To view the list of links, please access this site using Tor Browser.
If you’re seeing this message, access is restricted for regular browsers.
Already using Tor? If you are sure you’re currently in Tor Browser, proceed to our .onion version:
What kind of information can a market seizure show if vendors & customers are communicating through PGP only?
PGP encryption itself is solid. But poor key hygiene, reusing the same keys, or using weak passphrases destroys that advantage.
PGP Is Strong — But Human Error Isnt
Bottom Line:
Don’t rely solely on PGP.
Use separate identities, keys, and fingerprints per platform.
Assume every message metadata is stored server-side.
Keep PGP keys in non-persistent storage only.
Never use the same key for DMs and vendor shop listings.
PGP protects the message — not the context, timing, or metadata. LE doesn’t need to crack your crypto if they already cracked your behavior.
If we are talking about the PGP encrypted content Harvest Now, Decrypt Later technique is relevant. Stored VPN sessions, PGP encrypted emails and many more would be recovered at a later date if breakthrough has happened or quantum computers become fully functional. Some messengers (Signal, SimpleX) and protocols are attempting to get ahead on the problem by implementing the newly approved quantum safe algorithms. However breaking of the encryption in the first place and the actual security of the those algorithms is yet to be truly tested.
Other information like login times could have been logged by markets as well timing of messages sent.