• 🇬🇧󠁿 🇸🇪 🇿🇦 🇮🇪 🇬🇭 🇩🇪 🇪🇺
    European & African
    Drug Discussion


    Welcome Guest!
    Posting Rules Bluelight Rules
  • EADD Moderators: Pissed_and_messed | Shinji Ikari

Misc Are darknet markets worth it?

Manjaro is a rolling release so it gets major software updates every couple of weeks instead of every six months like Ubuntu. The benefit is an always up to date system with all the latest features, the trade off is having to run large updates more often and you're more likely to encounter bugs.

Edit: btw, did you know that the letters in WINE actually stand for "Wine Is Not an Emulator"? That always tickled me.
Do you know a good wallet?
 
Windows: Exodus wallet (BTC+XMR+others)
Mobile: Cake wallet (BTC+XMR+others)
Tails: XMR GUI wallet (XMR only)

Cake and Exodus can both be used to exchange BTC/LTC for XMR if you're not able to purchase it directly.
Thanks a lot!! Youre a master! Haha I much appreciate your amiability.
Theres a couple of years that I dont navigate on DN and Im a bit old-fashioned if I can say. Just today I installed exodous in my phone, just to explore a little.

Thanks again! Are you a man or a woman if I may ask?
 

Tails

Tails is a free and open source operating system that runs on a USB stick and protects you from surveillance and censorship. It uses the Tor network to anonymize your online activity and includes tools for sensitive documents and communication.
 

Tails

Tails is a free and open source operating system that runs on a USB stick and protects you from surveillance and censorship. It uses the Tor network to anonymize your online activity and includes tools for sensitive documents and communication.
Yeah so basically it's for buying drugs online.
 
@Shinji Ikari (or anyone else who's up on all this)

So I finally watched a couple of 'pgp encryption using Tails' tutorials the other day. They were very good, and everything was explained very well, and it all makes sense, but there's just so many steps involved! There must be at least 50 steps to take in order to send and receive a message!

It defintely is a pretty steep barrier or learning curve to get over in order to begin. It must put a lot of people off.

It's going to be pretty time consuming first time I do it, if I do go ahead. But of course it should get easier after that.

And that's not including looking into installing Tails on a USB stick. Not done that yet. If everything wipes every time you remove the USB, presumably it'll be a lot more 'work' every time you want to send or receive a message? Rather than just having it on your main HDD, where at least your IDs and private keys etc would all be stored?
 
Last edited:
@Shinji Ikari (or anyone else who's up on all this
Okie dokie.
So I finally watched a couple of 'pgp encryption using Tails' tutorials the other day. They were very good, and everything was explained very well, and it all makes sense, but there's just so many steps involved! There must be at least 50 steps to take in order to send and receive a message
It's just a whole lot of copy and pasting. I don't know which tutorial you watched or how old it is but the current PGP app used on tails is called Kleopatra. You'll also be wanting to use a password manager which on tails is called keepass. These apps both come pre-installed when you install tails.

Basically when you want to to write a message it goes something like this:

1-copy the public PGP key of the person you want to message and save it as a text file

2-double click said text file and select 'open with kleopatra'. This will import the key into kleopatra for later use.

3-open kleopatra and navigate to the 'notepad' tab

4-write your message

5-switch to the recipient tab and check the 'encrypt for others box' and select PGP key of the person you wish to message. Uncheck all other boxes

6-click encrypt

7-thats it

Receiving a message is even easier. First you create you own key pair which consists of a public key like the one you used to send a message and a private key which is basically just a password you use to decrypt messages sent to you using your public key. I expect the video you watched will have covered this. Then to decrypt a message encrypted using your public key you just paste it into the notepad, click decrypt and enter your password (private key) and the message will open.

Each of these processes only takes a few seconds once you've done your initial set up.

Usually the only time you need to receive PGP messages is for two factor authentication when logging into certain websites, and the only time you need to send them is when sending sensitive information such as your name and address to someone.
And that's not including looking into installing Tails on a USB stick. Not done that yet. If everything wipes every time you remove the USB, presumably it'll be a lot more 'work' every time you want to send or receive a message
When you boot it up for the first time you'll be able to create a persistent folder which is where all your passwords wallets PGP keys etc are stored. This is encrypted and unlocked with a password every time you log in.
It's going to be pretty time consuming first time I do it, if I do go ahead. But of course it should get easier after that.
What I did to learn all this was download the DNM bible and pop it on my phone. I just read through it bit by bit over a couple of weeks while browsing the newbie section on dread. Like you say, once you know it is easy. It all sounds a lot more complicated on paper than it actually is.

Edit: just cleaning up my language
 
Last edited:
Awesome. Thank you.

The tutorials I watched were very very detailed and thorough, and only 2 months old, so they should be current.

I watched this one



and his preceeding 'introduction to pgp' (which I did need to provide a foundational understanding of pgp encryption)

There seems to be a hell of a lot less steps in your method, but in the tutorial he went deep into every single little action you'll need to perform. I kind of need that, as when learning certain types of new stuff, things that may be obvious to others and not need to be stated, are not so for me. And I think that will be the case here!
 
Last edited:
There seems to be a hell of a lot less steps in your method, but in the tutorial he went deep into every single little action you'll need to perform. I kind of need that, as when learning certain types of new stuff, things that may be obvious to others and not need to be stated, are not so for me. And I think that will be the case here
It is daunting at first. I've been playing around with these things for a few years so it's all automatic now.

That video seems to explain things well, but he's either using a very outdated version of tails or tails has very recently changed something because last time I checked tails had removed their native "password and keys" app in favour of kleopatra. I would suggest downloading and installing the latest version of tails before going any further down the PGP rabbit hole so you know exactly which applications you're going to be using.

I think it's also a lot easier to learn when you have these things open in front of you. We all learn differently but in my case at least I find it difficult to retain I formation from videos when I'm not actively using that information or when I don't have anything to contextualize it against, but that's just me and my brain.
 
Thanks for the further help.

Yes I was going to go through the video (or another one, or your steps, if I end up with a different version of Tails) and actively perform the steps. I just did an initial kind of run through the other day, just to see what's involved.

I definitely agree that the best way of learning many things, is to learn by actually doing them.
 
Tails is probably overkill if you're not dealing

Some markets don't force you to use PGP but the only one I'm aware of at the moment does

Edit: Removed incorrect information regarding PGP
 
Last edited:
You encrypt the messages with your Private key, the receiver unencrypts them with your public key

If you receive an encrypted message you unencrypt it with the senders public key
I think you have this the wrong way around. You use the public key of the person you are messaging to encrypt the message and they use the attached private key to decrypt it.

If somebody was messaging you they would use your public key to encrypt it and you would use your private key to decrypt it.

Public keys are for encrypting private keys are for decrypting.
 
Top