• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Us
  • Contact Us
  • Blog
  • Q&A ~ Ask Here!
Darknet Sites – Latest Dark web links 2023

Darknet Sites - Latest Dark web links 2023

Darknet sites - Darknet Links 2023

Darknet Hackers for hire

Opsec

How To Encrypt & Decrypt Messages Using PGP Via Gpg4usb?

October 24, 2022 by Darknet Links 2023 Leave a Comment

Gpg4usb is a PGP tool that can be operated on a USB drive and function on both GNU/Linux and Windows with the planned support of OS X. It offers a very lucrative user interface, portability so that it can be operated from multiple devices, and is of course open source. Like most of the PGP methods, it utilizes GnuPG as the backend. The OS that is used in this article will be Linux Mint, but the UI will remain similar across GNU/Linux distros and the versions of Windows.

Keep a note that not all the versions of PGP are formulated equally, there are some PGP programs that employ an unsafe or insecure version of PGP that have the chance of compromising the encrypted text. Others like Kleopatra, PGP4Win, and GPA use the depreciated versions of the GnuPG. This implies that they are not up to the date with the new version of GnuPG to cater to the latest standards of PGP. This can be unsafe as, for instance, Kleopatra does not generate subkeys. Subkeys are crucial as they can be abolished to decrease the damage from a key that has already been compromised. You will need to keep in mind to avoid using online PGP methods like iGolder. In these cases you will not be owning the keys so you cannot be completely sure that they are not decrypting or encrypting texts that are meant for viewing by you only.

Why Use Gpg4usb Over Other PGP Methods?

  1. Gpg4usb formulates RSA keys along with an encryption subkeys as well as a master key. The master key that will be offered to you will be used for signing other keys, abolishing subkeys, and also formulating new subkeys. Subkeys are crucial as they can be abolished to decrease the damage from a key that has already been compromised. You can abolish it with the master key and create your own subkey.
  2. Like we have mentioned above, Gpg4usb is “cross-platform”. If you wish to alter from Windows to GNU/Linux you can still carry that same key and a similar interface for your working. SWith the planned support of OS X another reason gets added to the list on why you should use Gpg4usb over other options.
  3. Gpg4usb is portable which implies that you can carry your PGP program and key along with you wherever you travel without the need to import your keys into another program. If you have plans to conduct this then it is a good idea to encrypt your USB drive.
  4. The Gpg4usb interface is most attractive when compared with all other PGP font ends. The UI is offered in an easy to evaluate manner where there are clear definitions of the options.
  5. The messages that are created in Gpg4usb can be encrypted with several keys. This implies that the user can have multiple recipients for a single message, and the user can even encrypt it with their own keys. Nobody without decrypting a message that has been encrypted with multiple keys can view the message. This is a good feature if you get scanned on the DNM since you can now prove back up and assertions that you have.

Part 1: Installing The Software

  • Since Gpg4usb is a portable operation, there is no per se installation. It is a group of files that will be extracted from a .zip archive  and will be copied on the USB drive. Head on over to the Gpg4usb website and select on the green “download” option, and then you will have to save the file.

Note: Gpg4usb will not operate on GNU/Linux distributions on USB drives which is in the form of FAT. If you’re only employing it on GNU/Linux OS then ext4 would be the ideal option, otherwise format it to NTFS.

  •  After you have finished with the download, open the .zip file with the archive manager of your choice. Ensure, you should be able to just “double-click” on it. You should see a folder that has been named ‘gpg4win’, with all the files that are required is there within that folder. Copy that folder to your USB drive, then open it.
  • Once you have done that check out the README file if you wish to know more about gpg4usb. To open that file, you will need to double-click ‘start_windows.exe’ if you are on Windows, or ‘start_linux_xxbit’ where ‘xx’ is your CPU structure. For the majority of users this will be the 64bit version.

