Updated on:

So keep in mind that if you are a user of Silk Road, or any other form of activism, you never want to enter any identifying details about yourself online.

Make it so that even if the NSA intercepted and decrypted, or compromised Silk Road that the only information they have against you is your username and password.

How safe is that username and password? Does your password contain any identifying information? Is it the same password that you use for your personal email? Does it contain a name of somebody you know personally? Always keep all of these factors in mind.

Another step you must take, especially when communicating with other users on sites such as Silk Road is using PGP encryption.

This is not always possible, such as in cases when you are logging into a website, filling out a form, logging into an email, etc.. Consider any type of information you enter into a website using plain text possibly compromised.

Never put anything sensitive is any type of plain text format online.

Your TOR usage is being watched

PGP comes into play because it uses a very strong method of encryption called cryptography.

PGP stands for Pretty Good Privacy, and it is used for encrypting, decrypting and signing texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.

For the more technical users, it uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography.

For the less technical users, the process of encrypting messages using PGP is as follows.

You create a private key and a public key.

The public key is the key you give out to people you want to send you encrypted messages.

Your private key, is kept privately by you.

This private key is the only key that can unlock messages that were previously locked with your public key.

If you are still confused, think about it like this.

Think about a public key that can go around locking boxes that are intended for you.

Anyone can lock a box that is intended for you, but you are the only one with the key to unlock the box.

Either if the person who sent you a message locked a box (message) with your public key, they themselves can not unlock it.

Only the person possessing the private key can unlock it.

If you wish to respond to this person, you must use their public key to encrypt the message you intend to send to them.

And they themselves, use their own private key to decrypt the message you sent them.

If you are still with me, I am glad I haven’t lost you yet.

This is called cryptography and was designed so that anybody intercepting your message could not decrypt the message without your private key.

Even if you yourself, lose your private key, there is no method of key recovery.

You can consider that message locked forever.

So how do you use PGP?

Well before we get to that, I want to introduce you to a Live Operating System, which makes using PGP encryption and decryption very easy.

A live operating system is an operating system that you can run on top of your current operating system.

So for example, if you are a Windows user, you have 2 choices.

You can download the live operating system, burn it to a CD or DVD and then boot your computer from that DVD or CD.

This will make sure your computer run as if you have this operating system installed on your computer.

However, if you remove the CD or DVD and reboot, then your computer will boot as normal.

You can also use a USB drive to perform this same feature.

Secondly, you can run this live operating system in what’s called a Virtual Box.

The benefits of this are that you can run Windows simultaneously as you run this other operating system and you can easily switch back and forth between them without rebooting the computer.

Both methods have their pros and cons.

The pros of running a live CD boot, are that reduce the risk of having your computer compromised by viruses, malware and keyloggers that rely on Windows vulnerabilities to run.

If you are going to run this OS from a Virtual Box, I suggest downloading Virtual Box from Oracle. Note thehttps://

Next, the live operating system I would encourage you to use is Tails. Tails can be found at the following website.

The reason I choose Tails, is because it has many of the security features that you require to stay anonymous already installed.

Some users are not happy with Tails, but it really is a great operating system loaded with security features.

Many I will talk about in this series on security including PGP encryption and decryption.

Make sure you download the Tails ISO file from the official Tails website and you can either load it into Virtual Box or burn it to a DVD or load it onto a USB and booting your computer from that drive.

There are plenty of tutorials on how to load Tails into Virtual Box, so I won’t go into much detail other than, make sure you run Virtual Box and Tails from a USB drive or SD card.

I would suggest a USB drive however for reasons I will explain later.

But basically when when Virtual Box runs directly on your hard drive, it creates a virtual hard drive that is uses as a temporary hard drive while Tails is running.

Once Tails is closed, this virtual drive is deleted, but it’s not permanently deleted.

As we know from the power of recovery tools, deleted files are easily recoverable with the right tools.

I will talk about how to protect your files from data recovery tools in future posts but for now, just keep Virtual Box and Tails OFF of your hard drive, and load it either on a USB drive or SD card.

The same goes when booting your computer directly into Tails from a DVD or USB stick.

Your hard drive will be used to store files used by Tails, so make sure any files that are saved or accessed using Tails are done from a USB stick or SD card, otherwise they will be recoverable.

This is why I prefer using a Virtual Box and running both the Virtual Box and Tails inside of it, off of a USB stick.

Keep as much as possible off of your actual hard drive.

It is possible to shred files beyond recovery, but it’s much easier to do this on a 16gb flash drive, then it is a 1 TB hard drive.

Next post we will get back on topic and start learning how to use PGP.

The reason I have to take a detour to using Tails is because we will be using Tails for many of the features from here on out, including PGP.

Write for us


The articles and content found on Dark Web News are for general information purposes only and are not intended to solicit illegal activity or constitute legal advice. Using drugs is harmful to your health and can cause serious problems including death and imprisonment, and any treatment should not be undertaken without medical supervision.


  1. Anonymous

    What about using vmware workstation in place of virtual box?

    • Anonymous

      in theory – bad idea… only because vmware is not free open source software, which means in theory – they could have a back door built in granting access to any given 3 letter agency. best of my knowledge there’s never been any evidence showing a backdoor built into vmware – but the fact that it’s proprietary software makes it a risk not worth taking…

  2. Anonymous

    This series of articles has been really helpful, many thanks.

    I’m sorry, these are extremely basic beginners questions.

    You wrote “I prefer using a Virtual Box and running both the Virtual Box and Tails inside of it, off of a USB stick.” Else where I’ve read “Boot from the physical USB Drive”

    I’ve created a USB stick with VBox on it and an OS installed in the VBox, the VMDK file is on the host. Is the VMDK file in the right place?

    My next problem is I’m unclear about how to use the USB stick, what does “Boot from the physical USB Drive” mean?

    Do I boot the host computer in the normal manner, open the hosts virtualbox app, plug in the USB and open the virtual machine on the USB? Or am I supposed to use the USB to boot the host computer and use the virtual machine on the USB?

    Question three, I’ve installed part of the OS and it wants me to configure my account. Should I create a fictitious account or use my genuine information?

    Question four, how does a complete beginner with no contacts build a trust path to help with key authentication and verifiying the authenticity of downloads?

    Many thanks

  3. Anonymous

    “There are plenty of tutorials on how to load Tails into Virtual Box, so I won’t go into much detail other than, make sure you run Virtual Box and Tails from a USB drive or SD card.”

    actually – no… there are not. i have been trying to figure out how to configure the networking in virtualbox – when using both tails, and windows with a vpn and tor – for the better part of a year now and every one i’ve seen shows the guy setting up tails, or creating a VM wiht a windows host, and they skip right over the networking. so i’ll assume, they’re all just using the default “NAT” settings… but i’d really like to know if it is safer to use bridges? and if so, how do we do that? is it safer to pay cash and get a portable wireless internet card? if so, how do we set that up? etc etc…

    • Anonymous

      its not safer to use bridges cause it registers your laptop nic to the as a bypass for nic within VBox
      if you want networking within tails you have to build network access into Vbox via bridge or natting. then route your traffic in Tails to your vbox nic..

  4. Anonymous

    How about Whonix?


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.