News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Did you know that Dread accepts an assortment of PGP key formats? : Dread | Torhoo darknet markets

If you go to add your PGP key into dread you will find we do accept RSA, DSA, and ECDSA/ECDH (ed25519) of various key lengths. All the PGP keys must have a valid (not expired!) encryption subkey.

The darknet is largely dominated with RSA but it is an old standard like DSA. The algorithm strength for RSA is built upon large number factoring. With advances in factoring and quantum computing RSA will be broken. Probably within the next 20 years. DSA is better than RSA when it comes to algorithm strength but it has nothing on EC.

If you want to future proof your PGP keys creating a key with ECDSA/ECDH is the way to do it! Technically speaking generating a key with ECDSA isn't recommended unless you are doing it in a superior way with Ed25519. These key algorithms use elliptic signatures which are super cool and totally modern. They sport extremely fast generation, signing, verification, and have small signature sizes. In every conceivable way elliptic curves are the superior option compared to DSA and RSA.

No PGP key? Don't know how to do it? Don't know how can you get up with modern times? Follow my instructions below!

The easiest way to do it is with GNU Kleopatra. To generate a superior PGP key press "new key pair" from the file menu drop down. Click "create a personal OpenPGP key pair." Type in the name and email address you want (can be anything but be as detailed as possible so it's easy to find by name or email for others). CHECK "protect the generated key with a passphrase". Click on "Advanced Settings..." A popup will appear. There are three options. RSA, DSA, and ECDSA/edDSA. Click the last one (ECDSA/edDSA). Make sure that it's set on ed25519 and cv25519. If you don't want to worry about expiry you can just unselect the "valid until" checkbox. Press create. Type in and verify a passphrase. It will then say the "key pair successfully created." Make a backup and store it somewhere safe which is separate from the computer you generated it on!

After the key is generated, right click the name of the newly generated PGP key in your certificate list on Kleopatra. Click details. A popup will appear and you need to click "export". Another popup will appear with your PGP key. You can use that to paste into the "PGP Key" area in your dread account. When you press update PGP key dread will show a verify PGP key area with a verification message. If all went well you should see a PGP message. Copy the message. Go to Kleopatra and press Notepad below the menu to the far right next to smartcards. Paste the message. Press decrypt/verify notepad. Read the PGP key message. Copy the PIN number. Paste JUST pin into the "Decrypted verification PIN." Press verify PGP key.

Congratulations! You have now created a highly secure PGP key which can be used for authentication and verification in a trust-less manner!

STOP MESSAGING DREAD MODMAIL WITH FUCKING BROKEN PGP KEYS
/u/M3V
7 points
3 years ago
If anyone is curious how to do this on CLI:

$ gpg --full-generate-key --expert
This is libre software: you are free to change and redistribute it.

Bitte wählen Sie, welche Art von Schlüssel Sie möchten:
(1) RSA und RSA (voreingestellt)
(2) DSA und Elgamal
(3) DSA (nur signieren/beglaubigen)
(4) RSA (nur signieren/beglaubigen)
(7) DSA (Nutzung selber einstellbar)
(8) RSA (Nutzung selber einstellbar)
(9) ECC und ECC
(10) ECC (nur signieren)
(11) ECC (Nutzung selber einstellbar)
(13) Vorhandener Schlüssel
(14) Vorhandener Schlüssel auf der Karte
Ihre Auswahl? 9
Bitte wählen Sie, welche elliptische Kurve Sie möchten:
(1) Curve 25519
(3) NIST P-256
(4) NIST P-384
(5) NIST P-521
(6) Brainpool P-256
(7) Brainpool P-384
(8) Brainpool P-512
(9) secp256k1
Ihre Auswahl? 1
Bitte wählen Sie, wie lange der Schlüssel gültig bleiben soll.
0 = Schlüssel verfällt nie
<n> = Schlüssel verfällt nach n Tagen
<n>w = Schlüssel verfällt nach n Wochen
<n>m = Schlüssel verfällt nach n Monaten
<n>y = Schlüssel verfällt nach n Jahren
Wie lange bleibt der Schlüssel gültig? (0) 0
Schlüssel verfällt nie
Ist dies richtig? (j/N) j


It does not make the distinction between ed2559 and cv25519 like is exposed in Kleopatra GUI, but the resulting key choosing number "9" above has both keys generated. You can confirm this with the following:

