Store Credit Card Information in Password Manager?Store credit card numbers in password manager?Protecting my high-value passwords against offline attacksHow to securely store and manage one-time backup codes for 2FA?How to reduce trouble in case I lose access to my password manager?Password managers with U2F security risksEncrypted volume vs password manager - security benefitsPassword generation scheme using master password, site-name, and usernamePassword management with two factor authenticationHardware-Based Password ManagerStore credit card numbers in password manager?How should clients' passwords be managed?

Books on the History of math research at European universities

Are Warlocks Arcane or Divine?

Is there a good way to store credentials outside of a password manager?

A known event to a history junkie

Why is delta-v is the most useful quantity for planning space travel?

Visiting the UK as unmarried couple

How will losing mobility of one hand affect my career as a programmer?

A workplace installs custom certificates on personal devices, can this be used to decrypt HTTPS traffic?

Why isn't KTEX's runway designation 10/28 instead of 9/27?

Is there enough fresh water in the world to eradicate the drinking water crisis?

Pronouncing Homer as in modern Greek

Word describing multiple paths to the same abstract outcome

Giant Toughroad SLR 2 for 200 miles in two days, will it make it?

node command while defining a coordinate in TikZ

Female=gender counterpart?

Partial sums of primes

What is the term when two people sing in harmony, but they aren't singing the same notes?

Latex for-and in equation

Reply ‘no position’ while the job posting is still there (‘HiWi’ position in Germany)

In Star Trek IV, why did the Bounty go back to a time when whales were already rare?

Could solar power be utilized and substitute coal in the 19th century?

Identify a stage play about a VR experience in which participants are encouraged to simulate performing horrific activities

For airliners, what prevents wing strikes on landing in bad weather?

Lifted its hind leg on or lifted its hind leg towards?



Store Credit Card Information in Password Manager?


Store credit card numbers in password manager?Protecting my high-value passwords against offline attacksHow to securely store and manage one-time backup codes for 2FA?How to reduce trouble in case I lose access to my password manager?Password managers with U2F security risksEncrypted volume vs password manager - security benefitsPassword generation scheme using master password, site-name, and usernamePassword management with two factor authenticationHardware-Based Password ManagerStore credit card numbers in password manager?How should clients' passwords be managed?













19















For convenience purposes I manage my passwords with the password manager Bitwarden on my personal computer and smartphone with autofill function (but with asking for the master password or fingerprint first every time).



I was just thinking about also adding my credit card information (which is used to log into the online banking stuff) to my vault, but since that seems like such important data, I'm not sure if it would be safe or if this even is a good idea. Any opinions?




I also saw this question on here, but it rather deals with whether that is reasonable from a law standpoint.










share|improve this question




























    19















    For convenience purposes I manage my passwords with the password manager Bitwarden on my personal computer and smartphone with autofill function (but with asking for the master password or fingerprint first every time).



    I was just thinking about also adding my credit card information (which is used to log into the online banking stuff) to my vault, but since that seems like such important data, I'm not sure if it would be safe or if this even is a good idea. Any opinions?




    I also saw this question on here, but it rather deals with whether that is reasonable from a law standpoint.










    share|improve this question


























      19












      19








      19


      2






      For convenience purposes I manage my passwords with the password manager Bitwarden on my personal computer and smartphone with autofill function (but with asking for the master password or fingerprint first every time).



      I was just thinking about also adding my credit card information (which is used to log into the online banking stuff) to my vault, but since that seems like such important data, I'm not sure if it would be safe or if this even is a good idea. Any opinions?




      I also saw this question on here, but it rather deals with whether that is reasonable from a law standpoint.










      share|improve this question
















      For convenience purposes I manage my passwords with the password manager Bitwarden on my personal computer and smartphone with autofill function (but with asking for the master password or fingerprint first every time).



      I was just thinking about also adding my credit card information (which is used to log into the online banking stuff) to my vault, but since that seems like such important data, I'm not sure if it would be safe or if this even is a good idea. Any opinions?




      I also saw this question on here, but it rather deals with whether that is reasonable from a law standpoint.







      passwords password-management password-cracking credit-card






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Mar 22 at 16:58









      schroeder

      78k30173209




      78k30173209










      asked Mar 22 at 16:42









      SuimonSuimon

      2107




      2107




















          2 Answers
          2






          active

          oldest

          votes


















          35














          The question might come down to: which piece of data has a higher level of risk, your passwords or your credit card info?



