PGP ENCRYPTION SETUP

Complete Tutorial for Secure Marketplace Communication

Understanding PGP and Why It Matters

PGP (Pretty Good Privacy) is the encryption standard that protects your communications on darknet marketplaces. Without PGP, sensitive information like shipping addresses travels in plaintext where anyone could read it. With PGP, only the intended recipient can decrypt your messages. This protection is not optional for serious marketplace users.

The system works through public-key cryptography. You create two mathematically linked keys: a public key you share openly and a private key you guard carefully. Anyone can encrypt a message using your public key, but only your private key can decrypt it. This elegant design means secure communication happens without sharing secrets in advance.

For marketplace use, PGP serves multiple purposes. You encrypt shipping addresses so only vendors can read them. Vendors sign messages to prove authenticity and prevent impersonation. Marketplace administrators sign announcements so users can verify legitimacy. The entire trust model depends on proper PGP usage throughout the ecosystem.

Don't skip this guide or rush through it. PGP mistakes cause real harm: compromised addresses, failed communications, and security breaches. Spend time understanding these concepts before proceeding. The initial learning curve is worth the protection it provides.

Choosing Your PGP Software

Several excellent options exist for each operating system

Linux: GPG (Recommended)

GnuPG is the standard implementation, preinstalled on most distributions. Command line operation provides full control and minimal attack surface. This is the preferred choice for security-conscious users.

sudo apt install gnupg

Experienced Linux users can combine GPG with text editors for smooth workflow. The command line interface offers precise control over every operation.

Windows: Gpg4win

The official GnuPG distribution for Windows includes Kleopatra for graphical key management. Download only from gpg4win.org to avoid compromised copies from unofficial sources.

Components: GnuPG core, Kleopatra GUI, GpgOL for Outlook integration. Most marketplace users only need the first two components.

macOS: GPG Suite

Integrated tools for macOS with GPG Keychain application. Available from gpgtools.org. Provides native macOS experience with full GnuPG functionality.

Includes: Key management, Mail integration, command line tools. The suite integrates with native macOS applications smoothly.

Generating Your Key Pair

Command Line Method (Linux/macOS)

Open your terminal and run the key generation wizard. This interactive process guides you through creating a secure key pair:

gpg --full-generate-key

Key Type Selection

When prompted, choose option (1) RSA and RSA. This creates both signing and encryption subkeys using the RSA algorithm, which remains the most widely supported option.

Key Size Selection

Enter 4096 for maximum security. Smaller key sizes are faster but provide less protection against future computing advances. The marketplace recommends 4096-bit keys as the minimum standard for serious security.

Expiration Setting

For marketplace use, entering 0 for no expiration is common. If you prefer key rotation for improved security hygiene, setting 2y creates a key valid for two years. Confirm your choice when prompted.

Identity Information

Passphrase Creation

This protects your private key file. Choose a strong passphrase of at least 15 characters mixing uppercase, lowercase, numbers, and symbols. Write it down and store securely. If you forget this passphrase, your key becomes permanently unusable. No recovery mechanism exists.

Entropy Generation

Move your mouse randomly, type on the keyboard, or perform disk activity while the system generates random data for your key. Good randomness is essential for cryptographic security. The key appears when sufficient entropy has been collected. Note the fingerprint and key ID displayed for future reference.

Kleopatra Method (Windows)

  1. Launch Kleopatra application from your Start menu
  2. Click "New Key Pair" in the toolbar
  3. Select "Create a personal OpenPGP key pair"
  4. Enter your chosen pseudonym and optional email address
  5. Click "Advanced Settings" to configure key parameters:
    • Key Material: RSA with RSA subkey
    • Key Size: 4096 bits for both master and subkey
    • Validity: Forever or set specific expiration date
  6. Click OK to close settings, then Create
  7. Enter your passphrase twice to confirm
  8. Wait for key generation to complete

Exporting Your Public Key

Why Export?

Your public key must be uploaded to the marketplace so others can encrypt messages to you and verify your signatures. The export produces an ASCII text block you can copy and paste anywhere text is accepted.

Command Line Export

First list your keys to find the identifier:

gpg --list-keys

Export to a file for easy access:

gpg --armor --export YOUR_IDENTIFIER > public_key.asc

Or display directly in terminal for immediate copying:

gpg --armor --export YOUR_IDENTIFIER

Kleopatra Export

  1. Right-click your key in the key list
  2. Select "Export..." from the context menu
  3. Save with .asc extension (ASCII armored format)
  4. Open the saved file in any text editor
  5. Copy the entire contents including header and footer lines

Public Key Format

Your exported key looks like this block of text:

-----BEGIN PGP PUBLIC KEY BLOCK-----

mQINBGY1234EXAMPLE...
[many lines of encoded data]
...endXYZ123==
-----END PGP PUBLIC KEY BLOCK-----

Include everything from BEGIN to END when uploading to the marketplace. Missing either line causes validation failures.

Adding Your Key to Marketplace Account

Upload Process

  1. Log into your marketplace account via Tor Browser
  2. Navigate to Settings or Profile section
  3. Find the PGP Key or Public Key field
  4. Paste your entire public key including the BEGIN and END lines
  5. Click Save or Update to submit
  6. The marketplace validates your key format automatically
  7. Success message confirms the upload completed

What Not to Upload

Only upload your PUBLIC key. Never upload your private key anywhere. Your private key file stays on your computer, protected by your passphrase. Sharing the private key would let anyone impersonate you and decrypt all your messages.

After Upload

Once configured, vendors and other users can encrypt messages to you. The marketplace may also use your key for 2FA verification or dispute communications. Test that everything works by sending yourself an encrypted test message.

Encrypting Messages

The Encryption Process

To send an encrypted message, you need the recipient's public key. This is typically available on their marketplace profile page.

Step 1: Import Recipient's Key

Save their public key to a file and import it into your keyring:

gpg --import vendor_key.asc

Step 2: Write Your Message

Create a plain text file with your message content. For example, your shipping address for an order.

Step 3: Encrypt

gpg --encrypt --armor --recipient VENDOR_EMAIL message.txt

Step 4: Send

Open the resulting .asc file and copy the encrypted text to your marketplace message field.

Kleopatra Encryption

  1. Write your message in a text file
  2. Right-click the file and choose Sign and Encrypt
  3. Select the recipient's public key from your keyring
  4. Click Encrypt to process
  5. Copy the encrypted output to the marketplace

Decrypting Messages

When You Receive Encrypted Messages

Vendors and marketplace staff may send you encrypted communications. Decryption requires your private key and passphrase to unlock the content.

Command Line Decryption

Save the encrypted message to a file, then decrypt:

gpg --decrypt message.asc

Enter your passphrase when prompted. The decrypted content displays in your terminal for reading.

Kleopatra Decryption

  1. Copy the encrypted message from marketplace
  2. Save to a text file on your computer
  3. Right-click and select Decrypt and Verify
  4. Enter your passphrase when prompted
  5. Read the decrypted message that appears

Verifying Signatures

Why Verification Matters

Digital signatures prove a message came from the claimed sender and wasn't modified in transit. Marketplace administrators sign important announcements. Verifying these signatures protects you from phishing and impersonation attacks.

Verification Command

gpg --verify signed_message.asc

Understanding Results

Always verify administrative announcements before acting on them. Phishing sites distribute fake announcements with invalid signatures to mislead users.

Importing Keys from Others

Getting Vendor Public Keys

Before encrypting messages to vendors, you need their public key. Find it on their marketplace profile page where they display it publicly.

Import Process

  1. Copy the vendor's entire public key block
  2. Save to a text file like vendor.asc
  3. Run: gpg --import vendor.asc
  4. Verify import with: gpg --list-keys

Key Fingerprint Verification

For high-stakes communications, verify the key fingerprint matches what's shown on the vendor's profile. This prevents man-in-the-middle attacks where someone substitutes a fake key for the real one.

Backing Up Your Keys

Why Backup Matters

Losing your private key means losing access to all encrypted messages sent to you. It also means abandoning your established identity on the marketplace. Proper backups prevent catastrophic loss.