Part 2 – Generating Your Keypair

  • This is the primary thing you should perform. Without your own pair of keys, it will be impossible for you to receive and decrypt texts. Open up gpg4usb and you will be greeted by the “First Start Wizard”. This will navigate you through the steps of formulating your keypair.
  • Select your language then choose “Next”. It will now ask you if you want to import keys from GnuPG, create a new keypair, or even import settings/keys from a previous version of gng4usb. Select “create a new keypair”, then click the button that reads “Create New Key”. You should be able to see a window with the title “Generate Key”. Enter all the information, you can fill out with a fake email if you don’t want to use your personal one, choose if you wish it to expire or not, select the KeySize, then formulate a strong password. A keypair of 2048 bit will be okay until 2030, but it’s advised to use a key of 4096 bit. If you wish to know more about how the size of the key impacts your security, check out the GnuPG website.
  • You can now select “Ok”, and a new keypair will be generated for you. This may take some time which depends on what programs are running on your computer. Watch some porn, type up that essay you were supposed to have done last week, torrent some GNU/Linux ISOs. If all goes well a window is supposed to pop up confirming that your keypair has been formed.
  • You can now come out of the wizard, and choose if you wish to see the offline help or see the wizard again next time you begin. You will be brought to the original gpg4usb window and there you can see your keypair on the right, along with the keypair of gpg4usb.

Part 3 – Obtaining Your Public Key

  • To get messages you will require your public key that has been posted somewhere. This is really simple in gpg4usb as you don’t require to save it to a file initially.
  • With gpg4usb open, select “Manage Keys” which is at the top. A window titled ‘Key Management’ should come up. Check off the box that is right beside your keypair name, and choose “Export to Clipboard” which is at the top. Now you can paste your public key somewhere where the people will get access to it so they can send you texts. If you want to backup your public key you can also choose “Export To File” and save it somewhere of your choice.

Part 4 – Obtaining Your Private Key

It’s a good decision to back up the private key somewhere safe so that it can be retrieved in case of computer failure. Even though this  is rare, things do occur and you will not want to be paused for not being able to decrypt that very crucial message your mother has sent you.

  • From the original window right click on your key that is on the right, and select “Show Key Details”.
  • From this place you can see it’s  fingerprint, details of your key, and export all your private key. Select the button that says ‘Export Private Key’ and it will give you warning that this is sensitive data that should not be shared. Select the place where you want to save it and keep the filename it provides. A good choice is to save it to a microSD card and hide it in a place from where you can get it if you need it.

Part 5 – Importing A Public Key

Gpg4win makes importing your public key as easy as it did while you were exporting it. Highlight everything that includes “—– BEGIN PGP    PUBLIC KEY BLOCK —– ‘ and ‘ —– END PGP PUBLIC KEY BLOCK”, and then copy it. In the main gpg4usb window select “Import Key”     at the top, go to “Clipboard”. You will then see a pop up window with the details of the imported keys.

Part 6 – Importing A Private Key

By now you know how to import a public key and importing a private key is as easy as that too. You need to click on the “Import Key”  and then “File” in the main Gpg4usb window. Browse the location where you have saved your private key. As you locate it, open it. A pop-up window will be displayed confirming that it has been imported. Click on “OK” and you will see the keypair in the right hand side of the Gpg4win.

 

Part 7 – Encrypting A Message

This step is pretty straightforward. You can see a text box in the main window of Gpg4usb. You need to type in your message. Click the checkbox for the recipient on the right hand side. Click on the “Encrypt” at the top. As you do this, your message will get encrypted. Copy the encrypted message and send it to the recipient.

Part 8 – Decrypting A Message

The Gpg4usb makes all of these really easy. If you have received an encrypted message, copy the encrypted message and paste in the left blank field and click on “Decrypt” at the top. Now enter the password and your decrypted message will be encrypted making it easier to read.

 

Conclusion

If you have followed all the steps and understood as you were doing it, you are actually increasing your privacy. PGP at the first instance can seem complicated. But once you learn how to do it and get a hang of it, you would feel that your initial thoughts were vague. If you still think it is complicated, just push that thinking aside and think just going through these steps might save you from serving years in prison.

Easy Way To Encrypt Hard Disk With VeraCrypt

October 24, 2022 by Darknet Links 2023 Leave a Comment

Did you hear about TrueCrypt? If yes, you will have lesser problems understanding the concept as it is nearly the same. VeraCrypt is an open-source and free disk encryption software that is based on TrueCrypt. It offers enhanced security to the algorithms that have been used for the system. It also partitions the encryptions shielding them from the new developments in brute-force attacks. Additionally, it solves several vulnerabilities as well as security issues found in TrueCrypt.