          Your passwords can be used without you ever knowing about it. Passwords let someone into every aspect of your life with, potentially, every secret bit of information about you that you hold. So, it is possible for someone with your password to completely take over your life without you being aware until it is too late.



          Credit card use will be noticed on your next statement, or as soon as your card company posts its use. You also have several types of recourse to dispute charges and have them reversed.



          One might suggest that credit cards can be used to set up new cards or other lines of credit, but the same could be said with the information provided by passwords.



          Passwords are the higher risk. Credit card info has numerous mitigations in place to protect you.



          So, if you trust your password manager with your passwords, there is no increased risk with trusting it with your credit cards. There is always the inherent risk of recording any of this sensitive information, but if you have already accepted that risk for your passwords, then your credit card info does not materially increase your risks.






          share|improve this answer

























          • That's what I believe. I think it's important to explain that but I'm not brave enough to tell other people it's okay. It might not be the same outside the US due to legal or economic reasons.

            – Future Security
            Mar 22 at 17:28











          • @FutureSecurity What are you talking about? I mentioned several things that you could be referring to. (and I'm not in the US).

            – schroeder
            Mar 22 at 17:30











          • That stolen passwords can be more damaging than a stolen credit card number. (And I think that I read that UK law, compared to US law, put more responsibility on customers for the security of their own accounts including pins and passwords.)

            – Future Security
            Mar 22 at 17:32












          • Banks have been putting mitigations in place for decades to handle credit card fraud. It can be a hassle, and it can even cost a lot, but relatively very little in comparison to what can be done with access to the right password.

            – schroeder
            Mar 22 at 17:38






          • 1





            @JohnWu your statements make no sense. I'm not talking about value but about risk. You assume the passwords stored are generated by the tool. There is nothing in the question to support that assumption. Credit card numbers are not exactly secret and the numbers themselves do not have "black market value". Family could use the numbers? Sure. they also have physical access to the credit cards. So, all of your statements make no sense at all.

            – schroeder
            yesterday


















          5














          Password managers can store any kind of secret. (Or at least short plaintext strings.) I have no idea how safe your specific password manager is.



          A closed vault should be as secure as your password is. If the vault is opened on some computer, then that machine needs to be trusted. (No key loggers, hardware trojans, snooping super users, etc.)



          A good password hashing algorithm allows no method of password cracking better than guess -and-check. The vault will be as difficult to decrypt without the password as it is difficult to guess your password. (That's not technically true because the encryption will likely have a maximum strength of 256 bits. However, that doesn't matter because your master password will be weaker than a 256-bit key and any more than 128-bit security is good enough.)



          If your master password is quite strong then it's probably fine, as long as the computer used and the password manager used is secure.



          You could also put information in a second vault protected by a stronger master password. That vault also could be put on a well guarded thumb drive. (Which could reduce a hacker's opportunity to break open the closed vault if the thumb drive isn't plugged in when you don't need it and the drive is well guarded.)



          It's not necessary to store the vault somewhere else if your password is strong enough.



          Make sure the password manager software is something you trust. (Proprietary software is automatically sketchy to me.)






          share|improve this answer






















            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "162"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: false,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f205894%2fstore-credit-card-information-in-password-manager%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            2 Answers
            2






            active

            oldest

            votes








            2 Answers
            2






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            35














            The question might come down to: which piece of data has a higher level of risk, your passwords or your credit card info?



            Your passwords can be used without you ever knowing about it. Passwords let someone into every aspect of your life with, potentially, every secret bit of information about you that you hold. So, it is possible for someone with your password to completely take over your life without you being aware until it is too late.



            Credit card use will be noticed on your next statement, or as soon as your card company posts its use. You also have several types of recourse to dispute charges and have them reversed.



            One might suggest that credit cards can be used to set up new cards or other lines of credit, but the same could be said with the information provided by passwords.



            Passwords are the higher risk. Credit card info has numerous mitigations in place to protect you.



            So, if you trust your password manager with your passwords, there is no increased risk with trusting it with your credit cards. There is always the inherent risk of recording any of this sensitive information, but if you have already accepted that risk for your passwords, then your credit card info does not materially increase your risks.






            share|improve this answer

























            • That's what I believe. I think it's important to explain that but I'm not brave enough to tell other people it's okay. It might not be the same outside the US due to legal or economic reasons.

