Quote from: HighGirl on May 16, 2013, 02:36 amOk, apparently it didn't work because it got sent back. I'm using Mac OS X, Thunderbird with Enigmail, and GPG Keychain Access, and I just seem to have trouble sending messages and/or even finding my private key. My friend said it's safer just to not know it, and that you never really need it, but it seems like it would be necessary no? I think i am overthinking this, usually I don't have a problem with this kind of stuff.You're not doing it right because your model of what is going on is wrong. This is not PGP + Email, this is just PGP.We're not setting up PGP with an email client such as Thunderbird on this forum. We're manually encrypting using GPG programs. Then we're copy pasting the encrypted result into forum messages and PMs and other web based forms on SR and SRF. People who use Email programs don't really understand PGP, just the illusion that they do and they don't have any anonymity either. Using PGP manually with webmail is fine though, since you can access such a service via Tor.Our email addresses in our public keys are either Tormails, anonymized webmail, or just fake, which is probably why your message bounced. The email address in my public key for example is nosuchemail@nowhere.nada, while one of my points of contact is burrow@tormail.org, but I largely correspond on the forums.PGP is not anonymous. If you sent me an encrypted message from your Thunderbird and you didn't torify it, I could work out what IP address you have. Your friend is an [expletive]. Can't really be more polite than that. PGP is essential to your safety on SR. Many vendors require it, they treat it like an IQ test and those that don't use it are not trusted by the most experienced SRians. As far as most vendors are concerned, people who don't use PGP are the low hanging fruit in a bust. Nobody in the right mind is depending on SR's servers to be 100% secure forever. You don't need to find your private key because you're never going to be using it directly, which is why PGP programs normally hide it somewhere out of the way in the interface. Your private key is to be kept on your computer and only your computer.I suggest you download GPGTools and follow this tutorial for OSX:====================GPGTools is highly version dependent -- depending on which version of OS X you have, it may or may not work as expected. If you have Leopard (10.5) then you're pretty much out of luck. Your only option then will be using the command-line.If you have Snow Leopard (10.6), Lion (10.7) or Mountain Lion (10.8), the following instructions should be sufficient to allow you to get up andrunning.Download and install GPGTools: http://nightly.gpgtools.org/GPGTools_Installer-trunk.dmgOnce you have installed GPGTools, what you want to do is to go intoSystem Preferences --> Keyboard --> Services.Scroll down until you find the following entries. Be sure to put a check mark in the boxes to activate each keyboard shortcut.Keyboard shortcuts:===============OpenPGP: Decrypt Selection: Shift-Command-DOpenPGP: Encrypt Selection: Shift-Command-EOpenPGP: Import Key from Selection: Shift-Command-IOpenPGP: Insert My Fingerprint: Shift-Command-FOpenPGP: Insert My Key: Shift-Command-KOpenPGP: Sign Selection: Shift-Command-ROpenPGP: Verify Signature of Selection: Shift-Control-VRemember, these shortcuts only operate on highlighted or selected text.N.B.: To properly be able to import PGP into GPGChain (via TextEdit) you need to change the default on TextEdit from .rtf to plain text. You can do that through the Format menu, or you can go through the main configuration menu, accessible by using Command-comma. Ensure the plain text radio button is selected.Also ensure that the following are UNCHECKED in TextEdit preferences: smart quotes, smart dashes, smart links.To select text within TextEdit, use Command-A to highlight the entire document, or use your mouse to selection the section that you want toverify/sign/encrypt/decrypt. It is highly recommended that you use only plain-text, as opposed to Rich Text (.rtf) format. Use Command-comma tobring up Preferences and ensure that the plain text radio button is checked.Once your text is highlighted in TextEdit, (by pressing Comand-A) you then encrypt using Shift-Command-E. You will then be presented with a list of keys to encrypt to, that you have added to your PGP keyring:Other Commands You May Need:=========================OpenPGP: Decrypt File: Control-Command-DOpenPGP: Encrypt File: Control-Command-EOpenPGP: Sign File: Control-Command-SOpenPGP: Verify Signature of File: Control-Command-VOnce you have setup these shortcuts, you can begin using GPG.To encrypt a message to someone using GPG, you first need a copy of the recipient's PGP public key.Once you have located someone's PGP public key, you should copy and paste it into TextEdit. Save the PGP key to a file; you can call the file,import.asc (or import.txt), for example. This saved file will usually be found in the Documents folder.Launch GPG Keychain Access from the Applications folder. click on the Import icon in the upper left hand corner. GPG Keychain Access will thenprompt you for the name of the file which contains the key to import. It will usually show you a list of files in the Documents folder. Click on thefile named import.asc (or import.txt), and click ok. The PGP public key will then be imported into your PGP keyring.To encrypt a message to a person, the message must be contained in a TextEdit document. Use Command-A to hightlight the entire document. Then use Shift-Command-E to encrypt. GPG will pop-up a list of public keys in your PGP keyring. Each key will have a little checkbox beside it which you can check, to select that particular key. If you were encrypting a message to me, you would put a check in the box beside my PGP key.When you click on OK, the plaintext (unencrypted) message in TextEdit will be replaced with the encrypted message. You can then copy and paste the encrypted message to enter it into a form on Silk Road, or anywhere else that it needs to go.To decrypt a message sent to you by other people, you need to copy that message to the clipboard, and paste it into a TextEdit document. Again use Command-A to highlight all the encrypted message. Then use Shift-Command-D to decrypt the message. If the message is encrypted to your PGP public key, you will be prompted to enter your passphrase. Once the correct passphrase has been entered, and you click OK, then the message will be decrypted, and the decrypted text will be placed in the TextEdit document, replacing the encrypted message that was there previously.