![]() ![]() Using the information this Tox hacker had posted, I had very few details on how to contact him. It boiled down to a possible email address that he used and a PGP key (see my explanation on what that is below). Using these two pieces of information, I delved further, and ultimately found a way for us to talk in private. ![]() PGP stands for Pretty Good Privacy - no joke. A PGP key is a way that internet users can encrypt their messages, making it nearly impossible for anyone but the sender and receiver to read the message. ![]() Everyone using PGP must have two keys - a public key and a private key. PGP works like this: If I want to send a message to you, I first need to know your public key (there are online repositories with public keys available). Then, using software, I write my message and the text is ciphered in a way that is unique only to your public key.īut the only way for this message to be deciphered is to use the second part of the puzzle - your private key. So I send you a message that is encrypted using your public key. You must then put your private key into the PGP software to decrypt the message. (Screenshot) What an encrypted message looks like when you put copy and paste it to GmailĪnd, what do you know, less than a day later I got a reply from the email I sent! Given that no one but you knows the private key, it is nearly impossible for anyone to intercept the message and decode it. The Tox hacker said he would be interested in talking, but did not want to use Skype. He prefers to audit all the communication software he uses, and he wasn't sure about Skype's security. The ID-Nr comes without the 'Ricochet'-appendix, which seems an advantage if it falls into the wrong hands, but means a longer time to connect. Instead, he wanted to use another chat client. The Tox hacker decided that TorChat was best, because it best ensured anonymity. TorChat can be used for both instant messaging and file sharing, making it a go-to for dark net businesspeople. TorChat is a peer-to-peer instant messenger with a completely decentralized design, built on top of Tors location hidden services, giving you extremely strong anonymity. TorChat uses Tor networks, which is a decentralized network to make tracking traffic nearly impossible. TorChat also encrypts messages (like the PGP emails before) making the text of the messages sent impossible to intercept. TorChat can be used for both instant messaging and file sharing, making it a go-to for dark net businesspeople. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |