PGP Encryption Complete Guide
Master PGP/GPG for secure Darkmatter Market communication
What is PGP and Why You Need It
PGP (Pretty Good Privacy) is military-grade encryption that protects your communications on Darkmatter Market.
Account Security
PGP public key required during registration. PGP 2FA protects login even if password is stolen.
Message Encryption
Communicate with vendors privately. Only you can decrypt messages with your private key.
Address Protection
Encrypt shipping address so only vendor can read it. Market admins cannot see your address.
Signature Verification
Verify official mirror URLs through PGP-signed Dread posts. Prevents phishing attacks.
Installing PGP Software
Windows: Gpg4win (Kleopatra)
- Download from:
gpg4win.org - Run installer (accept defaults)
- Launch "Kleopatra" application
- Kleopatra is your PGP key manager
macOS: GPG Suite
- Download from:
gpgtools.org - Install GPG Suite
- Open "GPG Keychain" app
- Integration with Apple Mail included
Linux: GPG Command Line
Most Linux distros include GPG by default:
gpg --version
If not installed: sudo apt install gnupg (Debian/Ubuntu)
Generating Your PGP Key Pair
Using Kleopatra (Windows/Mac GUI):
- Open Kleopatra → File → New OpenPGP Key Pair
- Name: Use pseudonym (e.g., "Dark Buyer 2025")
- Email: Use throwaway/fake email (doesn't need to be real)
- Click "Advanced Settings"
- Key Material: RSA 4096-bit (strongest)
- Valid Until: Set 2-3 years (can extend later)
- Click "OK" → "Create"
- Passphrase: Enter STRONG passphrase (12+ characters, mix symbols/numbers)
- Confirm passphrase
- Wait for key generation (may take 1-2 minutes)
- Key pair created! You'll see it in Kleopatra list
Using GPG Command Line (Linux/Advanced):
gpg --full-generate-key
- Select: (1) RSA and RSA
- Key size: 4096
- Expiration: 2y (2 years)
- Confirm: y
- Name: DarkBuyer2025
- Email: darkbuyer@proton.me (or fake)
- Comment: (leave blank)
- Confirm: O (okay)
- Enter strong passphrase twice
- Passphrase protects your private key
- If someone gets your private key file WITHOUT passphrase, they still can't use it
- Use 15+ character passphrase with symbols:
Quantum!Market#2025$Secure - NEVER forget passphrase - cannot be recovered
- Store passphrase separately from key file
Encrypting Messages
Encrypt your shipping address or messages to vendors:
Using Kleopatra:
- Copy vendor's PGP public key from their profile
- Kleopatra → File → Import → Paste vendor's public key → Import
- Write your message/address in Notepad
- Kleopatra → Notepad icon → "Sign/Encrypt Notepad"
- Select vendor's public key from list
- Click "Encrypt"
- Copy encrypted message block (-----BEGIN PGP MESSAGE-----)
- Paste into Darkmatter message field
Using GPG Command Line:
echo "Your message here" | gpg --encrypt --armor --recipient vendor@market.onion
Or encrypt from file:
gpg --encrypt --armor --recipient vendor@market.onion address.txt
Decrypting Messages
Decrypt vendor messages, 2FA challenges, or confirmations:
Using Kleopatra:
- Copy entire encrypted message block from Darkmatter
- Kleopatra → Notepad icon → "Decrypt/Verify Notepad"
- Paste encrypted message
- Click "Decrypt"
- Enter your private key passphrase
- Decrypted message appears in new window
Using GPG Command Line:
gpg --decrypt message.asc
Or from clipboard:
echo "-----BEGIN PGP MESSAGE-----..." | gpg --decrypt
Verifying PGP Signatures
Verify official Darkmatter mirror URLs from Dread forum:
- Import Darkmatter admin's public key from Dread profile
- Copy PGP-signed mirror announcement
- Kleopatra → Notepad → "Decrypt/Verify"
- Look for "Valid signature" from Darkmatter admin key
- If signature is valid, mirror URLs are authentic
- If signature is invalid/missing, DO NOT trust the URLs
Backing Up Your Keys
Export Private Key (CRITICAL BACKUP):
Kleopatra:
- Right-click your key → Export Secret Keys
- Save to encrypted USB drive (NOT cloud storage)
- Filename example: darkmatter_privatekey_2025.asc
- Store USB in secure location (home safe, bank deposit box)
GPG Command:
gpg --export-secret-keys --armor your.email@example.com > private-key-backup.asc
Export Public Key:
gpg --export --armor your.email@example.com > public-key.asc
- NEVER upload private key anywhere online
- NEVER send private key to anyone
- Store offline only (USB, paper printout)
- Encrypt backup USB drive with VeraCrypt
- Test backup periodically by importing to verify it works
PGP Best Practices for Darkmatter
✅ DO:
- Use 4096-bit RSA keys
- Create separate PGP identity for darknet (don't mix with clearnet email)
- Set key expiration (2-3 years, renewable)
- Use strong 15+ character passphrase
- Back up private key to offline storage
- Test encryption/decryption before first purchase
- Import vendor public keys before messaging
❌ DON'T:
- Share private key with ANYONE
- Upload private key to cloud storage
- Use weak passphrase
- Forget passphrase (cannot be recovered)
- Lose private key backup
- Use real personal email in PGP identity
- Skip signature verification on mirror URLs