Home » Articles » Personal Experience: Part 3 – PGP
Click Here To Hide Tor

Personal Experience: Part 3 – PGP

This a post in series of posts describing a personal experience from learning about the DNM’s to becoming a vendor – all the parts of this series will be available to here: ExperienceTag

Part 3:

Before today I had never sent an encrypted email. It was relatively easy to get started, especially with the built-in tools that TAILS comes with. There is also no shortage of easily-accessed tutorials. I won’t be guiding you through the process here, but instead recording my thoughts on the experience of using it for the first time.

The idea of public and private keys was slightly confusing to me at first. The TAILS documentation gave me some of the insight that I needed to understand. An entity — a website, an individual, a vendor on the Darknet, etc. — can post their public key for people to use to encrypt messages to them. That individual can then use their private key to decrypt the message that was encrypted with their public key. As I researched it became clear how the encryption works.

More than one source about using PGP emphasized that to be as secure as possible with your communication you want to encrypt should NOT be typed out in a browser. It should be written in a different application, encrypted and then pasted into the browser.

TAILS comes with OpenPGP for managing your public and private PGP keys. It also has a built-in applet used to encrypt text on the fly. It’s as simple as opening a word processor, typing your message, using the secure clipboard from the toolbar, and pasting into your browser/email client/instant messenger program.

I started up TAILS to send a trial email to myself. I wrote up a test message in gedit and used the applet to encrypt the text. I had two options at this point: open a browser and log on to my email to send the message, or use the included Claws email client to send the message. I decided to use the browser for now. Later on I will tackle setting up a persistent volume for Claws to save my email information and save my personal PGP keys, but for now I wanted simplicity. I logged in and pasted the encrypted text into an email to one of my other email addresses. When I copied the encrypted text to the clipboard the same applet that encrypted the text gave me the option to decrypt the message.

All in all PGP was an easy encryption method to get started with. The integration into TAILS is seamless and the experience needed is minimal.


  1. Using thunderbird with enigmail (extension) is darn easy too. Add torbirdy extension if you want to access your email via the onion network – torbirdy will take care of the requied configuration.

  2. Really getting desperate here. Easy? I just want to find out how to export my public key so that I have it in plain and simple text, like everyone does, but I can’t find out how. Created my own key alright and the only export function I can find gives me an .asc file with my PRIVATE key, which I don’t want to send anyone.

    Please, somebody help me out! I need a PROPER tutorial for seahorse, and not some guide explaining how to do stuff with the terminal or how to sync my keys with some keyserver… I certainly don’t want that!

Leave a Reply

Your email address will not be published. Required fields are marked *


Captcha: *