Silk Road forums

Discussion => Security => Topic started by: fresh446 on September 10, 2012, 10:35 pm

Title: The use of standard unencrypted addresses and Prvnote.
Post by: fresh446 on September 10, 2012, 10:35 pm
I think that everyone in here ought to learn how to use and be running PGP, and or GPG. Sending your addrress unencrypted to some guys that have the best "C" in the world might get you a few packages in the mail, but it could also lead to trouble with LE. I did a small test with a kid in here to see if Prvnote is safe enough. I sent the link both in the shipping label box, and in a message. A day later he cancelled my order and said that the link was invalid. Prvnote lets you read the message once for like 15 seconds or so, then self destructs. On the other hand if LE or someone else read the link, then would that not cause it to have been read by someone other than the intended receiptiant? Come on people get smart and use PGP, or GPG they are compatable with each other. You won't last forever sending out "C" or other high profile items forever just asking the buyer to put his name in the box unencoed. Get Smart, if you think this sounds paranoid the ask yourself how many paranoid people are in jail? Isn't it work your freedom and less dangerous to play it smart. An average PGP key like the one I use is 2048bits, the internet only uses 128bit. Thats what you should be thinking about instead of thinking it's too hard and cumbersome. It's really not that hard, if you were smart enough to find silk road than you should already be using it right now. Life, Liberty, and Freedom my friend. Or a well spent time in the pen for thinking it will never come to that. Every dog has his day, get smart and use encryption it's one of the last tools the public has to keep information private.
Title: Re: The use of standard unencrypted addresses and Prvnote.
Post by: kmfkewm on September 12, 2012, 05:54 am
You can use up to AES 256 with GPG :). GPG uses a combination of asymmetric and symmetric keys. The asymmetric key is used to encrypt a session key which is used to symmetrically decrypt the message data. When you encrypt a GPG message, first a PRNG generates a random session key, then your message is encrypted with a symmetric algorithm such as AES 256 using the random session key, then the random session key is encrypted with the asymmetric public key (something like RSA 4,096). When the person you communicate with gets the ciphertext, first the GPG program prompts them for their passphrase, which is actually used to symmetrically decrypt their private asymmetric key, which is then used to decrypt the session key which is then used to decrypt the message.