Listen Music during reading my blog

Friday, April 24, 2015

[Tutorial] PGP for Newbs Windows (Kleopatra – Gpg4Win)



Part 0 – Introduction

Here’s the final guide in my PGP basics series, this time focusing on Windows. The OS in question will be Windows 7, but it should work for Win8 and Win8.1 as well. Obviously it’s not recommended to be using Windows to access the DNM, but I wont go into the reasons here. The tool we’ll be using is GPG4Win.

Part 1 – Installing the software

Just like I said above, we’ll be using GPG4Win. If you’re curious, you can view the source code for it here.
  1. Head on over to https://gpg4win.org/download.html. We want the full version, so click ‘Gpg4win 2.2.3′ iXqHJld[1]
  2. Save it, open it when it’s done downloading. If you have UAC enabled, click ‘Yes’ on the window that appears NFVNUCS[1]
  3. Choose your language, click ‘Ok’ SUJ3aT2[1]
  4. Click ‘Next’, then ‘Next’ again. You’ll now be at a screen asking what components you want to install. We’ll be selecting ‘Kleopatra’, ‘GpgEX’, and ‘Gpg4win Compendium’. Then click ‘Next’ oNLB4Kk[1]
  5. It will ask where to install, just keep the default and click ‘Next’
  6. Now it’ll ask where you want to install shortcuts. Select whichever you want, click ‘Next’
  7. You can choose which Start Menu folder you want it installed in, just click ‘Next’
  8. It will now install, when done you should see this. Click ‘Next’, then ‘Finish’ RYUfaj4[1]
Now you have the tools you need to get started with PGP

Part 2 – Generating your keypair

The next step is to generate your keypair so you can encrypt/decrypt messages. Like always, we’ll be going with 4096 bit RSA.
  1. Open up Kleopatra, you should be greeted with this beautiful screen 5i6tnlr[1]
  2. Go to ‘File’, then ‘New Certificate…’ u069Ntb[1]
  3. The Certificate Creation Wizard should pop up, click on ‘Create a personal OpenPGP key pair’ oVaws0J[1]
  4. Now you’ll enter your details. Use your marketplace username as ‘Name’, and fill out the rest with whatever you want. You don’t need to use a real email. Check the picture for an example on how it should look xJFjFGx[1]
  5. Do not click ‘Next’ yet, we need to fill out some more details. Click ‘Advanced Settings…’, and another window should appear. Under ‘Key Material’, make sure ‘RSA’ is checked. In the drop down menu beside it, and select ‘4,096 bits’. Check the picture to confirm you have everything set correctly, then click ‘Ok’ dcOihQG[1]
  6. Confirm you filled out all of your info correctly, then click ‘Create Key’ hUIQgMb[1]
  7. Another window will pop up asking to enter a passphrase. Do so, then click ‘Ok’ kIPFAQF[1]
  8. It will now generate your key. It will need you to do random things to create entropy. Mash keys, wiggle the mouse, watch porn, download torrents, whatever p8vJdbN[1]
  9. Your key is now created. Go ahead and click ‘Finish’ 1SRNdt6[1]

Part 3 – Obtaining your public key

Now we need to get your public key, without it vendors wont be able to send you secure messages.
  1. Right click on your key, then click ‘Export Certificates…’ h86y7Le[1]
  2. Browse where you want to save, give it a name, then click ‘Save’
  3. Open your favourite text editor, browse to where the file is saved. You may have to select ‘All files’ from the dropdown menu. Click the file you saved, then open XIFqJy8[1]
  4. There’s your public key gJK0c9S[1]
Remember to add your public key to your market profile so people can message you easier!

Part 4 – Obtaining your private key

Just as easy as obtaining your public key
  1. Right click on your key, select ‘Export Secret Keys…’ KBWbUBC[1]
  2. Select where you want it saved, give it a name, check ‘ASCII armor’, and click ‘Ok’ d4MPQKB[1]
  3. You now have your private key M4osyVS[1]
Remember to keep this in a safe place, and never share it!

Part 5 – Importing a public key

It’s impossible to send a vendor an encrypted message without their public key.
  1. Find a public key you want to import
  2. Copy everything from ‘—–BEGIN PGP PUBLIC KEY BLOCK—–‘ to ‘—–END PGP PUBLIC KEY BLOCK—‘, see the picture for an example 69UnFPR[1]
  3. In your task bar, right click on the Kleopatra icon, go to ‘Clipboard’, then click ‘Certificate Import’ UG15ss6[1]
  4. If it worked, you should see a window pop up, click ‘Ok’ J9kQIQB[1]
  5. You should now see the imported key in Kleopatra under the ‘Other Certificates’ tab 2G438Pi[1]
Thanks again Alan!

