Did you know that Dread accepts an assortment of PGP key formats? : Dread | Torhoo darknet markets
If you go to add your PGP key into dread you will find we do accept RSA, DSA, and ECDSA/ECDH (ed25519) of various key lengths. All the PGP keys must have a valid (not expired!) encryption subkey.
The darknet is largely dominated with RSA but it is an old standard like DSA. The algorithm strength for RSA is built upon large number factoring. With advances in factoring and quantum computing RSA will be broken. Probably within the next 20 years. DSA is better than RSA when it comes to algorithm strength but it has nothing on EC.
If you want to future proof your PGP keys creating a key with ECDSA/ECDH is the way to do it! Technically speaking generating a key with ECDSA isn't recommended unless you are doing it in a superior way with Ed25519. These key algorithms use elliptic signatures which are super cool and totally modern. They sport extremely fast generation, signing, verification, and have small signature sizes. In every conceivable way elliptic curves are the superior option compared to DSA and RSA.
No PGP key? Don't know how to do it? Don't know how can you get up with modern times? Follow my instructions below!
The easiest way to do it is with GNU Kleopatra. To generate a superior PGP key press "new key pair" from the file menu drop down. Click "create a personal OpenPGP key pair." Type in the name and email address you want (can be anything but be as detailed as possible so it's easy to find by name or email for others). CHECK "protect the generated key with a passphrase". Click on "Advanced Settings..." A popup will appear. There are three options. RSA, DSA, and ECDSA/edDSA. Click the last one (ECDSA/edDSA). Make sure that it's set on ed25519 and cv25519. If you don't want to worry about expiry you can just unselect the "valid until" checkbox. Press create. Type in and verify a passphrase. It will then say the "key pair successfully created." Make a backup and store it somewhere safe which is separate from the computer you generated it on!
After the key is generated, right click the name of the newly generated PGP key in your certificate list on Kleopatra. Click details. A popup will appear and you need to click "export". Another popup will appear with your PGP key. You can use that to paste into the "PGP Key" area in your dread account. When you press update PGP key dread will show a verify PGP key area with a verification message. If all went well you should see a PGP message. Copy the message. Go to Kleopatra and press Notepad below the menu to the far right next to smartcards. Paste the message. Press decrypt/verify notepad. Read the PGP key message. Copy the PIN number. Paste JUST pin into the "Decrypted verification PIN." Press verify PGP key.
Congratulations! You have now created a highly secure PGP key which can be used for authentication and verification in a trust-less manner!
STOP MESSAGING DREAD MODMAIL WITH FUCKING BROKEN PGP KEYS
$ gpg --full-generate-key --expert
This is libre software: you are free to change and redistribute it.
Bitte wählen Sie, welche Art von Schlüssel Sie möchten:
(1) RSA und RSA (voreingestellt)
(2) DSA und Elgamal
(3) DSA (nur signieren/beglaubigen)
(4) RSA (nur signieren/beglaubigen)
(7) DSA (Nutzung selber einstellbar)
(8) RSA (Nutzung selber einstellbar)
(9) ECC und ECC
(10) ECC (nur signieren)
(11) ECC (Nutzung selber einstellbar)
(13) Vorhandener Schlüssel
(14) Vorhandener Schlüssel auf der Karte
Ihre Auswahl? 9
Bitte wählen Sie, welche elliptische Kurve Sie möchten:
(1) Curve 25519
(3) NIST P-256
(4) NIST P-384
(5) NIST P-521
(6) Brainpool P-256
(7) Brainpool P-384
(8) Brainpool P-512
(9) secp256k1
Ihre Auswahl? 1
Bitte wählen Sie, wie lange der Schlüssel gültig bleiben soll.
0 = Schlüssel verfällt nie
<n> = Schlüssel verfällt nach n Tagen
<n>w = Schlüssel verfällt nach n Wochen
<n>m = Schlüssel verfällt nach n Monaten
<n>y = Schlüssel verfällt nach n Jahren
Wie lange bleibt der Schlüssel gültig? (0) 0
Schlüssel verfällt nie
Ist dies richtig? (j/N) j
It does not make the distinction between ed2559 and cv25519 like is exposed in Kleopatra GUI, but the resulting key choosing number "9" above has both keys generated. You can confirm this with the following:
$ gpg --list-keys
-----------------------------
pub rsa4096 *date* [SC]
*censored*
uid [ ultimativ ] name (comment) <no@email>
sub rsa4096 *date* [E]
pub ed25519 *date* [SC]
*censored*
uid [ ultimativ ] name (comment) <no@email>
sub cv25519 *date* [E]
The first is RSA, the second key listed is EdDSA + ECDH with appropriate curve info that is the same as keys generated with Kleopatra as described in OP.