              – Future Security
              Mar 22 at 17:28











            • @FutureSecurity What are you talking about? I mentioned several things that you could be referring to. (and I'm not in the US).

              – schroeder
              Mar 22 at 17:30











            • That stolen passwords can be more damaging than a stolen credit card number. (And I think that I read that UK law, compared to US law, put more responsibility on customers for the security of their own accounts including pins and passwords.)

              – Future Security
              Mar 22 at 17:32












            • Banks have been putting mitigations in place for decades to handle credit card fraud. It can be a hassle, and it can even cost a lot, but relatively very little in comparison to what can be done with access to the right password.

              – schroeder
              Mar 22 at 17:38






            • 1





              @JohnWu your statements make no sense. I'm not talking about value but about risk. You assume the passwords stored are generated by the tool. There is nothing in the question to support that assumption. Credit card numbers are not exactly secret and the numbers themselves do not have "black market value". Family could use the numbers? Sure. they also have physical access to the credit cards. So, all of your statements make no sense at all.

              – schroeder
              yesterday















            35














            The question might come down to: which piece of data has a higher level of risk, your passwords or your credit card info?



            Your passwords can be used without you ever knowing about it. Passwords let someone into every aspect of your life with, potentially, every secret bit of information about you that you hold. So, it is possible for someone with your password to completely take over your life without you being aware until it is too late.



            Credit card use will be noticed on your next statement, or as soon as your card company posts its use. You also have several types of recourse to dispute charges and have them reversed.



            One might suggest that credit cards can be used to set up new cards or other lines of credit, but the same could be said with the information provided by passwords.



            Passwords are the higher risk. Credit card info has numerous mitigations in place to protect you.



            So, if you trust your password manager with your passwords, there is no increased risk with trusting it with your credit cards. There is always the inherent risk of recording any of this sensitive information, but if you have already accepted that risk for your passwords, then your credit card info does not materially increase your risks.






            share|improve this answer

























            • That's what I believe. I think it's important to explain that but I'm not brave enough to tell other people it's okay. It might not be the same outside the US due to legal or economic reasons.

              – Future Security
              Mar 22 at 17:28











            • @FutureSecurity What are you talking about? I mentioned several things that you could be referring to. (and I'm not in the US).

              – schroeder
              Mar 22 at 17:30











            • That stolen passwords can be more damaging than a stolen credit card number. (And I think that I read that UK law, compared to US law, put more responsibility on customers for the security of their own accounts including pins and passwords.)

              – Future Security
              Mar 22 at 17:32












            • Banks have been putting mitigations in place for decades to handle credit card fraud. It can be a hassle, and it can even cost a lot, but relatively very little in comparison to what can be done with access to the right password.

              – schroeder
              Mar 22 at 17:38






            • 1





              @JohnWu your statements make no sense. I'm not talking about value but about risk. You assume the passwords stored are generated by the tool. There is nothing in the question to support that assumption. Credit card numbers are not exactly secret and the numbers themselves do not have "black market value". Family could use the numbers? Sure. they also have physical access to the credit cards. So, all of your statements make no sense at all.

              – schroeder
              yesterday













            35












            35








            35







            The question might come down to: which piece of data has a higher level of risk, your passwords or your credit card info?



            Your passwords can be used without you ever knowing about it. Passwords let someone into every aspect of your life with, potentially, every secret bit of information about you that you hold. So, it is possible for someone with your password to completely take over your life without you being aware until it is too late.



            Credit card use will be noticed on your next statement, or as soon as your card company posts its use. You also have several types of recourse to dispute charges and have them reversed.



            One might suggest that credit cards can be used to set up new cards or other lines of credit, but the same could be said with the information provided by passwords.



            Passwords are the higher risk. Credit card info has numerous mitigations in place to protect you.



            So, if you trust your password manager with your passwords, there is no increased risk with trusting it with your credit cards. There is always the inherent risk of recording any of this sensitive information, but if you have already accepted that risk for your passwords, then your credit card info does not materially increase your risks.






            share|improve this answer















            The question might come down to: which piece of data has a higher level of risk, your passwords or your credit card info?



            Your passwords can be used without you ever knowing about it. Passwords let someone into every aspect of your life with, potentially, every secret bit of information about you that you hold. So, it is possible for someone with your password to completely take over your life without you being aware until it is too late.