$ gpg --list-keys
-----------------------------
pub rsa4096 *date* [SC]
*censored*
uid [ ultimativ ] name (comment) <no@email>
sub rsa4096 *date* [E]

pub ed25519 *date* [SC]
*censored*
uid [ ultimativ ] name (comment) <no@email>
sub cv25519 *date* [E]


The first is RSA, the second key listed is EdDSA + ECDH with appropriate curve info that is the same as keys generated with Kleopatra as described in OP.
/u/Kompromat
1 points
3 years ago
Thanks for this. I've just been jumping around in the manpages trying to figure out how to do this and couldn't find it. ;D
/u/BigDaddy2K
1 points
3 years ago
Very nice of you to put this in steps for CLI
/u/knight1988
1 points
3 years ago
Can this be done in Seahorse PGP?
/u/TTTz 3 year Allstar Trophy
2 points
3 years ago
- Do not use your real name or email -

- PGP name should match PGP Key name -
Obviously! I always use yours.
/u/TTTz 3 year Allstar Trophy
1 points
3 years ago
Some people do not understand the high high keys like this
True. Sometimes I prefer to remain low key.
/u/ruinitall
2 points
3 years ago
The guy I paid to make mine said I should have my full name and banking information to keep it secure. Is that not right?
/u/LosPirates
3 points
3 years ago
hahahhahaha
/u/Vishnu
2 points
3 years ago
yes also add your ssn so you can contact support later
/u/TheTechnoViking
2 points
3 years ago
Thy have a wonderful offer! Thy offer upon you to make your deadman switch if one would wish? Thus being upon thous glorious spirit when the glorious day comes to battling in the streets of Germania if thou should falter and die instead of being with your victorious clan to dance to the celebration of thy victory, you shall instead be ensured a place in the mighty VALHALLA!

What say you? Do we have a contract?
/u/ruinitall
1 points
3 years ago
I don't know you but you seem legit. Lets do this!
/u/TheTechnoViking
2 points
3 years ago
A message thy have sent, safely encrypted with a Norse Rune spell of protection. Thus nye prying eye of the likes of New Gods can decypher.
A Lesson in Protection spells this can be, a practice of sorts for when future battles are fought against the new gods such as the Technical Boy, Mr World and Media try infiltrate our old ways of freedom
/u/DrFeelGood141
1 points
3 years ago
ah, yes, of course....no
/u/[deleted]
1 points
3 years ago
It’s sad that you had to say this but yes, great reminder!

Put your security and anonymity first guys!
/u/HeadJanitor
1 points
3 years ago
Yes, thank you, monsieur.
/u/Papinian3
2 points
3 years ago
A little consideration. I think this nickname /u/Paris maybe has nothing to do with the Capital of France but is a mythological nobleman Paris, the son of King Priam and Queen Hecuba of Troy. Because I perceive it similary like in the Judgement of Paris: who will win the apple. Here, as each "Markets" (similar like goddess) wanted to receive the apple, they each stripped off their own clothing and appeared naked before Paris. What do you think? Rgds. Papinian3
/u/Witchman05
2 points
3 years ago
I stripped off my own clothing and appeared naked before Paris once. And each day since, I thank the good lord above for the advances in medical sciences that allow doctors to re-attach a man's genitals.
/u/Kyle
2 points
3 years ago
Should've gotten a vagina instead so you wouldn't be taking up space with your man spreading.
/u/Witchman05
2 points
3 years ago
What? They didn't reattach mine. Paris was so overcome with arousal and began masturbating so furiously he ripped his cock right off his pelvis. Blood and semen everywhere, it was a massacre.
/u/Kyle
2 points
3 years ago
Really, it sounds like Paris has a lot of love for you. I guess his new name should be Paris the man of love.
/u/Papinian3
1 points
3 years ago
We love you! Peace!
/u/deerp
1 points
3 years ago
This is excellent advice and is practically foolproof because even when high, I can understand this clear enough haha!

If I'm perfectly honest, learning about PGP and the various encryption methods isn't something I've thought too much about but then I get in a situation where the private key is lost for one reason or another and have to start again. Learning the hard way is what I'm used to in most things in life but when it comes to keeping yourself secure on these so-called darknet markets, you need to learn to walk before you attempt running and this post will surely help anyone who doesn't fully understand pgp.

Thank you for taking the time to share it with us!
/u/kataro
1 points
3 years ago
ECDSA/edDSA, set on ed25519 and cv25519 - definitely on the cards for my next key pair.

