News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Basic PGP Guide For Kleopatra in Tails - Updated Jul 2024 : pgppractice | Torhoo darknet markets

Basics of PGP Keys - Creating, Backing up, Encrypting, Decrypting, and Verifying
NOTE - This guide is meant for people new to PGP. It does not describe advanced techniques such as expiring keys and command line interface (CLI).

Part 1 - Configure Persistent Storage in Tails for PGP Key Retention
Part 2 - Creating a Basic Key Pair in Kleopatra
Part 3 - Backing Up Your Secret Key
Part 4 - Exporting Your Public Key To A Backup File
Part 5 - Copying Your Public Key in Cleartext to Post on Other Web Sites or Send to a Vendor
Part 6 - Importing a Public Key Into Your Keyring
Part 7 - Decrypting a Message
Part 8 - Verifying a PGP Signed Message
Part 9 - Encrypting a Message (Encrypting Your Address for a Vendor)
Part 10 - PGP Signing a Message (To prove you have control of your secret key)



Part 1 - Configure Persistent Storage in Tails for PGP Key Retention
Step 1 - In Tails, click Applications - Favorites - Persistent Storage
Step 2 - In the Persistent Storage popup window, scroll down to GnuPG and slide the button to the right. The background will turn blue when it is enabled. I also recommend doing this for Dotfiles, which will come in handy in the future for some users.
Step 3 - Fill out a passphrase if you are prompted.
Step 4 - Once completed, click Save and restart Tails.
Step 5 - In the Welcome to Tails window, fill in your Persistent Encrypted Storage passphrase and click Unlock. You should receive a message the persistent storage is unlocked. If the background turns bright blue, you entered the wrong passphrase. Try again.
Step 6 - Once your persistent storage is unlocked, click Start Tails.


Part 2 - Creating a Basic Key Pair in Kleopatra
Step 1 - Start Kleopatra
Step 2 - Click File - New OpenPGP Key Pair...
Step 3 - In the Create OpenPGP Certificate popup, enter your desired key name on the Name line (should exactly match your username on the site you'll use this key). Leave the EMail address line blank.
Step 4 - Click the checkbox for Protect the generated key with a passphrase.
Step 5 - Click Advanced Settings...
NOTE - You can now create either a standard RSA key, or a newer-technology eliptical key. If you're uncertain which to use, ask about the key types in https://torhoo.cc/go.php?u=TDJRdlQzQlRaV009# on dread. I prefer the newer eliptical key.
Step 6 - In the Technical Details popup:
For a standard RSA key:
Change RSA from 3072 to 4096. Change +RSA from 3072 to 4096 as well.
For an eliptical key:
Click the dot for ECDSA/EdDSA and leave the default settings - ed25519 for ECDSA/EdDSA, and cv25519 for +ECDH.
Step 7 - Uncheck Valid until:, then click OK.
Step 8 - In the Create OpenPGP Certificate popup, click OK.
Step 9 - In the popup, enter a passphrase in the Passphrase: line, and repeat the passphrase in the Repeat: line, then click OK.
Step 10 - The computer will process for a bit, and then a Success popup should appear, including the Fingerprint for you new private key. Don't be concerned about the fingerprint. Click OK.


Part 3 - Backing Up Your Secret Key
Step 1 - In Kleopatra, scroll through your certificates (aka keys) until you see your secret key (it will be in bold), then right-click on the key.
Step 2 - In the popup, click Backup Secret Keys...
Step 3 - In the Secret Key Backup popup, under Name, click amnesia on the left side, then double-click Persistent in the Name list (right side)
Step 4 - Change the File name: to something you will remember as your backup secret key. I use <keyname>SecretBackup.asc
Step 5 - Click Save
Step 6 - In the popup, enter the passphrase for your secret key, then click OK.
NOTE - Do keep a copy of your passphrase until you memorize it. Forgetting your passphrase will make your key unusable for 2FA and other PGP tasks.
Step 7 - In the Secret Key Backup popup, make sure the backup secret key was created successfully, then click OK.
NOTE - You can copy this saved secret key file to a USB drive to have an offline copy on separate media. You can also use the instructions in Part 4 to get a text copy of your secret key to store in KeePassXC along with your passphrase and other sensitive information.


Part 4 - Exporting Your Public Key To A Backup File
Step 1 - In Kleopatra, find your secret key (it will be in bold text).
Step 2 - Right click on the key, then find and click on Export
NOTE - Do not click Export Secret Keys as already done in Part 3.
Step 3 - In the Export OpenPGP Certificates popup, click Amnesia on the left side of the window, then double-click Persistent in the Name list on right side.
Step 4 - Rename the File name: to something you will remember. I use <keyname>PublicKey.asc (Make it simple so you can easily spot the file).
Step 5 - Click Save.


Part 5 - Copying Your Public Key in Cleartext to Post on Onion Sites or Send to a Vendor
Step 1 - Open Applications - Favorites - Files, then click on Persistent in the list on the left side of the window.
Step 2 - Right click the <keyname>PublicKey.asc file, then click Open With...
Step 3 - In the Select Open File popup Under Related Applications, find and double-click on Text Editor. This opens a new Text Editor window with your keyfile in cleartext.
NOTE - If you have another Text Editor window active, the file will open as a new tab.
Step 4 - In Text Editor, click on the <keyname>PublicKey.asc tab.
NOTE - If you want, delete any Comment: lines at the top of your public key. This will make the key acceptable to some markets that require no comment lines. Do remember to leave a blank line between -----BEGIN PGP PUBLIC KEY BLOCK----- and the first line of random characters in the key.
Step 5 - Click in the cleartext key, then press Ctrl+A to highlight the entire key. Press Ctrl+C to copy the highlighted key.
Step 6 - Go to the site or message you want to copy your key into, then click in the message/PGP Public Key area and press Ctrl+V to paste the copied key.


Part 6 - Importing a Public Key Into Your Keyring
Step 1 - Highlight the key from -----BEGIN PGP PUBLIC KEY BLOCK----- to -----END PGP PUBLIC KEY BLOCK-----, then press Ctrl+C to copy the key into the clipboard.
Step 2 - In Kleopatra, click Tools - Clipboard - Certificate Import
Step 3 - In the You have imported a new certificate (public key) popup, you are given the opportunity to mark the certificate as valid. If the certificate is from a trusted source, such as Dread, a vendor on a DNM, etc., click Import. NOTE: You will almost always want to Certify the key you Import.
NOTE - If you receive a Certificate Import Result popup, you already have the certificate in your keyring. You will see Total number processed: 1, Imported 0, and Unchanged 1 in the detailed results. You are done importing the key.
Step 4 - In the Certify Certificate: <keyname> popup, set the Certify with: selection to your secret key name, then press Certify.
Step 5 - Enter your secret key passphrase if you are prompted, in the Passphrase: line, then click OK.
Step 6 - In the Certification Succeeded popup, click OK. You are done importing the key.


Part 7 - Decrypting a Message
Step 1 - Highlight the message starting with -----BEGIN PGP MESSAGE----- and through -----END PGP MESSAGE-----, then press Ctrl+C to copy the message.
Step 2 - In Kleopatra, click Tools - Clipboard - Decrypt/Verify. Enter your secret key passphrase if prompted.
Step 3 - Click Applications - Accessories - Text Editor to open a blank Text Editor window.
Step 4 - Click anywhere in the window, and press Ctrl+V to paste the decrypted message.
Step 5 - Read the message


Part 8 - Verifying a PGP Signed Message
Step 1 - Highlight the PGP signed message, beginning with -----BEGIN PGP SIGNED MESSAGE----- and ending with -----END PGP SIGNATURE-----, then press Ctrl+C to copy the message into the clipboard.
Step 2 - In Kleopatra, click Tools - Clipboard - Decrypt/Verify
Step 3 - In the Decrypt/Verify E-Mail popup, under All operations completed, look for a message with a tinted background. If the background is green go to Step 4. If the background is red go to Step 5. If the background is white go to Step 6.
Step 4 - If the background is green-tinted, look for Valid signature by <name>, then look below that for the message The signature is valid and the certificate's validity is ultimately trusted. Then click Finish. The signed message is verified as good. Any links in the message may be trusted.
Step 5 - If the background is red-tinted, the message will say Invalid signature, and the bottom line will say The signature is invalid: Bad signature. This means the signed message has probably been altered and the signature is bad. Click Finish and do not trust the message or links in the message.
Step 6 - If the background white, you might not have the key from the signing certificate (aka the vendor's Public Key) in your keyring, or you might not have certified that key. Check your keyring for the certificate name, and if you can't find it go to Part 6 - Importing a Public Key Into Your Keyring. If you do find it but the User-ID is not certified. Right click the certificate Name, click Certify, and perform Steps 4, 5 and 6 in Part 6


