Silk Road forums
Discussion => Newbie discussion => Topic started by: 357beerdrinker on February 11, 2013, 05:46 am
-
I read through the PGP threads and tutorial and installed the PGP software on my usb drive and went through the process of generating a key. I then created a test message, encrypted it using my own key and sent myself a test email to my tormail account. I was successfully able to copy/paste that email back into the PGP software and was able to decrypt the message and read the plain text.
It seems that I just need to make sure I copy someone's full public key when importing it the first time and the software will take care of the decryption. Then just use the PGP software to encrypt, then copy/paste that text into whatever message I'm sending out. (Assuming the recipient has already imported my own public key)
Am I missing anything obvious?
P.S. Yes, I already have truecrypt on my machine.
-
you got it. i was shaky about the process also, but thats it.
-
That's it. It is actually pretty simple and once you have a little practice encrypting and decrypting messages it works very smoothly. I hope when you made your public key you used your silk road name. If not, when you get a vendor like me who has tons of keys and I go to send you a message after importing your key, I won't know which one is yours. Some people miss this very important point. If I had only a couple of keys it wouldn't matter much, but remember I am importing a public key for everyone that I reply to with encryption.
-
Thanks for confirming. Yes, I did make sure to use my SR name when creating the key since I had read that it would cause confusion and additional work on anyone I send it to. Now I just gotta procure some BTC and I'm ready to do some shopping. Oh, and it's tax season too. I believe big brother owes me some money so I'll take those unused taxes and purchase some party supplies.
-
3 hours per session, 5 beers an event, 7 nites of the weeks' got it, but for those other first time pgp users,
one will be messaging someone else who already has their public key posted on some listing or vendor page, (or even in the clearweb world), can advertise their public key.
you copy into your key manager their public key.
on any message you send anyone you are new to doing business with , you encrypt whatever info is necessary to communicate "TO" them, it spits out a buncha garble.
you copy /paste into the address field on "add to cart"/ or "message user/vendor" the encrypted garble from the previous step (of whatever the tor bundle software provides).
to make things easier for everyone, attach your public key to the top or bottom of the message (you just encrypted) so the recipient of all that garble can more efficiently decode it as to not check the forum for your specific username public key.
typically when sending a message, i use the above steps. i will have a-
---a buncha pgp garble---(ecrypted to whoever)
and
---my public pgp key---
so as they can respond efficiently.
-
It seems that I just need to make sure I copy someone's full public key when importing it the first time and the software will take care of the decryption. Then just use the PGP software to encrypt, then copy/paste that text into whatever message I'm sending out. (Assuming the recipient has already imported my own public key)
Am I missing anything obvious?
P.S. Yes, I already have truecrypt on my machine.
If you'd like to do a test run, feel free to use my public key :)
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.11 (MingW32)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=ajRp
-----END PGP PUBLIC KEY BLOCK-----
-
@ Princess, thank you for the offer. I will PM you tomorrow as I've already disconnected my USB. I think I'll move all the files from this one onto my IronKey tomorrow and secure-wipe this one. I could truecrypt the USB but from what I've read, the Ironkey's haven't been hacked yet and I just didn't have it on me today.
Thanks everyone for the responses and support. Security is everyone's part to play.
-
@ Princess, thank you for the offer. I will PM you tomorrow as I've already disconnected my USB. I think I'll move all the files from this one onto my IronKey tomorrow and secure-wipe this one. I could truecrypt the USB but from what I've read, the Ironkey's haven't been hacked yet and I just didn't have it on me today.
Thanks everyone for the responses and support. Security is everyone's part to play.
It's refreshing to see a new user who has throughly done his research on PGP and safe storage practices prior to making his first tranaction and cares about his safety and security, well done 357beerdrinker for being a responsible SilkRoad member. Feel free to pm me whenever you're ready, I'm more than happy to help you :)