This advanced-level security invites some delay SOLELY to the launch of the encrypted partitions without disturbing the performance of the application use phase. This is, however, acceptable to the legit owner although it makes it much difficult for an attacker to achieve access to the encrypted data. VeraCrypt is truly compatible with TrueCrypt and can even mount the TrueCrypt volumes. It also has the capability to convert them to the VeraCrypt format.

Encrypting Hard Disk With VeraCrypt

Here is a step-by-step guide on how to encrypt your hard disk with the help of VeraCrypt. This aims to be helpful for beginners who are wishing to do so but do not know how the procedures work. Follow the procedure step-by-step for successful encryption.

Step 1 

If it is the first time you are using VeraCrypt, download and install VeraCrypt. After successful download, launch VeraCrypt by double-clicking on the “VeraCrypt.exe” file. Alternatively, you can also click on the VeraCrypt shortcut in your windows start menu.

Step 2

The main VeraCrypt window will open. Locate the “Create Volume” button and click on it.

Step 3

On doing this, the “VeraCrypt Volume Creation Wizard” window will open. At this point, you need to choose the location where you want the VeraCrypt Encrypt Hard Disk With VeraCrypt volume to be created. A VeraCrypt volume can stay in a file, also known as a container, in a drive or partition. But in this tutorial, we will go with the first type. Thus, we will create a VeraCrypt volume within a file. This option is selected by default. So you can click “Next”. Note, here the right side of the wizard is shown as a screenshot.

Step 4

Now, you will need to choose whether to create the volume as hidden or standard VeraCrypt. But, we will choose the standard one and create a standard VeraCrypt volume. The option is selected by default. So go ahead and click “Next”.

Step 5

At this point, you have to specify where you want the VeraCrypt volume (the file container) to be created. Note that the VeraCrypt container is just like a usual file. Thus, it needs a file name that you have to choose in the next step. As the dialog box appears, click on “Select File”. Make sure that the volume creation window remains open in the background.

Step 6

This tutorial will focus on the creation of volume VeraCrypt in the F drive as in F:\Data\. The file name of the volume or container needs to be “My Volume”. Note that the file name “My Volume” originally does not exist but will create it for you.

Take a note that VeraCrypt will not encrypt any of the existing files while creating the file container. If in this step, you select an existing file, it will just be overwritten and will be replaced by the newly created volume. This means that the overwritten file will be lost and not encrypted. Later on, you will be able to encrypt the existing files by moving them to the VeraCrypt volume.

  • Choose the desired path in the selector where you wish to create the container.
  • Type the desired container name for the file in the “Filename” box.
  • Click “Save”. The file selector window will disappear.

In the next steps, we will return to the volume creation wizard of VeraCrypt. Also, note that after you have copied the unencrypted existing files to the VeraCrypt volume, you must securely wipe off the original unencrypted files. You might find a software tool of your choice that performs the secure erasure function and honestly, many of them are free.

Step 7

Click “Next” in the Volume Creation Window.

Step 8

In this step, you can select an encryption algorithm as well as a hash algorithm for the volume. If you are unsure about what to choose here, you can go ahead with the default settings. Click “Next”.

Step 9

Here, we have specified that the VeraCrypt container size would be 250 megabytes. You can choose a different size for the VeraCrypt container. After you have specified your desired container size in the empty field, click “Next”.

Step 10

Here come the most important steps of all. You are required to choose a good volume password. Read the note given in the dialog box before you enter your password. You need to type the password in the first empty space. Next, you have to re-enter the password to confirm. The “Next” button will be disabled until you type both the passwords same.

Step 11

Now, you have to randomly move the mouse as much as possible till the indicator becomes green. It will be better if you move the mouse for a longer period. The cryptographic strength of the encryption keys significantly increases and further increases security. After this, click “Format”.

As you do this, the volume creation begins and VeraCrypt creates a file named “My Volume” in the folder “F:\Data\”. This file will be the VeraCrypt container. The volume creation may take time depending on the size of the volume. As the process gets over, a dialog box will be displayed. Click “OK” to close the dialog box.

