News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Basic PGP Guide For Kleopatra in Tails - Updated Version : Tails | Torhoo darknet markets

Basics of PGP Keys - Creating, Backing up, Encrypting, Decrypting, and Verifying
NOTE - This guide is meant for people new to PGP. It does not describe advanced techniques such as expiring keys and command line interface (CLI). Latest Update - 28 July, 2024

Part 1 - Configure Persistent Storage in Tails for PGP Key Retention
Part 2 - Creating a Basic Key Pair in Kleopatra
Part 3 - Backing Up Your Secret Key
Part 4 - Exporting Your Public Key To A Backup File
Part 5 - Copying Your Public Key in Cleartext to Post on Other Web Sites or Send to a Vendor
Part 6 - Importing a Public Key Into Your Keyring
Part 7 - Decrypting a Message
Part 8 - Verifying a PGP Signed Message
Part 9 - Encrypting a Message (Encrypting Your Address for a Vendor)
Part 10 - PGP Signing a Message (To prove you have control of your secret key)



Part 1 - Configure Persistent Storage in Tails for PGP Key Retention
Step 1 - In Tails, click Applications - Favorites - Persistent Storage
Step 2 - In the Persistent Storage popup window, scroll down to GnuPG and slide the button to the right. The background will turn blue when it is enabled. I also recommend doing this for Dotfiles, which will come in handy in the future for some users.
Step 3 - Fill out a passphrase if you are prompted.
Step 4 - Once completed, click Save and restart Tails.
Step 5 - In the Welcome to Tails window, fill in your Persistent Encrypted Storage passphrase and click Unlock. You should receive a message the persistent storage is unlocked. If the background turns bright blue, you entered the wrong passphrase. Try again.
Step 6 - Once your persistent storage is unlocked, click Start Tails.


Part 2 - Creating a Basic Key Pair in Kleopatra
Step 1 - Start Kleopatra
Step 2 - Click File - New OpenPGP Key Pair...
Step 3 - In the Create OpenPGP Certificate popup, enter your desired key name on the Name line (should exactly match your username on the site you'll use this key). Leave the EMail address line blank.
Step 4 - Click the checkbox for Protect the generated key with a passphrase.
Step 5 - Click Advanced Settings...
NOTE - You can now create either a [u]standard RSA key[/u], or a newer-technology [u]eliptical key[/u]. If you're uncertain which to use, ask about the key types in https://torhoo.cc/go.php?u=TDJRdlQzQlRaV009# on dread. I prefer the newer eliptical key.
Step 6 - In the Technical Details popup:
[u]For a standard RSA key[/u]:
Change RSA from 3072 to 4096. Change +RSA from 3072 to 4096 as well.
[u]For an eliptical key[/u]:
Click the dot for ECDSA/EdDSA and leave the default settings - ed25519 for ECDSA/EdDSA, and cv25519 for +ECDH.
Step 7 - Uncheck Valid until:, then click OK.
Step 8 - In the Create OpenPGP Certificate popup, click OK.
Step 9 - In the popup, enter a passphrase in the Passphrase: line, and repeat the passphrase in the Repeat: line, then click OK.
Step 10 - The computer will process for a bit, and then a Success popup should appear, including the Fingerprint for you new private key. Don't be concerned about the fingerprint. Click OK.


Part 3 - Backing Up Your Secret Key
Step 1 - In Kleopatra, scroll through your certificates (aka keys) until you see your secret key (it will be in bold), then right-click on the key.
Step 2 - In the popup, click Backup Secret Keys...
Step 3 - In the Secret Key Backup popup, under Name, click amnesia on the left side, then double-click Persistent in the Name list (right side)
Step 4 - Change the File name: to something you will remember as your backup secret key. I use <keyname>SecretBackup.asc
Step 5 - Click Save
Step 6 - In the popup, enter the passphrase for your secret key, then click OK.
NOTE - Do keep a copy of your passphrase until you memorize it. Forgetting your passphrase will make your key unusable for 2FA and other PGP tasks.
Step 7 - In the Secret Key Backup popup, make sure the backup secret key was created successfully, then click OK.
NOTE - You can copy this saved secret key file to a USB drive to have an offline copy on separate media. You can also use the instructions in Part 4 to get a text copy of your secret key to store in KeePassXC along with your passphrase and other sensitive information.


Part 4 - Exporting Your Public Key To A Backup File
Step 1 - In Kleopatra, find your secret key (it will be in bold text).
Step 2 - Right click on the key, then find and click on Export
NOTE - Do not click Export Secret Keys as already done in Part 3.
Step 3 - In the Export OpenPGP Certificates popup, click Amnesia on the left side of the window, then double-click Persistent in the Name list on right side.
Step 4 - Rename the File name: to something you will remember. I use <keyname>PublicKey.asc (Make it simple so you can easily spot the file).
Step 5 - Click Save.


Part 5 - Copying Your Public Key in Cleartext to Post on Onion Sites or Send to a Vendor
Step 1 - Open Applications - Favorites - Files, then click on Persistent in the list on the left side of the window.
Step 2 - Right click the <keyname>PublicKey.asc file, then click Open With...
Step 3 - In the Select Open File popup Under Related Applications, find and double-click on Text Editor. This opens a new Text Editor window with your keyfile in cleartext.
NOTE - If you have another Text Editor window active, the file will open as a new tab.
Step 4 - In Text Editor, click on the <keyname>PublicKey.asc tab.
NOTE - If you want, delete any Comment: lines at the top of your public key. This will make the key acceptable to some markets that require no comment lines. Do remember to leave a blank line between -----BEGIN PGP PUBLIC KEY BLOCK----- and the first line of random characters in the key.
Step 5 - Click in the cleartext key, then press Ctrl+A to highlight the entire key. Press Ctrl+C to copy the highlighted key.
Step 6 - Go to the site or message you want to copy your key into, then click in the message/PGP Public Key area and press Ctrl+V to paste the copied key.


Part 6 - Importing a Public Key Into Your Keyring
Step 1 - Highlight the key from -----BEGIN PGP PUBLIC KEY BLOCK----- to -----END PGP PUBLIC KEY BLOCK-----, then press Ctrl+C to copy the key into the clipboard.
Step 2 - In Kleopatra, click Tools - Clipboard - Certificate Import
Step 3 - In the You have imported a new certificate (public key) popup, you are given the opportunity to mark the certificate as valid. If the certificate is from a trusted source, such as Dread, a vendor on a DNM, etc., click Import. NOTE: You will almost always want to Certify the key you Import.
NOTE - If you receive a Certificate Import Result popup, you already have the certificate in your keyring. You will see Total number processed: 1, Imported 0, and Unchanged 1 in the detailed results. You are done importing the key.
Step 4 - In the Certify Certificate: <keyname> popup, set the Certify with: selection to your secret key name, then press Certify.
Step 5 - Enter your secret key passphrase if you are prompted, in the Passphrase: line, then click OK.
Step 6 - In the Certification Succeeded popup, click OK. You are done importing the key.


Part 7 - Decrypting a Message
Step 1 - Highlight the message starting with -----BEGIN PGP MESSAGE----- and through -----END PGP MESSAGE-----, then press Ctrl+C to copy the message.
Step 2 - In Kleopatra, click Tools - Clipboard - Decrypt/Verify. Enter your secret key passphrase if prompted.
Step 3 - Click Applications - Accessories - Text Editor to open a blank Text Editor window.
Step 4 - Click anywhere in the window, and press Ctrl+V to paste the decrypted message.
Step 5 - Read the message


Part 8 - Verifying a PGP Signed Message
Step 1 - Highlight the PGP signed message, beginning with -----BEGIN PGP SIGNED MESSAGE----- and ending with -----END PGP SIGNATURE-----, then press Ctrl+C to copy the message into the clipboard.
Step 2 - In Kleopatra, click Tools - Clipboard - Decrypt/Verify
Step 3 - In the Decrypt/Verify E-Mail popup, under All operations completed, look for a message with a tinted background. If the background is green go to Step 4. If the background is red go to Step 5. If the background is white go to Step 6.
Step 4 - If the background is green-tinted, look for Valid signature by <name>, then look below that for the message The signature is valid and the certificate's validity is ultimately trusted. Then click Finish. The signed message is verified as good. Any links in the message may be trusted.
Step 5 - If the background is red-tinted, the message will say Invalid signature, and the bottom line will say The signature is invalid: Bad signature. This means the signed message has probably been altered and the signature is bad. Click Finish and do not trust the message or links in the message.
Step 6 - If the background white, you might not have the key from the signing certificate (aka the vendor's Public Key) in your keyring, or you might not have certified that key. Check your keyring for the certificate name, and if you can't find it go to Part 6 - Importing a Public Key Into Your Keyring. If you do find it but the User-ID is not certified. Right click the certificate Name, click Certify, and perform Steps 4, 5 and 6 in Part 6


Part 9 - Encrypting a Message (Encrypting Your Address for a Vendor)
NOTE - This Part presumes you have imported the recipient's/vendor's Public Key as described in Part 6 - Importing a Public Key Into Your Keyring. If you haven't imported the message receiver's Public Key, go to Part 6.
Step 1 - Click Applications - Accessories - Text Editor to open a blank Text Editor window.
Step 2 - Write the message you want to send in the Text Editor window, such as your name and address for a vendor when placing an order.
Step 3 - Press Ctrl+A to highlight the completed message, then press Ctrl+X to cut the message from the window and into the clipboard.
Step 4 - In Kleopatra, click Tools - Clipboard - Encrypt
Step 5 - In the Encrypt Mail Message popup, click Add Recipient...
Step 6 - In the Certificate Selection popup, scroll through the list of certificates by name to find the receiver's certificate, click on the certificate name to highlight it, then click OK.
NOTE - You can choose more than one certificate to encrypt for if you want or need to such as when you're messaging multiple people, or using your own certificate in a dispute.
Step 7 - In the Encrypt Mail Message popup, check the name(s) in the Recipient list, then click Next.
Step 8 - Check the Results popup for Encryption succeeded, then press OK.
Step 9 - Go to the message you're sending, or to the Messages/Notes for an order. Click in the blank area and press Ctrl+V to paste the encrypted message.
NOTE - You can paste the encrypted message in the open Text Editor window if you're not ready to send it yet.


