Quote from: Chip Douglas on September 05, 2013, 05:21 amQuote from: dotgoat on September 05, 2013, 01:00 amQuote from: drjaycsmith on September 04, 2013, 07:37 amYou'll need an anonymous email address. Use your Tor browser to go to http://jhiwjjlqpyawmpjx.onion/. After signing up, use this new email address to generate a new key pair (public & private) for yourself. You give your public key to other people and they use that to encrypt messages to you. Never give out your private key or password--and make sure you use a STRONG password. Set your key to the max--4096 bits.You don't have to use an email address. One common format I'll see is "(their screen name)@SR" as the email. It's mainly there to help you look up the key. Also go to the link in my signature and then the third comment. Gives several helpful options to toss in your gpg.conf file (it may be hard to find this file depending on the program you use). Also the talk about hidden-encrypt-to is useful to know. Couple other tips that are obvious but can't be stated enough. Create a separate key just for SR. It's why a lot of people use a portable gpg setup because you then have separate keychain of your private key and public keys not linked to your main pgp keypair if you even have one. Again, make sure the password you choose is secure as that password is the only thing that protects it if that private key ever gets out. [ ... snip out interesting stuff that needn't be repeated ...]Tinfoil hat time, pretty much all this encryption we're currently using relies on two major things. A good way to get as truely random data as possibly out of a computer (which isn't easy, to the point people use outside sources like radio white noise and such) and that given a really large number you can't figure out what two prime numbers were multiplied to get it. It's not that hard to find two really large prime numbers and then multiply those together. It's extremely difficult (as far as anyone is publicly aware) to take that result and break it back down into the two prime numbers that created it. Issues with software RNGs happen a lot but the main deal breaker would be the prime factorization....ok that was a little more wordy than I expected. Getting back on topic, can't wait till warbeast's is back in stock...(edit) and I'm completely sober at the moment as well...Excellent demonstration of your knowledge, only you forgot one thing. - Telling us what we should do!Make your own?If we could do that, we wouldn't be having this conversation. Make a new topic under the Security topic. We're here to talk Meth, right?Awesome way to be a dick to a guy who's just talking about something that he finds fascinating, bro -- right on. ::)Do I really sound so different when I do it, or does my reputation alone protect me from this shit, haha. Well, let's find out, shall we: just to be precise, it's not just hard to get a random number out of software. It's outright impossible as far as anybody knows today. What a pseudorandom number generator actually is is just a mathematical function with an extremely, extremely large set of output values that in a sequence happen to look very random to us. But it isn't random at all, hence "psuedorandom." That's what "seeding" the generator is -- you give it the starting point and it starts spitting out random looking stuff, but it'll spit out the same identical sequence every time you seed it with the same value. Which can actually be handy for testing or repeating a set of conditions or whatnot, but that's beside the point.The only way to get a truly random number is to have devoted hardware of one form or another; think how many photons impact a collector plate in any given nanosecond, and that's your random number -- that sort of hardware device.P.S.: wtf is with the hostility, guys? I thought we were all brothers in deliberate addiction here :oP.P.S.: I bet I know why SoAlone is so alone... ::)