Part 9 - Encrypting a Message (Encrypting Your Address for a Vendor)
NOTE - This Part presumes you have imported the recipient's/vendor's Public Key as described in Part 6 - Importing a Public Key Into Your Keyring. If you haven't imported the message receiver's Public Key, go to Part 6.
Step 1 - Click Applications - Accessories - Text Editor to open a blank Text Editor window.
Step 2 - Write the message you want to send in the Text Editor window, such as your name and address for a vendor when placing an order.
Step 3 - Press Ctrl+A to highlight the completed message, then press Ctrl+X to cut the message from the window and into the clipboard.
Step 4 - In Kleopatra, click Tools - Clipboard - Encrypt
Step 5 - In the Encrypt Mail Message popup, click Add Recipient...
Step 6 - In the Certificate Selection popup, scroll through the list of certificates by name to find the receiver's certificate, click on the certificate name to highlight it, then click OK.
NOTE - You can choose more than one certificate to encrypt for if you want or need to such as when you're messaging multiple people, or using your own certificate in a dispute.
Step 7 - In the Encrypt Mail Message popup, check the name(s) in the Recipient list, then click Next.
Step 8 - Check the Results popup for Encryption succeeded, then press OK.
Step 9 - Go to the message you're sending, or to the Messages/Notes for an order. Click in the blank area and press Ctrl+V to paste the encrypted message.
NOTE - You can paste the encrypted message in the open Text Editor window if you're not ready to send it yet.


Part 10 - PGP Signing a Message (To prove you have control of your secret key)
Step 1 - Click Applications - Accessories - Text Editor to open a blank Text Editor window.
Step 2 - Write the message in the Text Editor window.
Step 3 - Press Ctrl+A to highlight the completed message, then press Ctrl+X to cut the message from the window into the clipboard.
Step 4 - In Kleopatra, click Tools - Clipboard - OpenPGP Sign
Step 5 - In the Sign Mail Message popup, click Change Signing Certificates...
Step 6 - In the Select Signing Certificates popup, set the OpenPGP Signing Certificate: to your secret key in the drop-down list, then click OK.
NOTE - You might have more than one secret key to select from, so know which key you're using and select the correct key.
Step 7 - Click Next.
Step 8 - Enter your secret key passphrase, then click OK.
Step 9 - You should see a message in blue saying Signing succeeded. Click OK.
Step 10 - Navigate to the place you want to post the PGP signed message, click once in the blank area, then press Ctrl+V to paste the PGP-signed message into the desired spot.

Latest Update - 28 July, 2024
/u/dayday66
1 points
11 months ago
When do we need to know when to use step 10: PGP Signing a Message (To prove you have control of your secret key)?
/u/partytime 📢
3 points
11 months ago
That's mostly used by vendors and admins, mate, in general. You might be asked to sign a message on some markets to prove you're on a real link rather than a phishing link, too. Vendors and admins often sign their messages to prove they are the ones sending the messages. Also, site admins (including market admins) will often sign a "canary" post, which shows they are in control of their keys and uncompromised at the time of the signing. See the Canary entry in the bottom dread banner for an example. Vendors will often sign messages on dread and other places to verify they are the ones sending those messages.

Sometimes I'll sign a message to someone privately to prove I'm who I say I am on jabber or email, too. I've also signed messages after being gone from the DN for long periods (think weeks or months) for personal reasons.
/u/dayday66
1 points
11 months ago
Thanks for the info! Good to know. I think im ready to do this, wish me luck fam!
/u/[deleted]
1 points
11 months ago*
[removed]
/u/partytime 📢
1 points
11 months ago
Right, mate, you d/l Tails from https://tails.net, mate. Follow the instructions on the Tails site to d/l and install on Windows computer.

Yes, to run Tails you must boot from the USB stick.

Sometimes the BalenaEtcher software fails the first time you try to flash the USB stick with Tails. Try to flash it a second time, and if it fails again try to flash a different USB stick.

The USB won't show up on your Windows computer because it has a failed Tails load, nor will it show up if you have a successful Tails load. Tails USB's and Windows do not play nice together.

Depending on how new your nVidia card might be, it might or might not be supported by Tails. You won't know until you can boot from a successfully flashed Tails USB.

