Quote from: jerrywildx on July 12, 2013, 08:45 pmhi i'm new here ;D-----BEGIN PGP PUBLIC KEY BLOCK-----Version: GnuPG v2.0.20 (MingW32)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=fADZ-----END PGP PUBLIC KEY BLOCK-----I hate to break it to you Jerry, but you have SERIOUSLY screwed the pooch here. You have made two fundamental mistakes: First, you used a Hushmail address. If I were in your shoes, I would abandon this account IMMEDIATELY. In 2007, as part of the DEA's "Operation Raw Deal", Hush turned over 12 CDs of DECRYPTED email to the DEA. Hush captured the users' passphrase through the use of a poisoned Java applet. Hush also captures and stores users' IP addresses. While that's bad enough, it gets worse. I've heard from sources that I consider reliable that Hush goes even further than they did in 2007 in the steroid busts -- I've heard that Hush scans email headers (at least) for keywords which could be related to criminal activity. If such a keyword is found, Hush investigates the user account, and if anything illegal is found, the information is turned over to the RCMP/Interpol. See: Steroid bust shows Feds can still get at "private" and "secure" e-mail http://arstechnica.com/security/2007/11/secure-hushmail-can-still-talk-to-the-feds/Also see: Encrypted E-Mail Company Hushmail Spills to Feds http://www.wired.com/threatlevel/2007/11/encrypted-e-mai/Secondly, your PGP key is not in a standards-compliant format. Starting in 2009, almost exactly 4 years ago now, both PGP and GPG adopted a 2-key format: one key for signing/authentication, and a separate sub-key for encryption. THe reason for so doing was that keys used for both signing and encryption can, under certain circumstances, leak some of the private key bits, making them easier to break. gpg --list-keys jerrywildpub 2048R/41FCB74F 2013-07-12uid "jerrywildx@hush.com" sub 2048R/EE4EAAE0 2013-07-12This is the key associated with your Hushmail account generated by Hush. As you can see, it has an encryption sub-key. pub 2048R/BDA7D3D6 2013-07-12uid Jerry Wild This is your key, which I am presuming was generated by Kleopatra. As you can see, it has NO encryption sub-key. If I were in yoru shoes, I would do the following: 1. IMMEDIATELY abandon the Hushmail account. 2. Delete your Forum account, and setup a new one with a new user-id. 3. If JerryWild is your ID on Silk Road proper, I'd consider changing that one also. 4. Setup a Tormail account, and generate a new key with standards-compliant software like GPG4USB. Nightcrawler4096R/BBF7433B 2012-09-22 Nightcrawler PGP Key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xB8F1D88EBBF7433B (MIT clearnet keyserver)PGP Key: https://keys.indymedia.org/pks/lookup?op=get&search=0xB8F1D88EBBF7433B (IndyMedia https: clearnet keyserver)PGP Key: http://qtt2yl5jocgrk7nu.onion/pks/lookup?op=get&search=0xB8F1D88EBBF7433B (IndyMedia .onion keyserver)PGP Key: http://dkn255hz262ypmii.onion/index.php?topic=174.msg633090#msg633090 (Silk Road Forums PGP Key Link)PGP Key Fingerprint = 83F8 CAF8 7B73 C3C7 8D07 B66B AFC8 CE71 D9AF D2F0