Part 10 - PGP Signing a Message (To prove you have control of your secret key)
Step 1 - Click Applications - Accessories - Text Editor to open a blank Text Editor window.
Step 2 - Write the message in the Text Editor window.
Step 3 - Press Ctrl+A to highlight the completed message, then press Ctrl+X to cut the message from the window into the clipboard.
Step 4 - In Kleopatra, click Tools - Clipboard - OpenPGP Sign
Step 5 - In the Sign Mail Message popup, click Change Signing Certificates...
Step 6 - In the Select Signing Certificates popup, set the OpenPGP Signing Certificate: to your secret key in the drop-down list, then click OK.
NOTE - You might have more than one secret key to select from, so know which key you're using and select the correct key.
Step 7 - Click Next.
Step 8 - Enter your secret key passphrase, then click OK.
Step 9 - You should see a message in blue saying Signing succeeded. Click OK.
Step 10 - Navigate to the place you want to post the PGP signed message, click once in the blank area, then press Ctrl+V to paste the PGP-signed message into the desired spot.
/u/Dream333
2 points
11 months ago
Thanks for all the details. It's appreciated.
/u/kowkenobi
1 points
11 months ago
my hero
/u/deadspace
1 points
11 months ago
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

this post has to get pinned
-----BEGIN PGP SIGNATURE-----
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=rbRe
-----END PGP SIGNATURE-----
/u/partytime 📢
1 points
11 months ago
I've been told it will be, mate. Just a matter of time until it's done. :)
/u/aClockworkTangerine P .deb[MOD]
1 points
11 months ago
It has been done :)
/u/whataname
1 points
11 months ago
Great guide. Strictly speaking you don't have to backup your public key so long as your private key is backed up (i.e. it's contained within it) but it can't hurt!
/u/partytime 📢
1 points
11 months ago
What you're saying is true, mate. However, to get a public key without comments, as some sites require, a copy has to be made and the comment lines edited out. This is why I include making the backup copy of a public key in the guide. Thank you for the comment, though, appreciate your viewpoint.
/u/whataname
1 points
11 months ago
That's also true and I do keep a backup of my public keys for convenience. I just thought it was interesting that the public key generated from the private key will always be identical so long as you don't change passwords :-)
/u/cobra333
1 points
11 months ago
I just have both backed up on my encrypted data and then I have a 2ed back up usb that fully encrypted with the must haves . Is this what you do I kind of taught my self
/u/ZOM3R
1 points
10 months ago
Perfect!
/u/dauntra
1 points
10 months ago
I made my initial key using my email and daily nickname... I see now how stupid that was. Am I able to start over and make a new main key?
/u/partytime 📢
2 points
10 months ago
Yes, you can make a new key pair easily. However, if you've already compromised your dread account with the information you stated, best to delete the account and make a new one with a proper PGP key. Otherwise you've left a breadcrump that can be followed if LE or a TLA takes an interest in you.
/u/TheNewAgeAccountant
1 points
10 months ago
Hate to be the lad asking stupid questions, but what is the Subkey, and Verification pin that, for example, Dread requires?
/u/partytime 📢
1 points
10 months ago
When you look at your secret key in Kleopatra (double-click the key, click on More Details...) you'll see a key for Certify, Sign and a key for Encrypt. The sub key is the encryption key.

The verification PIN dread requires is from the encrypted message you get at login when using 2FA. You decrypt the message with your secret key, and enter the PIN inside the message to log in. The only thing the PIN has to do with PGP is the message containing the PIN is encrypted with PGP.
/u/TheNewAgeAccountant
1 points
10 months ago
Much Appreciated. <3
/u/londonfrance44
1 points
9 months ago
Thanks
/u/JayDub420
1 points
8 months ago
I try to import a public key but it will not let me. When i go to tools then clip board, the option for certificate import is not highlighted so i cant click on it. I am Trying to send messages on a market site and i can not figure out how to do it. Ive read all the information on importing and making public keys in the kleopatra app and in tails. Im getting a little discuraged and frustrated with this. I joind this forum because i need som help on doing this please. any help would be much appreciated. Thank you.
/u/BossMystix
1 points
1 month ago
Any luck with this? Im in the same boat
/u/kandypaint
1 points
5 months ago
At Part 3 Step 2 - I don't have a "Back up Secret Keys" option. Is there another name for this option?
/u/gibsonsg 🍼
1 points
2 days ago*
Is there a way I can copy all my kleopatra data from one tails disk to another without using the clone option in tails

No worries found the way to export all keys