Part 6 – Importing your private key

Simple stuff.
  1. Go to ‘File’, then click ‘Import Certificates…’ hHDqxpO[1]
  2. Browse to where your private key is, select it, then click ‘Open’ Qq8OmEn[1]
  3. It will import your private key, and pop up a window to confirm. Click ‘Ok’ m6YsDUv[1]
  4. You should now see your key information under the ‘My Certificates’ tab SyPzPmp[1]

Part 7 – Encrypting a message

Now that we’re ready to go, lets go ahead and send a message.
  1. Open up your text editor of choice
  2. Type out your message, select it all, and copy it fpsVEX2[1]
  3. In your task bar, right click on the Kleopatra icon, go to ‘Clipboard’, then click ‘Encrypt…’ jSeuc6p[1]
  4. This gorgeous window will open. Click ‘Add Recipient…’ xmzkSvm[1]
  5. Another window will appear. Click the ‘Other Certificates’ tab, then select who you want to send your message to, then click ‘Ok’. 88SqUA2[1]
  6. You should be back at the previous window with the recipient listed. Click ‘Next’ g4qk0H6[1]
  7. If all went well, you should see this window. Click ‘Ok’ jnIS7Wo[1]
  8. Your encrypted message will be in your clipboard, all you need to do is paste it into the message box and send hrQ9tb0[1]

Part 8 – Decrypting a message

This is just as easy as encrypting.
  1. Copy everything that was sent aj50dmL[1]
  2. In your task bar, right click on the Kleopatra icon, go to ‘Clipboard’, then click ‘Decrypt/Verify…’ T8lqyCo[1]
  3. A window will pop up asking for your passphrase, enter that then click ‘Ok’ yj6ciCG[1]
  4. A window should pop up verifying it was decrypted, and copied to your clipboard. Click ‘Finish’
  5. Open your text editor of choice, and paste your message ENJY7tp[1]

Part 9 – Conclusion

I’m hoping this was in depth enough for you Windows users out there. PGP can seem complicated at first, but with an hour or two of your time you can see it’s actually pretty simple. There’s obviously more behind it, and different tools that can be used, but we might save that for another time. Stay safe everyone! Encrypt all messages!

This is the best & easiest way to buy Bitcoins:

↓↓↓ Bitcoin.de is highly recommended↓↓↓
Visit this link to create wallet to buy,sell or trade bitcoin: https://www.bitcoin.de/de/r/a94hf7
Now you can use Bitcoin express trading with FIDOR Mastercard 
No more waiting 
 Get your FIDOR Mastercard here for free:

                                 Hide your TOR usage and use IPVanish to stay anonymous !





                          ↓↓Click on the link down below to get more informations about pricing & IPVanish↓↓ 

                                                https://mainstreamlos.blogspot.de/2016/05/ipvanisch-hide-your-tor-anonymity-to.html

 https://www.ipvanish.com/?a_aid=572f5b3382754&a_bid=48f95966




 To visit bitcoin.de use this adress:  
https://www.bitcoin.de/de/r/a94hf7


How to access onion sites?

In order to use most of the sites on the Hidden Marketplace list, you must be able to access and browse .onion sites on the TOR network. Accessing these sites is a very simple process; for those of you that are still not familiar with the TOR browser and network, we have created a simple tutorial to help you access any onion site on the deep web.
A Short Explanation of .onion Sites:
.onion is a pseudo-top-level domain host suffix (similar in concept to such endings as .bitnet and .uucp used in earlier times) designating an anonymous hidden service reachable via the TOR network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed (in most cases, The TOR browser bundle), Internet programs such as Web browsers can access sites with .onion addresses by sending the request through the TOR network. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider.
To access these sites just follow these simple steps:
1. Navigate to the TOR Project website at this address: https://www.torproject.org/download/download.html.en and download the latest browser bundle for your operating system, never download any browser bundle from any other site! make sure that this is the site you are using:
tor browser bundle download
2. After downloading the browser bundle, just install it like any other software.
install tor browser bundle
3. Next, Start the TOR browser and it will connect to the TOR network ( it might ask you for a confirmation, just click ok):
3
4. After the browser is started, and you see the confirmation screen that the browser is connected and everything is ok, make sure that you are running the latest version of the TOR browser:
5
5. That’s it! you are all set to go, the only thing you need to do is the enter any .onion url into the address bar of the browser and you will be able to browse freely on the deep web:
access onion sites
Make sure you have Javascript disabled in the browser. Always be safe and use other measures to stay anonymous online such as PGP or anonymous VPNs. Enjoy your deep web experience!

How to access onion sites?



In order to use most of the sites on the Hidden Marketplace list, you must be able to access and browse .onion sites on the TOR network. Accessing these sites is a very simple process; for those of you that are still not familiar with the TOR browser and network, we have created a simple tutorial to help you access any onion site on the deep web.
A Short Explanation of .onion Sites:
.onion is a pseudo-top-level domain host suffix (similar in concept to such endings as .bitnet and .uucp used in earlier times) designating an anonymous hidden service reachable via the TOR network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed (in most cases, The TOR browser bundle), Internet programs such as Web browsers can access sites with .onion addresses by sending the request through the TOR network. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider.
To access these sites just follow these simple steps:
1. Navigate to the TOR Project website at this address: https://www.torproject.org/download/download.html.en and download the latest browser bundle for your operating system, never download any browser bundle from any other site! make sure that this is the site you are using:
tor browser bundle download 

 2. After downloading the browser bundle, just install it like any other software.
install tor browser bundle
3. Next, Start the TOR browser and it will connect to the TOR network ( it might ask you for a confirmation, just click ok):
3
4. After the browser is started, and you see the confirmation screen that the browser is connected and everything is ok, make sure that you are running the latest version of the TOR browser:
5
5. That’s it! you are all set to go, the only thing you need to do is the enter any .onion url into the address bar of the browser and you will be able to browse freely on the deep web:
access onion sites
Make sure you have Javascript disabled in the browser. Always be safe and use other measures to stay anonymous online such as PGP or anonymous VPNs. Enjoy your deep web experience!
Post a Comment