key as a password specific to each address. Private keys are generated and stored in the wallet which was used to create the bitcoin address. Private keys should never be shared, as they allow the owner to spend the bitcoins of the associated bitcoin address via their cryptographic signature.

Without a private key, you do not have the ownership of an address or access to the funds it may contain. Fraudsters have used this feature maliciously to deceive those who do not know how private keys work and their needs for sending funds.

database design – How can I fill in a foreign key value after creating the first entry in the table to which the foreign key refers?

I am looking to create an online store so I arrived at the definition of the database. I want to have as few paintings as possible, so I reduced them to:

  1. Users
  2. Some products
  3. Orders
  4. Cart_Items

I arrived at the following diagram: image

The logic works as follows: For each product added to the basket, a new Cart_Item entry is created. But the Cart_Item entry must fill in the foreign key that references the Order table, which is cartItemOrderID. Since no order is created, it must first be null. Once the user has added all of the desired items to the cart, he places the order and a new order is created, so I now have the order ID. How could I pass this orderID to the entries in the Cart_Item table, since there is no way to tell that they were placed by the current user?

I'm missing something huge but I can't put my finger on it.

Kerberos: how to copy a key file on a UNIX / Linux host?

I created host/, with a random password. It should be copied to This is obviously not too difficult to do; what i'm looking for in a way that is both practical and secure.

Some methods that I have considered:

  • scp: target servers generally do not allow root login ssh; copy it to the home directory of a random user would first expose it to the user, you need to sudo cp, delete the original, check permissions … etc .
  • base64 encodes it on kdc, paste it into a running root shell base64 -d >/etc/krb5.keytab on the host. At least the host users don't see the keystore, but it can get stuck in the root shell history by mistake and looks a bit hacky.

… but all of these feel sub-optimal; someone must have created a procedure which can extend to many hosts, can become a single line and does not involve entering domain administrator passwords on computers random to join (… I would also be happy to hear about this being too paranoid on my part). Is there one?

gnupg – gpg – Unable to import public key from asc file

The title says it all. I am using Windows 10 Home with GPG version 2.2.19.

Whenever I try to import the asc file for the Tor browser using the command gpg --import torbrowser-install-win64-9.0.7_en-US.exe.asc, I get this fancy error:

gpg: no valid OpenPGP data found.

Likewise, this also happens when you try to check the installer itself with the key file using the command gpg --verify torbrowser-install-win64-9.0.7_en-US.exe.asc torbrowser-install-win64-9.0.7_en-US.exe:

gpg: Signature made 03/22/20 10:42:09 Eastern Daylight Time
gpg:                using RSA key EB774491D9FF06E2
gpg: Can't check signature: No public key

Trying out the answers in the tons of other guides here didn't help at all. Can i get help?

generate public key from private key with ecc

According to this answer:
When he wants to generate a public key of private key, he used K=k*G. but I cannot understand its result.
If we assume that our private key is (depending on the answer):


and according Secp256k1 G point is:

- Compressed form (prefix 02)
02 79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB 2DCE28D9 59F2815B 16F81798 

 - Uncompressed form (prefix 04)
04 79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB 2DCE28D9 59F2815B 16F81798
483ADA77 26A3C465 5DA4FBFC 0E1108A8 FD17B448 A6855419 9C47D08F FB10D4B8 

So, to calculate the public key, I used this site:

i used compressed form and private key:
0279BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798 * 0F479245FB19A38A1954C5C7C0EBAB2F9BDFD96A17563EF28A6A4B1A2A764EF4

and the result is:


but in this answer, the result is:


What's wrong?

Call function with JavaScript key

I am developing a calculator and I want that when I press the ENTER key, the entered account is finished. Can anyone help me?


There is a 90% drop in the number of people who invest through the initial coin supply (ICO). The reasons are fraudsters, exit scams, lack of regulation and pressure from several government agencies like SEC. However, certain strong alternatives such as the offer of security tokens (STO) have come to strengthen investor confidence.

Security Token Offers are a modern reliable fundraising method that would replace the traditional IPO method. It is believed that cryptocurrencies and tokens are gaining confidence in the investment market and will see a serious change with the development of STO. As government agencies support OCTs, it becomes a reliable investment option than ICO.

STOs are an opportunity for everyone to find a more accessible, affordable and secure way to invest in an entity. Are you the entrepreneur or startup who wanted to offer a security token? Benefit from expert consultation from Blockchain App Factory, a STO Development , which also offers various other blockchain-compatible services.

Let's see the 5 main advantages of offering security tokens:


Security tokens are often confused with utility tokens. Unlike utility tokens, which provide exclusive access to the services or products of the blockchain network and have no other value in themselves. While security tokens are financial instruments that have designed token assets, this gives ownership rights to:

I) Company property or share

ii) Dividend payments

iii) Credit commitments

iv) Company property or share


OCTs are most often misinterpreted as "updated versions of ICO", which is completely false. Fundraising via ICO via the use of cryptocurrency is like sourcing capital, in exchange for pre-sold rights to access the service when the product is ready.

The main problem with the initial supply of coins is that the atmosphere as a whole is devoid of any regulations and does not protect investors and the investments made.

But this is not the case with OCTs, some form of guidelines regulates it completely. This is a Tokenized title and some traditional laws applicable to it. This means that all companies requesting STOs must comply with government rules and regulations.


All scholarships and traditional scholarships are linked to predefined and strict working hours. Even when a significant problem arises when the market is closed, none can make a profit.

But security tokens are available 24/7. So, one can trade assets 24 hours a day and have a chance to receive new updates or events in a timely manner.


Blockchain technology provides a decentralized and uniform method of data tracking and forgery due to its immutable record. This infrastructure makes it possible to store ownership of securities in a completely transparent and secure manner.


Blockchain technology helps to divide traditional illiquid assets into asset tokens and those token assets, such as art, real estate or ancient monuments. Tokenization provides access to property for average investors on large projects, which traditionally belonged to people with significant capital.


The security token offering is gaining popularity among young startups and is becoming an attractive alternative to traditional IPOs and crowdfunding. The STO offers a faster, cheaper and more flexible way to raise the funds necessary for project development.

Are you the entrepreneur or startup who wanted to offer a security token? Contact Blockchain App Factory now for fast and reliable service.

. (tagsToTranslate) security token

How can you generate a Bitcoin public key from an existing private key using openssl?

I know you can generate a new pair of keys with an order like.

openssl ecparam -genkey -name secp256k1

And the resulting output will contain a New private key with the public key encoded.

Is it possible for openssl to generate the public key directly from an existing private key only?

Just to be clear, I mean the Bitcoin public key and not the public address