Kleopatra is the GUI front end of Gnu Privacy Guard (GPG). GPG provides the PGP services in Tails. It is part of the Tails load, and you don't need to do anything to d/l or install the Kleopatra to Tails.
/u/[deleted]
1 points
11 months ago
thank you, i have successfully got tails on my USB i just cant boot my laptop from it, i have nvidia1650... what a bastard, spent 2 hours on this
/u/partytime 📢
1 points
11 months ago
Make sure you've set you laptop BIOS to allow you to boot from USB. I don't recall exactly which setting is on every computer. You'll need to allow EUFI boot (I think that's it) and interrupt the Windows boot process before you boot into Windows.
/u/[deleted]
1 points
11 months ago
i hold shift + restart and it gives me the option to boot from USB but when i click on it a quick error message appears on the top of the screen and the laptop turns off
/u/partytime 📢
1 points
11 months ago
Interesting. Try a different USB stick in case there is an issue with the one you're using. If that fails, your laptop is not Tails compliant.
/u/[deleted]
1 points
11 months ago
it said that the flash worked and verified it yea... this is tragic, so i will not be able to do PGP without tails ? Luckily i already had an Archtyp account so i don't need PGP to log in, Abacus is the only market now where you don't need a PGP
/u/partytime 📢
1 points
11 months ago
You can download PGP4WIN from clearnet and install on your Windows computer to use PGP. The guide here will work mostly for you, although some techiques will be different in Windows.
/u/[deleted]
1 points
11 months ago
:O could you link that guide please ? thanks
/u/partytime 📢
1 points
11 months ago
The Basic PGP Guide For Kleopatra in Tails is the OP, mate. You're already on that thread.
/u/[deleted]
1 points
11 months ago
you just said i can use PGP4WIN from clearnet... is that https://www.gpg4win.org/
/u/partytime 📢
1 points
11 months ago
Yes, that's it.
/u/[deleted]
1 points
11 months ago
wow, well that was a bit faster an easier O.O thanks my guy
/u/Civil_Skunk
1 points
10 months ago
my issue is Part 7.2, when I select Decrypt/Verify i get ( Notepad -> Notepad(crossed out) Deccryption failed. No secret key - One unknown recipent. Part 7.3 when I go to accesories and paste - its still the copied pub PGP key...

part 8.3 - i don't get a popup

iam an idiot but this really helpful and awesome!
/u/partytime 📢
1 points
10 months ago
If you're getting "Decryption failed. No secret key" then either the message isn't encrypted for you, a common error for new users and occasionally experienced users such as vendors, or you've lost your secret key somehow. Often a secret key is lost if GnuPG isn't set to on in Persistent Storage as detailed in Part 1.

You should get a popup in 8.3 with one of the backgrounds when verifying a PGP-signed message. Are you getting a message of any kind?
/u/Civil_Skunk
1 points
10 months ago
I appreciate ya /u/partytime - I am looking at my private key as I speak it is saved in Persistent, I open it in text Text Editor - but I keep getting the same message from above... I am trying to decrypt a pub PGP key to a market - I've done this before and accessed the market. I DO have GnuPG turned on (slide to blue). I attempted to decrypt your PGP message above and got the same error so its not the market place...its me
/u/partytime 📢
1 points
10 months ago
Is the key saved in your PGP keyring in Kleo, mate? Having it in persistence is not the same as having it in your keyring. To Import your private key, double-click on it and enter your passphrase into the Kleo popup.
/u/Civil_Skunk
1 points
10 months ago
Often times in Tools -> Clipboard -> Certificate Import & Decrypt/Verify are greyed out...did I do something or NOT do something I should have?

I owe you multiple beers bro
/u/partytime 📢
1 points
10 months ago
I have that happen, too. I usually paste the clipboard contents into a Text Editor window and see what's there. Most often I either copied it wrong, or didn't copy it at all. Sometimes I miss a leading or trailing -, too.
/u/Civil_Skunk
1 points
10 months ago
what is 'keyring' I see it mentioned but no where within Tails/Kleo do I see an option for it or to access it. Should I save my secret pgp to it? assuming I locate the Kingring?

Thanks!
/u/partytime 📢
1 points
10 months ago
The keyring is the total of all the keys you have saved, from your secret key (in bold in the All Certificates display of Kleo) and all the vendor and other public keys you import. Importing puts the key in your keyring. Don't worry about the actual file, as it will be saved correctly as long as you have GnuPG activated in Persistent Storage.
/u/Civil_Skunk
1 points
10 months ago
Thanks for everything!!!
/u/ziggycat
1 points
10 months ago
Hello

Ive followed all instructions but i cannot import a certificate. When i goto Tools>Clipboard "Certificate import" is greyed out. The only options available are "Encrypt", "Open PGP Sign" and "Decrypt/Verify".