            Credit card use will be noticed on your next statement, or as soon as your card company posts its use. You also have several types of recourse to dispute charges and have them reversed.



            One might suggest that credit cards can be used to set up new cards or other lines of credit, but the same could be said with the information provided by passwords.



            Passwords are the higher risk. Credit card info has numerous mitigations in place to protect you.



            So, if you trust your password manager with your passwords, there is no increased risk with trusting it with your credit cards. There is always the inherent risk of recording any of this sensitive information, but if you have already accepted that risk for your passwords, then your credit card info does not materially increase your risks.







            share|improve this answer














            share|improve this answer



            share|improve this answer








            edited 2 days ago

























            answered Mar 22 at 17:04









            schroederschroeder

            78k30173209




            78k30173209












            • That's what I believe. I think it's important to explain that but I'm not brave enough to tell other people it's okay. It might not be the same outside the US due to legal or economic reasons.

              – Future Security
              Mar 22 at 17:28











            • @FutureSecurity What are you talking about? I mentioned several things that you could be referring to. (and I'm not in the US).

              – schroeder
              Mar 22 at 17:30











            • That stolen passwords can be more damaging than a stolen credit card number. (And I think that I read that UK law, compared to US law, put more responsibility on customers for the security of their own accounts including pins and passwords.)

              – Future Security
              Mar 22 at 17:32












            • Banks have been putting mitigations in place for decades to handle credit card fraud. It can be a hassle, and it can even cost a lot, but relatively very little in comparison to what can be done with access to the right password.

              – schroeder
              Mar 22 at 17:38






            • 1





              @JohnWu your statements make no sense. I'm not talking about value but about risk. You assume the passwords stored are generated by the tool. There is nothing in the question to support that assumption. Credit card numbers are not exactly secret and the numbers themselves do not have "black market value". Family could use the numbers? Sure. they also have physical access to the credit cards. So, all of your statements make no sense at all.

              – schroeder
              yesterday

















            • That's what I believe. I think it's important to explain that but I'm not brave enough to tell other people it's okay. It might not be the same outside the US due to legal or economic reasons.

              – Future Security
              Mar 22 at 17:28











            • @FutureSecurity What are you talking about? I mentioned several things that you could be referring to. (and I'm not in the US).

              – schroeder
              Mar 22 at 17:30











            • That stolen passwords can be more damaging than a stolen credit card number. (And I think that I read that UK law, compared to US law, put more responsibility on customers for the security of their own accounts including pins and passwords.)

              – Future Security
              Mar 22 at 17:32












            • Banks have been putting mitigations in place for decades to handle credit card fraud. It can be a hassle, and it can even cost a lot, but relatively very little in comparison to what can be done with access to the right password.

              – schroeder
              Mar 22 at 17:38






            • 1





              @JohnWu your statements make no sense. I'm not talking about value but about risk. You assume the passwords stored are generated by the tool. There is nothing in the question to support that assumption. Credit card numbers are not exactly secret and the numbers themselves do not have "black market value". Family could use the numbers? Sure. they also have physical access to the credit cards. So, all of your statements make no sense at all.

              – schroeder
              yesterday
















            That's what I believe. I think it's important to explain that but I'm not brave enough to tell other people it's okay. It might not be the same outside the US due to legal or economic reasons.

            – Future Security
            Mar 22 at 17:28





            That's what I believe. I think it's important to explain that but I'm not brave enough to tell other people it's okay. It might not be the same outside the US due to legal or economic reasons.

            – Future Security
            Mar 22 at 17:28













            @FutureSecurity What are you talking about? I mentioned several things that you could be referring to. (and I'm not in the US).

            – schroeder
            Mar 22 at 17:30





            @FutureSecurity What are you talking about? I mentioned several things that you could be referring to. (and I'm not in the US).

            – schroeder
            Mar 22 at 17:30













            That stolen passwords can be more damaging than a stolen credit card number. (And I think that I read that UK law, compared to US law, put more responsibility on customers for the security of their own accounts including pins and passwords.)

            – Future Security
            Mar 22 at 17:32






            That stolen passwords can be more damaging than a stolen credit card number. (And I think that I read that UK law, compared to US law, put more responsibility on customers for the security of their own accounts including pins and passwords.)

            – Future Security
            Mar 22 at 17:32














            Banks have been putting mitigations in place for decades to handle credit card fraud. It can be a hassle, and it can even cost a lot, but relatively very little in comparison to what can be done with access to the right password.