Creating a Secure Backup

  1. Export your private key: gpg --armor --export-secret-keys YOUR_ID > private_key_backup.asc
  2. Export your public key too: gpg --armor --export YOUR_ID > public_key_backup.asc
  3. Store on encrypted USB drive or offline storage
  4. Keep backup in physically secure location
  5. Consider multiple backup copies in different locations

Restoring from Backup

If you need to restore your keys on a new system:

gpg --import private_key_backup.asc

You will need your passphrase to use the restored private key.

Security Best Practices

Private Key Protection

  • Never upload your private key anywhere online
  • Store backups on encrypted offline storage only
  • Use a strong unique passphrase of 15+ characters
  • Consider air-gapped key generation for maximum security

Key Management

  • Use separate keys for separate identities
  • Generate keys offline when possible
  • Know how to revoke compromised keys
  • Consider periodic key rotation for security

Operational Habits

  • Always verify signatures on announcements
  • Import keys only from official profiles
  • Check fingerprints for important keys
  • Keep your PGP software updated

Common Mistakes to Avoid

Understanding Key Components

Your Key Pair Explained

A PGP key pair consists of mathematically linked public and private keys. Understanding their roles prevents common mistakes and misconfigurations.

Public Key

Private Key

Passphrase

Key Fingerprint

A fingerprint is a shortened hash of the key for verification purposes. When receiving someone's public key, verify the fingerprint through a separate channel if possible.

Advanced: Subkeys and Key Structure

Modern PGP keys typically contain subkeys for different operations. Your master key creates a signing subkey and an encryption subkey. This separation allows you to revoke or replace subkeys without changing your primary identity.

Key Expiration

Keys can optionally expire after a set period. Expiration doesn't invalidate past signatures or encrypted messages. It just requires renewal if you want to continue using the key. Some users prefer non-expiring keys for simplicity. Others rotate keys periodically for improved security hygiene.

Key Revocation

If your private key is compromised, generate a revocation certificate and publish it. This tells others not to trust new messages from that key. Generate revocation certificates when you create the key, before you need them. Store them securely but separately from your private key.

Troubleshooting

Key Not Recognized

Ensure you copied the entire key including BEGIN and END lines. Check for extra whitespace or line break issues introduced during copying.

Decryption Fails

Verify the message was encrypted to your public key. Check your passphrase is correct. Ensure you're using the right private key for this identity.

Signature Verification Fails

Import the sender's public key first. Ensure you have the correct key for that sender. Keys can be revoked or replaced.

Wrong Passphrase Error

Passphrases are case-sensitive. Check caps lock status. Try typing it in a text editor first to verify accuracy before pasting.

Key Generation Hangs

The system needs entropy (randomness). Move your mouse, type randomly, browse files. This generates the random data needed for secure key creation.

Ready for Next Steps?

With PGP configured, proceed to account registration and security setup

Registration Guide → 2FA Setup →

🕒 Last updated: December 2025

PGP on Nexus Market

PGP encryption is fundamental to Nexus security. Every Nexus user should understand PGP basics. The Nexus platform relies on cryptographic protection.

Your Nexus public key enables secure communication. Vendors encrypt Nexus messages to your key. Only you can read Nexus messages encrypted to you.

Nexus Market verifies links using PGP signatures. Always check Nexus mirror signatures before login. This protects your Nexus credentials from phishing.

Store your Nexus PGP private key securely. Never share your Nexus private key with anyone. The Nexus support team will never request it.

Practice PGP before making Nexus purchases. Encrypt and decrypt test messages first. Confident Nexus users make fewer mistakes. Master PGP to maximize Nexus security.

Nexus Market Community

The Nexus marketplace has grown into a trusted platform. Nexus users appreciate the reliable service. Thousands choose Nexus daily for secure transactions.

Nexus Market moderators work continuously. The Nexus team resolves disputes fairly. Both Nexus buyers and sellers receive equal consideration.

Join the Nexus community today. Experience why Nexus leads in security. Your Nexus journey starts with registration. Nexus Market welcomes new members.

Nexus development never stops. The Nexus platform improves constantly. User feedback shapes Nexus priorities. Help make Nexus even better.

Trust Nexus for your marketplace needs. Nexus security protects every user. The Nexus escrow safeguards all transactions. Choose Nexus with confidence.