I have copied the public PGP im trying to import and i know it then says to copy it to the clipboard but where is the clipboard? I have even tried copying it to the notepad but it still doesnt work. Any thoughts?

Thank You
/u/partytime 📢
1 points
10 months ago
Is the key many lines long, or just 10 or so lines for the key, excluding BEGIN and END lines? If so, you might need to upgrade your Tails or your PGP client to allow use of eliptical keys. That's my first thought.

If you're still not able to Import the key after making sure you're on an up-to-date version of Tails (6.7 is the current version), or up-to-date with your version of Kleo (go to Help - About Kleo and look for GnuPG 2.2.40 and Libgcrypt 1.10.1), then please Message me the key you're trying to import and I'll take a look at it using Command Line (CLI) for GPG (Gnu Privacy Guard). Sometimes the CLI can show issues Kleo won't display when it rejects a key.
/u/ziggycat
1 points
10 months ago*
Thanks
Perhaps its because maybe it was a "signed pgp" not a public pgp
Do you have one i can test? like where can i find a public pgp?

Ignore that, i clicked on a moderator here and it had a pgp and when i now go into kleopatra its available. Thank you.

Actually sorry mate, its like when i go to Archtyp it has a pgp signed msg and pgp signature...i thought it must be a msg i need to decrypt? what do i do with the signature?
/u/atropos1
1 points
10 months ago
You put the message and the signature into the notepad. If you have the sender's certificate imported, you will get a green success box popup when you press the decrypt/verify notepad button.
/u/ziggycat
1 points
10 months ago
Yep so far so good thanks
/u/partytime 📢
1 points
10 months ago
See Part 7 for Decrypting A Message, and Part 8 for Verifying A PGP Signed Message
/u/ziggycat
1 points
10 months ago
Great thank you
/u/topochug
1 points
10 months ago
having issues with part 6 i did every an it was successful but when i go to encrypt a text i cant find the vendors key
/u/topochug
1 points
10 months ago
updated: i found the keys one is red/expired dose that mean they are out of biz?
/u/partytime 📢
1 points
10 months ago
Red only means the key is expired, mate. If you have a market to check you can usually find the current key there. If they don't have a current key on any market, they are probably absent at this time.
/u/topochug
1 points
10 months ago
thanks mate you have helped me a ton!!!
/u/pineapple2054
1 points
7 months ago
my issue is Part 7.2, when I select Decrypt/Verify i get ( Notepad -> Notepad(crossed out) Deccryption failed. No secret key. However, it has the recipient listed. I can decrypt my own messages, just struggling with decrpyting anyone elses. I am following all the steps and have the other parties pgp public key in my key ring
/u/gn69
1 points
7 months ago
-----BEGIN PGP PUBLIC KEY BLOCK-----
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=sDwy
-----END PGP PUBLIC KEY BLOCK-----
/u/UsingAndAbusing
1 points
2 months ago
I am currently trying to buy my first product off a vendor an I am having issues with "decryption failed: No secret key". I belive my keys werent saved because I did not have step 1.2 done. Now I have that selected how do i correct this?
/u/geekstar
1 points
6 months ago
Firstly, Thank you /u/partytime for the guide and the help you have been providing in the comments!

I have been following the DNMBible with smooth sailing up until part 8 (of the guide posted above). I am either not understanding or doing something incorrectly, let me explain.

My goal is to be able to verify links given to me via Daunt. For this example, I want to verify the 2 links provided for a DNM. To do so I have been

1. Click "Verify" on either link
2. Copy the "PGP Signed Verification"
3. Open Kelopatra, Tools>Clipboard>Decrypt/Verify

When I select "Decrypt/Verify" How do I know that it can be trusted, even when the background is green and the signature is vaild? What is stopping the PGP signed message from being a fake with a duplicate name/signature? I guess my point is, is that I want to be able to understand how PGP is working, even if I am doing the steps correctly.

Please excuse me if any of this is confusing, I will try and clarify any questions you guys may have to better help!


Any and all help is appreciated, thank you!
/u/StReEtcUTs
1 points
2 months ago
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Im a vendor on Archetyp market im requesting for a vendor flair i was asked by

/u/newbieforever2018
Please send a pgp signed message using your archetyp market vendor pgp key requesting a vendor flair here.

