The darknet, also known as the dark web, is a concealed section of the internet that's inaccessible via standard search engines. You can only access it using special software, settings, or authorization. This area comprises websites and content that are purposely kept hidden from public view.
Accessing darknet requires using Tor Browser, a special web browser that routes your internet traffic through a global network of relays managed by volunteers. This way, it becomes very difficult to trace which websites you're visiting, and these sites won't know where you are located.
When visiting the dark web, use a secure browser like Tor, do not reveal any of your personal information, and don't open suspicious files or links to stay safe.
The Darknet is often utilized for secure communication, discreet information or file sharing, anonymous research without identity exposure, and occasionally for engaging in illicit activities. It is also recognized for hosting underground black markets(darknet markets), whistleblowing platforms, and discussion boards that champion freedom of speech.
While accessing Darknet Markets themselves is typically not against the law in most places, engaging with illicit goods within them is generally considered a crime. On the other hand, some people might visit Darknet Markets for lawful purposes such as research, journalistic work, or simply to explore online communities. It's essential to know the local laws regarding online activities, and be cautious when using these platforms to avoid any potential issues.
Step by Step Guide to using PGP with GPG Suite on Mac
Have a Macbook and want to explore the darknet? You should definitely read on how to install and use PGP with GPG Suite in order to stay anonymous and keep your info safe. Keep in mind that it is not as secure as a Linux based system with it's focus on security and open source. GPG Suite is a closed-source, commercial product embedded within the Apple ecosystem. It is considered unsafe for darknet use compared to Linux based systems and should be restrained to lower threat models. Use at your own risks.
What our step by step guide includes:
- Creating a basic key pair
- Backing up your secret key
- Exporting your public key to a backup file
- Copying your public key in cleartext
- Importing a public key into your key ring
- Decrypting a message
- Verifying a PGP signed message
- Encrypting a message
- Signing a message
Installing GPG Suite
https://www.gnupg.org/download/index.html
Lookup for GnuPG binary releases > OS X > MacGPG.
Following install:
Open System preferences > Keyboard > Keyboard shortcuts > Services
Check OpenPGP: Import key.
Check OpenPGP: Decrypt Selection.
Check OpenPGP: Decrypt Selection to New Window.
Check OpenPGP: Encrypt Selection to New Window.
Check OpenPGP: Verify Signature of Selection.
Check OpenPGP: Sign Selection.
Creating a basic key pair
Start GPG Suite and:
On the GPG Keychain screen, click the New button.
In the Generate new key pair popup, enter your desired name on the Full name field. The Email address field is optional.
Fill the Passphrase and Confirm fields with a strong password.
Click Advanced options.
Select RSA and RSA in the Key type field.
Select 4096 in the Length field.
Disable Key will expire on checkbox.
Click on Generate key.
A new secret key is now attached to your ring.
Backing up your secret key
Start GPG Suite and:
On the GPG Keychain screen, right-click the key you want to backup.
Click Export.
In the popup, select the folder and filename you want to backup the key in.
Activate the Include secret key in exported file checkbox.
Click Save.
You'll have to enter the passphrase attached to your key.
Your secret key is now saved as a file.
Exporting your public key to a backup file
Start GPG Suite and:
On the GPG Keychain screen, right-click the key you want to backup.
Click Export.
In the popup, select the folder and filename you want to backup the key in.
Click Save.
Your public key is now saved as a file.
Copying your public key in cleartext
On the GPG Keychain screen, right-click on your private key.
Click Copy.
Your public key is now in your clipboard.
Importing a public key into your key ring
Highlight the public key to import, then right-click it.
Click Services > OpenPGP: Import key.
On the GPG Keychain screen, click OK in the Import results popup.
Right-click on the key you just imported.
Select Details.
Under the Key tab, set the Ownertrust field to Ultimate.
Importing the key as untrusted could change the processes described in this tutorial.
The key is now imported in your key ring.
Decrypting a message
Highlight the message to decrypt, then right-click it.
Click Services > OpenPGP: Decrypt Selection to New Window.
As an alternative, if the message is within an editable text area, use Services > OpenPGP: Decrypt Selection.
You'll have to enter the passphrase attached to your key.
The decrypted message is displayed in a new window.
Verifying a PGP signed message
Highlight the message to decrypt, then right-click it.
Click Services > OpenPGP: Verify Signature of Selection.
The verification result is displayed on the Verification Results screen.
Encrypting a message
Highlight the text to encrypt, then right-click it.
Click Services > OpenPGP: Encrypt Selection to New Window.
In the Choose Recipients popup, search and select the recipient(s) for the message.
Activate the Add To Recipients checkbox if you want to be able to decrypt the message later.
Activate the Sign checkbox if you want to sign the message.
Select your private key in the Secret Key list and click OK.
You'll have to enter the passphrase attached to your key.
The encrypted message is displayed in a new window.
Signing a message
Highlight the text to encrypt, then right-click it.
Click Services > OpenPGP: Sign Selection.
You'll have to enter the passphrase attached to your key.
The signed message is displayed in a new window.