            – schroeder
            Mar 22 at 17:38





            Banks have been putting mitigations in place for decades to handle credit card fraud. It can be a hassle, and it can even cost a lot, but relatively very little in comparison to what can be done with access to the right password.

            – schroeder
            Mar 22 at 17:38




            1




            1





            @JohnWu your statements make no sense. I'm not talking about value but about risk. You assume the passwords stored are generated by the tool. There is nothing in the question to support that assumption. Credit card numbers are not exactly secret and the numbers themselves do not have "black market value". Family could use the numbers? Sure. they also have physical access to the credit cards. So, all of your statements make no sense at all.

            – schroeder
            yesterday





            @JohnWu your statements make no sense. I'm not talking about value but about risk. You assume the passwords stored are generated by the tool. There is nothing in the question to support that assumption. Credit card numbers are not exactly secret and the numbers themselves do not have "black market value". Family could use the numbers? Sure. they also have physical access to the credit cards. So, all of your statements make no sense at all.

            – schroeder
            yesterday













            5














            Password managers can store any kind of secret. (Or at least short plaintext strings.) I have no idea how safe your specific password manager is.



            A closed vault should be as secure as your password is. If the vault is opened on some computer, then that machine needs to be trusted. (No key loggers, hardware trojans, snooping super users, etc.)



            A good password hashing algorithm allows no method of password cracking better than guess -and-check. The vault will be as difficult to decrypt without the password as it is difficult to guess your password. (That's not technically true because the encryption will likely have a maximum strength of 256 bits. However, that doesn't matter because your master password will be weaker than a 256-bit key and any more than 128-bit security is good enough.)



            If your master password is quite strong then it's probably fine, as long as the computer used and the password manager used is secure.



            You could also put information in a second vault protected by a stronger master password. That vault also could be put on a well guarded thumb drive. (Which could reduce a hacker's opportunity to break open the closed vault if the thumb drive isn't plugged in when you don't need it and the drive is well guarded.)



            It's not necessary to store the vault somewhere else if your password is strong enough.



            Make sure the password manager software is something you trust. (Proprietary software is automatically sketchy to me.)






            share|improve this answer



























              5














              Password managers can store any kind of secret. (Or at least short plaintext strings.) I have no idea how safe your specific password manager is.



              A closed vault should be as secure as your password is. If the vault is opened on some computer, then that machine needs to be trusted. (No key loggers, hardware trojans, snooping super users, etc.)



              A good password hashing algorithm allows no method of password cracking better than guess -and-check. The vault will be as difficult to decrypt without the password as it is difficult to guess your password. (That's not technically true because the encryption will likely have a maximum strength of 256 bits. However, that doesn't matter because your master password will be weaker than a 256-bit key and any more than 128-bit security is good enough.)



              If your master password is quite strong then it's probably fine, as long as the computer used and the password manager used is secure.



              You could also put information in a second vault protected by a stronger master password. That vault also could be put on a well guarded thumb drive. (Which could reduce a hacker's opportunity to break open the closed vault if the thumb drive isn't plugged in when you don't need it and the drive is well guarded.)



              It's not necessary to store the vault somewhere else if your password is strong enough.



              Make sure the password manager software is something you trust. (Proprietary software is automatically sketchy to me.)






              share|improve this answer

























                5












                5








                5







                Password managers can store any kind of secret. (Or at least short plaintext strings.) I have no idea how safe your specific password manager is.



                A closed vault should be as secure as your password is. If the vault is opened on some computer, then that machine needs to be trusted. (No key loggers, hardware trojans, snooping super users, etc.)



                A good password hashing algorithm allows no method of password cracking better than guess -and-check. The vault will be as difficult to decrypt without the password as it is difficult to guess your password. (That's not technically true because the encryption will likely have a maximum strength of 256 bits. However, that doesn't matter because your master password will be weaker than a 256-bit key and any more than 128-bit security is good enough.)



                If your master password is quite strong then it's probably fine, as long as the computer used and the password manager used is secure.



                You could also put information in a second vault protected by a stronger master password. That vault also could be put on a well guarded thumb drive. (Which could reduce a hacker's opportunity to break open the closed vault if the thumb drive isn't plugged in when you don't need it and the drive is well guarded.)



                It's not necessary to store the vault somewhere else if your password is strong enough.



