obfuscation: industry safe file format like .OFX Open Financial Exchange File

The .OFX Open Financial Exchange file is a file format created for financial data exchanges between financial institutions.

I was wondering if there is such a file format in the IT security arena.

My goal would be to use and customize it for my backend API entry points (that's another story, don't worry about that)

Type inference with imports – Computer Science Stack Exchange

I understand how a type inference algorithm infers types within a single file by building on already inferred types and identified constraints (for example, in the Hindley-Milner type system).

I wonder how this process works / is implemented for languages ​​where some links are imported from other files. I couldn't find any useful information anywhere else, so I thought I'd just try my luck here.

Obviously, the trivial approach would be to leave the imported binding typeless (for example, substitute a type variable) and continue adding constraints. Then, when the actual definition of the link is in the other file, it is verified that the constraints and the actual type can be unified.
This approach has the main drawback that it basically discards all type information regarding a link that may be present where it is defined.

Starting with that first approach, one could start by identifying an optimal order of file analysis. In the event that there are no circular dependencies, this additional step would solve the problem. But in many cases there are circular dependencies.

In TypeScript, for example (afaik), circular dependencies are allowed without loss of type information.

How is this problem generally handled in type inference algorithms?
Are there resources / documents that describe this problem?

Fill database drop-down menu – WordPress Development Stack Exchange

I am creating a custom plugin for our martial arts school and I have encountered a problem that is affecting me. I'm definitely missing something obvious, but I've never dealt with WordPress in this capacity before, instead of breaking my computer, I thought I'd ask the brains to trust what I'm doing wrong;)

the following code works perfectly and generates the dropdown menu:

but the following does not work from WordPress:

Am I not connecting to the database correctly?
Is there something else I'm missing?

I appreciate any help.
Thank you

appropriate – NonlinearModelFit – Mathematica Stack Exchange

I was trying to fit a model to the following experimental data:

data1 = {{0.00000000001, 100}, {1, 0.7}, {4, 0.03}, {24, 0.001}}

The first value was supposed to be 0.

NonlinearModelFit[data1, a x^-b, {a, b}, x]

resulted in the following equation: 0.390336/x^0.21896

The problem is that it does not fit the data.
Using the same data set in Excel, the following equation was obtained: 0.62/x^-2.03
and this equation fits the data.
What's wrong with the fit of the Mathematica model?

Lagrangian Constrained Optimization – Math Stack Exchange

Leave a positive def. sym. (5×5) matrix and r be a vector (size 5).
I'm trying to find a vector x that minimizes x ^ t Ax with the constraints that r ^ t * x> = median (r), x1 + x2 + x3 + x4 + x5<=1 (the elements of x must add up to a values less than or equal to 1), and all elements of x are >= 0.

They told me to use the Lagrangian and the enumeration to find min x, but I'm not sure what the lamda is for each of the 7 constraints.

Paper Wallet Clarification – Bitcoin Stack Exchange

For security and privacy reasons, I would advise you to create a new paper wallet and send the remaining balance to you. For privacy so you don't reuse the address and for security so you don't reveal your public key on the blockchain when passing the first transaction. Until the funds are spent in a wallet, only the hash of the public key is visible on the blockchain. After the funds are spent, the public key is revealed. It is not such a big problem, but it is safer not to reveal the public key, especially in terms of quantum security.

Privacy – Facebook Albums – Web Application Stack Exchange

Stack Exchange Network

The Stack Exchange network consists of 175 question and answer communities, including Stack Overflow, the largest and most trusted online community for developers to learn, share their insights, and develop their careers.

Visit Stack Exchange

hash – Argon2id Configuration – Information Stack Exchange

I read an article on how to use Argon2id Inc# here.

Below is the code they wrote (lightly edited):

using System;
using System.Diagnostics;
using System.Linq;
using System.Security.Cryptography;
using System.Text;
using Konscious.Security.Cryptography;   

namespace Playground
    class Program
        // No. of CPU Cores x 2.
        private const int DEGREE_OF_PARALLELISM = 16;

        // Recommended minimum value.
        private const int NUMBER_OF_ITERATIONS = 4;

        // 600 MB.
        private const int MEMORY_TO_USE_IN_KB = 600000;

        static void Main(string() args)
            var password = "SomeSecurePassword";               
            byte() salt = CreateSalt();
            byte() hash = HashPassword(password, salt);                

            var otherPassword = "SomeSecurePassword";                                
            var success = VerifyHash(otherPassword, salt, hash);                
            Console.WriteLine(success ? "Passwords match!" : "Passwords do not match.");                

        private static byte() CreateSalt()
            var buffer = new byte(16);
            var rng = new RNGCryptoServiceProvider();

            return buffer;

        private static byte() HashPassword(string password, byte() salt)
            var argon2id = new Argon2id(Encoding.UTF8.GetBytes(password));
            argon2id.Salt = salt;
            argon2id.DegreeOfParallelism = DEGREE_OF_PARALLELISM;
            argon2id.Iterations = NUMBER_OF_ITERATIONS;
            argon2id.MemorySize = MEMORY_TO_USE_IN_KB;

            return argon2id.GetBytes(16);

        private static bool VerifyHash(string password, byte() salt, byte() hash)
            var newHash = HashPassword(password, salt);
            return hash.SequenceEqual(newHash);

I have the following questions:

  1. At Konscious.Security.Cryptography README page, instead of argon2id.GetBytes(16), They are using argon2.GetBytes(128) which returns a longer value.

Assuming the settings are the same, it is the 128 safer approach than the 16 one because it is longer?

  1. From what I understand, the more memory we leave Argon2id use, the more secure it will be against custom hardware attacks.

So I guess even if 40 iterations with 70 MB Y 4 iterations with 600 MB It takes about the same time, the higher memory cost of the last configuration is justified because it is more secure. Is this correct?

my facebook page – Exchange web application stack

Stack Exchange Network

The Stack Exchange network consists of 175 question and answer communities, including Stack Overflow, the largest and most trusted online community for developers to learn, share their insights, and develop their careers.

Visit Stack Exchange

Transactions – Generate P2SH-P2WSH – Bitcoin Stack Exchange

I want to generate P2SH-P2WSH with the P2PKH script.

My public key is    03a8f285b5c972016ec2dde66b4501e2e94584f4aee8526f2ec661a3e6cc5f74f9

SHA256 and RIPEMD160 public key

 ---------- Witness Script --------- 

 ---------- scripthash --------- 
#SHA 256 of Witness script    

  ---------- Redeeem script ---------     
#add OP_0 (0x0020{32-byte scripthash})

  ---------- SCRIPTPUBKEY --------- 
#RIPEMD160(redeem script)
#OP_HASH160 hash160(redeemScript) OP_EQUAL

#C4A914f23bde7eee22aabca28164cb4b8a977834e5441b87 base58 cecksum

Now I want to try to move from this direction.

bitcoin-cli signrawtransactionwithkey $TX_DATA '("'$PK'")' '({"txid":"'$TXID'","vout":'$VOUT',"redeemScript":"'$REDEEMSCRIPT'","scriptPubKey":"'$SCRIPTPUBKEY'","witnessScript":"'$WITNESSCRIPT'","amount":"'$TOTAL_UTXO_AMOUNT'"})'

I receive this error

redeemScript does not correspond to witnessScript