/post/fe361b9647c2d4356f5c

Part 10 - PGP Signing a Message (To prove you have control of your secret key)
-----BEGIN PGP SIGNATURE-----
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=oupT
-----END PGP SIGNATURE-----
/u/newbieforever2018 P
1 points
2 months ago
Well done!
/u/breadpitt00
0 points
1 year ago*
EDIT:

Ignore my original comment. As I kept reading your instructions, I saw your suggestion of using KeyPass. My apologies.

Thank you for this great tutorial.

ORIGINAL MESSAGE:
In step 3.6 you said:

NOTE - Do keep a copy of your passphrase until you memorize it[...]


Is it okay to store the password in a password manager?
/u/partytime 📢
3 points
1 year ago
Yes, storing the password in a password manager is a good way to go, imo. Allows you to memorize just one password, for the manager, and have a variety of difficult-to-brute-force passwords available for your other logins and keys. I use KeyPassXC this way. I keep the majority of my passphrases in KeePassXC, and have only the one password to remember now. I also make a backup of the KeePassXC .db file in case anything corrupts the working file. That backup is in addition to the 2 backup USB's I use for Tails.
/u/NarcDay
1 points
11 months ago
do u suggest having a password for decrypting and encrypting pgp messages. And put the pass in keepass? that way i only need to remeber one password
/u/partytime 📢
1 points
11 months ago
An excellent way to go, mate. KeePassXC is where I keep the majority of my passwords. I also make backups of the file in persistence, as well as having 2 backup USB's for Tails and Persistent Storage backups.

Also, if you look at Part 2 Step 4 you'll see I recommend enabling "Protect the generated key with a passphrase" as part of key creation. An absolute opsec necessity, imo.
/u/JellyFishy
0 points
11 months ago
-----BEGIN PGP MESSAGE-----

hQIMA1VDTuc2vc7CARAAsAX1aEaCpZkN4V+fuixqkVpE4dhYEprLULTdLIf61E9k
agatkbLNvnRiKXuDIEcseF4SmkIXQMB4YSRnqbW2xgVdmcgtcxseLMM95ydDBt3o
C6WYN5t2L6nwfQzYP26/6H2Pdneatow26dX86i81AjfHcXwrICftwVzV0yS2/nTX
4hw8JjGiBbh8ETqif4QK7tpWqnHUcjfdBcCtSVyou6ILd8dhutCo2V5f6iDJKyul
lGhKfreLVtkdpsoclra4VxmBCGNBnzAWkVYLRkHMFoBRPgDj5UaoOCucsdbLc/Yr
EtKi5bQeO+bPgm4ldqk12Oky+o3cK3y+m/697AvGze6MKpCEDN+LiAYFXKPdmvmy
fq7d2j2D0ys6bVdr7Oo3YTI+8KNcWWW05Fj6imCoXtnGNVsJAAr/999xaTOXyUok
itmhkm4rrqdJnM0DB3G9CgkItwqzVQ8ponf5M6jWpYvo1LSBTrAMNWPtNFGd7g+t
y3nwYXkQ5xUDju8mysCJiJpZ8tu3FFOzMcLXxkvYZo8qxV+UQkpgmBCb6Vclh0vC
2vAhiHhtkgi5106+IYKO9a+kBWirHR/aX/xTSJ6Y3kTpeJFjVQlP9zqjJ8/ZzOgI
deUAriq6ut42YapJKmE2WaCMKdsXN7KcKcnm9fzJl8HEjbE3FXbDjY37LpGl8mjS
wBoBimbh4lJrU9e8rivpi5kF+WGOy+NzOia+dtefp/aDoT5GI/3tytGH6ooa7mNi
8gUA4CC+xL8Flfdr3+coJ7aMtHlyqlVylYJLosKxiiC5rnTy6I0xf8cgnNSYmGwv
JL6EmFdUqPlRgTRGbNjHlv/oy32qY5meYxxvilQbfGLkVGVidgcgnwh1qTKoUGV5
i8qbvOeGH200P0wkWNBWl/HrcXCbJTpmrckBFtVLXwO3JTs0hsePAhOjgzsSmyfx
uyx4vXapcNtNBakjGjYlwfE08K+MXRWeQ5BxXA==
=t0ll
-----END PGP MESSAGE-----
/u/partytime 📢
1 points
11 months ago
-----BEGIN PGP MESSAGE-----
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=lkBO
-----END PGP MESSAGE-----
/u/poundtown
1 points
8 months ago
i went into your profile and copied your public key but when i tried to decrypt the message above it didnt work?
/u/drisdane
0 points
7 months ago
-----BEGIN PGP MESSAGE-----
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=8OPA
-----END PGP MESSAGE-----