Step 12

The VeraCrypt volume has been created successfully. Now, in the volume creation window, click “Exit”.

The next steps are for mounting the volume that has just been created. We will be returning to the main window of VeraCrypt that was already running. If that is not running, you need to go to step 1 and launch the VeraCrypt and continue from step-13.

Step 13

At this point, you need to select one of the drive lists from the drop-down list. This will be the drive letter on which the VeraCrypt container would be mounted. For this tutorial, we have chosen drive M, but you can choose anyone from the available options.

Step 14

Click on “Select File”.

Step 15

In the file selector, you need to browse the container file that you have created in steps 6-12 and select it. Then click “Open”. The file selector window will get disappeared.

Step 16

Click on “Mount” in the main VeraCrypt window and you will receive a password prompt dialog box.

 Step 17

Type the same password that you have set in step 10 in the password input field..

 Step 18

In this step, you have to select the PRF algorithm that has been used while creating the volume. The default PRF is SHA-512 that VeraCrypt uses. In case you do not know which PRF has been used, you can just set it to “autodetection”. However, the mounting process will take time. After entering the password, click “OK”.

Now, VeraCrypt will try to mount the volume. If the password entered is incorrect, you will be notified and you will be required to repeat the previous step. You need to repeat the previous step wherein you have to re-enter the password and click “OK”. If the password is correct, the volume will get mounted.

 Step 19

This is the final step. We have already mounted the container as a virtual disk M. The virtual disk is also entirely encrypted including free space, allocation tables, file names, and more. This behaves like a real disk. You can copy, move, save files to this virtual disk. They will be encrypted on the fly as they get written.

In case you open a file that is stored on the  VeraCrypt volume, say, in a media player, the file will get auto decrypted to RAM or the memory on the fly while the file is being read. Note that when you open a stored file on a VeraCrypt volume or when you write/copy a file to/from the VeraCrypt volume, you will nerve be asked to reenter the password. You will just need to enter the correct password only while you are mounting the volume.

You can also open the mounted volume by selecting it on the list and then double-click on the selected item. Simultaneously, you can also browse the mounted volume the same way you normally browse the other types of volumes. You can copy the folders and the files to and from the VeraCrypt volume, in the same manner, you will copy them to any normal disk. The files are being copied from the encrypted VeraCrypt volume or read gets automatically decrypted on the fly in the RAM.

Note that VeraCrypt never stores the decrypted data to a disk. It just stores them for some time in the RAM. Even when the volume of VeraCrypt is mounted, the volume stored data is encrypted. When you restart Windows or even turn off your computer, the volume gets dismounted and all the files stored on it get inaccessible and encrypted. When you restart Windows or even turn off your computer, the volume gets dismounted and all the stored files become inaccessible and encrypted. The same thing happens when the power supply suddenly gets interrupted. In order to make them accessible, you will need to mount the volume again. For doing so, you need to repeat the steps from 13 to 18.

If you wish to close the volume and make the files inaccessible again, you would either need to restart your OS or dismount the volume. For doing it, you would need to follow the below-mentioned steps:

  • Select the volume from the list of the mounted volumes appearing in the main VeraCrypt window.
  • Click “Dismount”.

 

If you want to make the stored files in the volume accessible again, you have to re-mount the volume following the steps from 13 to 18.

With this, we come to the end of the tutorial where you have successfully learned and encrypted your hard disk using VeraCrypt.

How To Install Whonix Easily & Quickly On Your PC?

October 24, 2022 by Darknet Links 2023 Leave a Comment

There are a couple of operating systems or OS available, of which Whonix is one. Whonix is known for its anonymity, privacy and security. The OS is based on the Tor anonymity network and its protection by isolation. With the Whonix OS, DNS leaks are impossible. Even the malware with the root privileges cannot find out the actual IP of the users. This ensures a safer way for accessing the deep web as opposed to just accessing the Tor browser on your current operating system. Generally, it is discouraged to use Tor with a Windows OS as NSA has direct access to the Microsoft systems. NSA also keeps an account of the information that Microsoft hands over to them.