                Make sure the password manager software is something you trust. (Proprietary software is automatically sketchy to me.)






                share|improve this answer













                Password managers can store any kind of secret. (Or at least short plaintext strings.) I have no idea how safe your specific password manager is.



                A closed vault should be as secure as your password is. If the vault is opened on some computer, then that machine needs to be trusted. (No key loggers, hardware trojans, snooping super users, etc.)



                A good password hashing algorithm allows no method of password cracking better than guess -and-check. The vault will be as difficult to decrypt without the password as it is difficult to guess your password. (That's not technically true because the encryption will likely have a maximum strength of 256 bits. However, that doesn't matter because your master password will be weaker than a 256-bit key and any more than 128-bit security is good enough.)



                If your master password is quite strong then it's probably fine, as long as the computer used and the password manager used is secure.



                You could also put information in a second vault protected by a stronger master password. That vault also could be put on a well guarded thumb drive. (Which could reduce a hacker's opportunity to break open the closed vault if the thumb drive isn't plugged in when you don't need it and the drive is well guarded.)



                It's not necessary to store the vault somewhere else if your password is strong enough.



                Make sure the password manager software is something you trust. (Proprietary software is automatically sketchy to me.)







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Mar 22 at 17:21









                Future SecurityFuture Security

                1,101212




                1,101212



























                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Information Security Stack Exchange!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f205894%2fstore-credit-card-information-in-password-manager%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    -credit-card, password-cracking, password-management, passwords

                    Popular posts from this blog

                    Mobil Contents History Mobil brands Former Mobil brands Lukoil transaction Mobil UK Mobil Australia Mobil New Zealand Mobil Greece Mobil in Japan Mobil in Canada Mobil Egypt See also References External links Navigation menuwww.mobil.com"Mobil Corporation"the original"Our Houston campus""Business & Finance: Socony-Vacuum Corp.""Popular Mechanics""Lubrite Technologies""Exxon Mobil campus 'clearly happening'""Toledo Blade - Google News Archive Search""The Lion and the Moose - How 2 Executives Pulled off the Biggest Merger Ever""ExxonMobil Press Release""Lubricants""Archived copy"the original"Mobil 1™ and Mobil Super™ motor oil and synthetic motor oil - Mobil™ Motor Oils""Mobil Delvac""Mobil Industrial website""The State of Competition in Gasoline Marketing: The Effects of Refiner Operations at Retail""Mobil Travel Guide to become Forbes Travel Guide""Hotel Rankings: Forbes Merges with Mobil"the original"Jamieson oil industry history""Mobil news""Caltex pumps for control""Watchdog blocks Caltex bid""Exxon Mobil sells service station network""Mobil Oil New Zealand Limited is New Zealand's oldest oil company, with predecessor companies having first established a presence in the country in 1896""ExxonMobil subsidiaries have a business history in New Zealand stretching back more than 120 years. We are involved in petroleum refining and distribution and the marketing of fuels, lubricants and chemical products""Archived copy"the original"Exxon Mobil to Sell Its Japanese Arm for $3.9 Billion""Gas station merger will end Esso and Mobil's long run in Japan""Esso moves to affiliate itself with PC Optimum, no longer Aeroplan, in loyalty point switch""Mobil brand of gas stations to launch in Canada after deal for 213 Loblaws-owned locations""Mobil Nears Completion of Rebranding 200 Loblaw Gas Stations""Learn about ExxonMobil's operations in Egypt""Petrol and Diesel Service Stations in Egypt - Mobil"Official websiteExxon Mobil corporate websiteMobil Industrial official websiteeeeeeeeDA04275022275790-40000 0001 0860 5061n82045453134887257134887257

                    Frič See also Navigation menuinternal link

                    Identify plant with long narrow paired leaves and reddish stems Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern) Announcing the arrival of Valued Associate #679: Cesar Manara Unicorn Meta Zoo #1: Why another podcast?What is this plant with long sharp leaves? Is it a weed?What is this 3ft high, stalky plant, with mid sized narrow leaves?What is this young shrub with opposite ovate, crenate leaves and reddish stems?What is this plant with large broad serrated leaves?Identify this upright branching weed with long leaves and reddish stemsPlease help me identify this bulbous plant with long, broad leaves and white flowersWhat is this small annual with narrow gray/green leaves and rust colored daisy-type flowers?What is this chilli plant?Does anyone know what type of chilli plant this is?Help identify this plant