People should remember to put their public username, and not use their private username, as the the name of their key/s that they use to access markets that have public & private usernames.
Thanks for this. Uh oh, just exceeded my storage allotment for saved messages and have to pay to upgrade.
/u/pharoah
1 points
3 years ago
I'll definitely recommend iGolder in the browser with JS enabled. X joke

/u/Paris enjoys a spoonful of cryptography every day before breakfast. V fact
/u/screencock
1 points
3 years ago
Thank you! I intend to do this for my next keys, more secure is always better, but I am skeptical about RSA 4096 being cracked. I get a feeling that it's fear being instilled in us or people overstating or flat out lying about the capabilities of quantum computing.

Can you give more info on this? What about something like dm-crypt's disk encryption? Keepass databases? SSL? End to end encryption like Signal and OMEMO?
/u/strace
1 points
3 years ago
"The algorithm strength for RSA is built upon large number factoring. With advances in factoring and quantum computing RSA will be broken. Probably within the next 20 years. DSA is better than RSA when it comes to algorithm strength but it has nothing on EC."

One caveat is elliptic curve cryptography is still considered more vulnerable to quantum attacks than RSA at 160 bits and up due to its symmetry. One thing RSA has going for it is its asymmetry that makes cracking it cost prohibitive but still inevitable by quantum computing. I've read about post quantum elliptical algos but ECDSA does not fall in that category and is susceptible to quantum attacks.

This is all still theoretical, we're still a number of years away before ECDSA can be touched by a quantum computer wielding Shor's algorithm. I still prefer ECDSA because of its shortness and speed. But by the time it gets close I would expect the new algorithmic standard to be post quantum resistant.
/u/KingBarthurOfXanalot
1 points
3 years ago
/u/Paris would it be possible to display the PGP Fingerprint under the armored key in the user's profile?
/u/Gladiator
1 points
3 years ago
Interesting to now
/u/Kyle
1 points
3 years ago
I'm glad to see this post. Hopefully more hidden services will start pushing and support ECDH.

Thanks Paris.
/u/M3V
1 points
3 years ago
Thanks for the writeup. One thing is Kleopatra is not in the GNU project. It is a KDE application written with Qt5 windowing toolkit. It does use the GNU GPLv2-or-later license, but it is not GNU code.
/u/Kyle
1 points
3 years ago
That's a positive tbh. GNU code is horrible; extremely bloated. Compare it's utilities with it's openbsd counterpart, you will see what I mean.
/u/M3V
1 points
3 years ago
There are too many GNU packages to say they are all bloated. Some of the nicest work in OS development reaching towards an all-source bootstrap reducing binary seed you need to trust is happening in the GNU project, rewriting opaque C binaries in Scheme and implementing diverse double compilation for bootstrapping.

OpenBSD has virtually *no* progress on reproducable builds, it is 2022 I mean come on. I would not trust their build process at all.

Besides, OpenBSD has no native OpenPGP support. To use OpenPGP on OpenBSD you need to pull GnuPG from ports. So GNU code.
/u/Kyle
1 points
3 years ago
Yeah your right. I was just trying to say GNU doesn't write the most clean code. But other than that your right, I mean GCC is probably the most widely used compiler and its contributions to the Linux stack are pretty significant.

soatok.blog/2020/07/08/gnu-a-heuristic-for-bad-cryptography/ - This blog post points out a lot of problems with GNU cryptography. It's two years old, so a lot these problems may have probably been addressed already.
/u/[deleted]
1 points
3 years ago
/u/Paris

What a beautiful site.

Great work to all the mod team and everyone who contributed to this update.
<33 :((
/u/EmpBomb
1 points
3 years ago
Believe it or not but am still hanging with this homie lol :
There was an error parsing your PGP Key, please contact Dread support staff.

At this point i believe it's just a fucked up bug.
/u/Paris 📢 A
2 points
3 years ago
If you have issues with the PGP key just send it to me and I'll be able to hopefully figure out why it's not accepting it.
/u/Claude
1 points
3 years ago
A key with ed25519 is much shorter in length, so entropy is lower. A key with RSA is much longer.
Nevertheless, keys that are based on a elliptic curve are said to be superior to RSA.
How is this possible. I'm just curious. I would have assumed longer keylength is better.

Can anybody enlighten me?
/u/Paris 📢 A
1 points
3 years ago
Key length shortness doesn't mean it's lower entropy. Ed25519 uses elliptic curves which is just better than the factorial system RSA uses.

You should probably watch a video on elliptic curves.
/u/Claude
1 points
3 years ago
Indeed, I might have to watch a video on elliptic curves.

It's very interesting anyways.