This article will discuss how easily and quickly you can install the Whonix OS on your personal computer. But before we do so, a basic understanding of how the Whonix OS works will be literally helpful. Whonix consists of two parts. The first is the one that solely runs the Tor browser and acts as a gateway. The gateway is termed as “Whonix-Gateway”. The second is the one that the user uses and is termed as the “Whonix-Workstation”. This is on an entirely different and isolated network that only permits the connections via Tor. Both these parts run in their individual virtual machines on your system. This is what keeps you contained within Whonix.

Installing Whonix On Your PC

There are a couple of easy steps that will enable you to install the Whonix OS on your PC without any hassle. So, without much waiting, let us get into the actual process.

To start off, you will have to download the VirtualBox. This will permit you to create virtual machines and help you run Whonix on your computer. Next, you have to download both the Whonix-Gateway and the Whonix-Workstation. You will be provided with a couple of options for download. You need to choose the one that best fits your requirement. Additionally, you are suggested to verify the images utilizing the Signing Key if you know how to do so. Else, you can gather some knowledge on PGP Encryption or Pretty Good Encryption. After you have successfully installed the VirtualBox, open the program and follow the below-mentioned steps:

  1. Click “File” and then choose “Import Appliance”.
  2. Click “Choose” and select the downloaded Whonix-Gateway.ova file.
  3. Click “next” and then “Import” without changing any of the default settings.
  4. Wait until the progress bar completes the import.
  5. Repeat these steps for the Whonix-Workstation.ova file as well.
  6. Now simultaneously start the Whonix-Gateway and Whonix-Workstation.

If you are doing this process for the very first time, you will need to go through a quick setup process. Following this, you will need to wait until Whonix searches for and installs any necessary updates. Make sure you keep the Whonix-Gateway running. Although it will just run simultaneously, and you do not do anything with it except for updating. You will be conducting all your activities within the Whonix Workstation virtual machine window. With this, you can use the Whonix OS to browse the internet more safely and securely without having to make some extreme changes to your personal computer.

How To Securely Chat Via Jabber/XMPP With OTR

October 24, 2022 by Darknet Links 2023 Leave a Comment

pidgin

 

Security plays a significant role these days when people are inclined more towards privacy. Jabber/XMPP, also otherwise known as Pidgin, is the best solution if you want to safeguard your privacy while enjoying a secured chat facility. Pidgin is an open-source and free client that allows you to manage and organize your various instant messaging or IM accounts using just a single interface. The OTR or the Off-the-Record plugin designed for Pidgin usage ensures that there remain secure and authenticated communications between the users of Pidgin or Jabber.

To start off your journey with Pidgin, you are required to have an existing IM account, following which you will need to get yourself registered to Pidgin. You might find a lot of services offering you XMPP servers. If you are still not having an existing account, you can directly create it via the XMPP/Jabber software. You can also create your account on jabbim.com.

Downloading & Installing Pidgin To Your Computer

In this article, we will be guiding you through the straightforward process of downloading and installing Pidgin. Then, to enjoy fast, secure, and instant messaging, follow the steps one by one as mentioned below:

  1. Visit Pidgin.im, download the .exe file and install it by double-clicking the .exe file.
  2. Launch the Pidgin. If you are installing the Pidgin for the first time on your system, a welcome screen will appear as soon as you launch it.
  3. Click on the “Add” button, and you will be displayed a blank Add Account window.
  4. Under the “Basic”, click on the “Protocol” drop-down list. A list of the IM service protocols that the Pidgin supports will be displayed.
  5. Select “XMPP” from the drop-down list.
  6. Type your username as you wish suffixed by @jabber.calyxinstitute.org. (For example, if you choose a username “Flower”, the format will be – [email protected]).
  7. Next, choose a long password and click on the checkbox of the remember password. If you want to optimize your security and privacy, you must not click on the “Remember Password” checkbox. This implies that whenever you log in to your Jabber account and chat online, you will be prompted to provide your password. This helps you to keep off the pretenders who pose to be you if you keep your system unattended for some time. Additionally, you can store the username and password in case you need them anytime later.
  8.  Choose a name for “Local Alias” that people would see or that you would like your contacts to see. However, this field is optional.
  9.  Click on “Add” to complete your account creation.
  10. Next, to carry forward chats, you will need to add your buddies or contact person. To add a buddy to your Jabber/XMPP account, do the steps as stated below:
  • Locate “Buddies” at the top and click on it. A drop-down list appears. Choose “+ Add Buddy”.
  • As you do this, an “Add Buddy” dialogue box appears. In the “Buddy’s Username” text field, type in your buddy’s or contact’s email address (or Pidgin user email). Say your buddy’s username is “[email protected]”. You need to type this precisely in the text field.
  • Enter the alias of your buddy with which you will identify him. The name you enter will appear in the online contacts list later in the Pidgin. However, this is optional. On not entering a particular alias, your contact’s email address or username gets displayed.
  • Click on “Add” to add your buddy. This will send your buddy a message from you requesting authorization or approval of your request to add him to your Jabber contact list.
  • When your buddy receives an authorization request from you, he is required to click on “Authorize”. As soon as he authorizes, his username (alias or email id) gets displayed in the contact list.

 

11. Next, locate “Tools” at the top and choose “Plugins”.

12.Locate the “OTR” or find the option “Off-the-Record Messaging” and click on the checkbox. Click on “Configure Plugin”. (Note: OTR               will only work if both you and your contact/buddy installs and enables it).

 

Sending Message Securely Using XMPP/Jabber

We have covered how you can download and install the Jabber/XMPP in your system in the previous segment. Here, we will be covering how you can send messages to your contacts.

  1. Locate your buddy’s name in the list of contacts and double-click on it.
  2. The chatbox opens.
  3. You might find in the bottom right “unverified with an exclamation mark”. Click on it and choose “Authenticate Buddy”.
  4. A pop-up appears. From the drop-down list, select “Manual fingerprint”, and in the below, you will find another drop-down. Click on that and choose “I Have”. Click “Ok”.
  5. Next, in the chatbox of your contact/buddy, at the bottom right, right-click on the “option” and choose “Start private conversation”. As you do this, your messages get encrypted while you chat.
  6. When you want to exit Pidgin, make sure to choose “End private conversation” by right-clicking on the “private” option in green. This ensures all the messages and records are destroyed as you exit.

These are all the processes to successfully download, install and chat via the Pidgin or XMPP/Jabber. This might seem like a long process. But you will find it easy once you start doing it and get the hang of it. However, mostly the procedures are for the first-time user. If you already have installed and performed the basics, you will need to follow the messaging part each time you want to have a one-to-one encrypted conversation.

Primary Sidebar

Darknet Resources

Tags

crypto darknet darknet cashout darknet chat darknet conversation darknet databreach darknet ddos darknet drugs darknet gun Darknet Markets darknet money makeing darknet os darknet tor Darkweb Forums darkwebmarkets Darkweb Vendors database darknet Dread Drug Busts jabber Not Darkweb Opsec pgp privacy chat privacy irc privacy jabber privacy os rdp secure chat sock5 tor proxy tail Tor tor browser tor chat tor gateway Tor Irc tor maret tor whonix whonix xampp chat

Get Exposure Today!

More to See

Simple Tails Installation

October 24, 2022 By Darknet Links 2023

Easy Way To Encrypt Hard Disk With VeraCrypt

October 24, 2022 By Darknet Links 2023

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

Footer

About

Darknetsites is a conglomerate concentrating primarily on furnishing the current updates regarding the hidden marketplaces (Dark Web Markets), Deep Web, Tor Browser, Darknet technologies, tools and much more. We aim to suffice your knowledge requirements regarding the various aspects of the Tor network, including the latest darknet news making the site relevant in all possible ways. Furthermore, we strive to offer you true-by-all-means advice and support on anonymously, securely and safely using the darknet.

Recent

  • How To Encrypt & Decrypt Messages Using PGP Via Gpg4usb?
  • Simple Tails Installation
  • Easy Way To Encrypt Hard Disk With VeraCrypt
  • How To Install Whonix Easily & Quickly On Your PC?
  • How To Use The Tor Browser As A SOCKS 5 Proxy

Search

Copyright © 2023