News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

What kind of information can a market seizure show if vendors & customers are communicating through PGP only? : OpSec | Torhoo darknet markets

Assuming LE hasn't gained access to their secret keys?

What inherent risks does this pose for either aside from financial? Is PGP truly impenetrable without a sec key?

Thx

Jetset
Take a look at the wiki it has resources on explaining what PGP is and why it is secure /d/OpSec/wiki?id=ea7f4385.

If we are talking about the PGP encrypted content Harvest Now, Decrypt Later technique is relevant. Stored VPN sessions, PGP encrypted emails and many more would be recovered at a later date if breakthrough has happened or quantum computers become fully functional. Some messengers (Signal, SimpleX) and protocols are attempting to get ahead on the problem by implementing the newly approved quantum safe algorithms. However breaking of the encryption in the first place and the actual security of the those algorithms is yet to be truly tested.

Other information like login times could have been logged by markets as well timing of messages sent.
/u/BadgerScav 🍼
1 points
2 weeks ago
My opinion: The real danger isnt your encrypted communication with vendors.
Even if LE busted the market and found out you were sending messages to a vendor..... you are allowed to browse the DNM and ask questions. Thats not illegal.

The real, real danger as a buyer is a market getting busted and then for big sellers getting busted. Your stuff is encrypted at the market, but you dont know what the fuck the sellers are doing with your info.
So if you have an idiot seller trying to keep track of its buyers because hes tired of getting scammed or whatever, and he ass gets busted, well you just hope LE is too lazy to go after you.

Its a real danger considering how many markets are getting hit in the past couple years
No cleartext obviously, but there is a lot of metadata that can be utilized later on against the communicating parties.
/u/datarape
1 points
2 weeks ago
PGP Alone Won’t Save You if the Market Gets Seized


What kind of information can a market seizure show if vendors & customers are communicating through PGP only?


Even if PGP messages are encrypted, a market seizure still leaks a lot. Law enforcement doesn’t need to crack PGP to build a case — they use metadata, server logs, timing analysis, and more.

Let’s break it down:

What LE Can Still See Without Your PGP Key:


  • [*]1. Message Metadata
  • Even if the message content is encrypted, who messaged who, and when, is often logged by the market. This is damning. They can see:
  • Customer X talked to Vendor Y on these dates.
  • How frequently those messages happened.
  • Timing correlation across orders, payments, shipping.
  • [*]2. Wallet Addresses & Payment History
  • If the market didn’t use a secure per-user wallet model (like Electrum + randomized paths), LE may recover:
  • Wallet addresses tied to vendors and buyers.
  • How much crypto moved and when.
  • Whether funds were ever withdrawn to outside wallets.
  • [*]3. Order Logs & Shipping Data
  • Some markets store order forms even if they’re PGP-encrypted. If the buyer used weak PGP practices (reused keys, bad entropy, misconfigured clients), LE might brute-force it over time or recover the private key in a separate op.
  • [*]4. Server-Side Logs & Browser Fingerprints
  • Markets often keep:
  • Tor browser version strings
  • JavaScript settings
  • Timezone offsets
  • User-agent strings
  • Login IP (if clearnet login was attempted or Tor misused)
  • All of this can help LE correlate a market user with external activity elsewhere.
  • [*]5. Vendor Shop Metadata
  • LE can see:
  • Product listings
  • Prices
  • Volume sold
  • Timing of stock updates
  • Feedback logs
  • PGP keys (and if reused elsewhere, huge mistake)
  • If a vendor reused their PGP fingerprint anywhere else, LE can and will track that.
  • [*]6. Cross-Platform Behavior Linking
  • They'll map your:
  • Forum name
  • Writing style
  • Time of day you're active
  • PGP fingerprint reuse
  • Off-market forum presence
  • → and then cross-reference it with posts on Dread, Reddit, or even clearnet where you might’ve slipped up.


PGP Is Strong — But Human Error Isn’t


PGP encryption itself is solid. But poor key hygiene, reusing the same keys, or using weak passphrases destroys that advantage.


If you save your PGP key in a persistent VM that gets seized, or if you mistype and send unencrypted messages (happens more than you'd think), LE doesn’t have to break encryption — they just collect your mistakes.

Bottom Line:


Don’t rely solely on PGP.

Use separate identities, keys, and fingerprints per platform.

Assume every message metadata is stored server-side.

Keep PGP keys in non-persistent storage only.

Never use the same key for DMs and vendor shop listings.

PGP protects the message — not the context, timing, or metadata. LE doesn’t need to crack your crypto if they already cracked your behavior.
/u/BunniSupport
1 points
1 week ago*


PGP Is Strong — But Human Error Isnt

Bottom Line:
Don’t rely solely on PGP.
Use separate identities, keys, and fingerprints per platform.
Assume every message metadata is stored server-side.
Keep PGP keys in non-persistent storage only.
Never use the same key for DMs and vendor shop listings.
PGP protects the message — not the context, timing, or metadata. LE doesn’t need to crack your crypto if they already cracked your behavior.


Great Advice! Thanks for taking the time to post this!