Silk Road forums

Support => Technical support => Topic started by: makalu on October 25, 2012, 12:24 pm

Title: correct process for PGP encrypt
Post by: makalu on October 25, 2012, 12:24 pm
First things, I am using Kleopatra under Gpg for windows


1. I create my .txt file with my real address and order info

2. Load Kleopatra, and click "file" then "sign/encrypt" files

3. Select the .txt file which I created

4. I then select "sign and encrypt (open PGP only)

5. Then select text output ASCII armor

6. I then select my certificate "for whom do you want to encrypt?" and the seller. I add the two certificates to the bottom box

7. Click "next"

the file should be encrypted, and when he opens it, this should show my writing.
he is not seeing this, any ideas what could be wrong?

i don't wish to use priv note as i have two orders and i don't want it taking forever for both our sake.

how do you encrypt your private key into a message in kleopatra?, I just see an option for the public key
Title: Re: correct process for PGP encrypt
Post by: CoolGrey on October 25, 2012, 12:42 pm
I see you also sign the message. I don't know if the other party has imported your public key yet, but if he hasn't, that may be the source of the problem.

Try to just encrypt the message, not sign it. See if that works.

Also, you should not send your private key to anyone. The only thing other people need is your public key.
Title: Re: correct process for PGP encrypt
Post by: pine on October 25, 2012, 05:18 pm
I used to recommend GPGWIN's GPA software (bundled along with Kleo usually). Now I recommend GPG4USB. It's like having seven league boots for PGP.

However I am wondering why an anonymous person is using PGP signing for the transaction of an illegal commodity?

Signing proves you, the person with the private key, is the one who bought the illegal product! If they get you and the private key, they have insurmountable evidence if you sign your messages. Don't sign your messages! In this instance there is no reason to, there is a reason not to.

Just use encryption. You use signatures to prove that you are the same person as before or to ensure the message wasn't interfered with.