Showing posts with label cryptography. Show all posts
Showing posts with label cryptography. Show all posts

Monday, February 15, 2016

Darknet dictionary

Here I will put a long post.. its a darknet dictionary, there may be some useful terms that you did not know the meaning, take a look.

 

420
From wikipedia: is a code-term used primarily in North America that refers to the consumption of cannabis and by extension, as a way to identify oneself with cannabis subculture or simply cannabis itself. Observances based on the number 420 include smoking cannabis around the time 4:20 p.m. (with some sources also indicating 4:20 a.m
Also known as the special sale when the vendor Tony76 executed the most famous Scam on Silk road.
Administrator
In charge of a collection of services a year or two ago, including TorStatusNet, Hidden Image Board, a hosting service.
Agora
An online market. It is operated as a Tor hidden service, such that online users are able to browse it anonymously and securely without potential traffic monitoring. The website launched in December 2013. It is part of the Deep Web. It has been recommended in some way by the same guys of BTCfog.
Altcoin
Any digital cryptocurrency other than Bitcoin, altcoin – any digital cryptocurrency other than Bitcoin.
Anonymity
This thing you want to have if you dont want to be found while using dark net markets.
AnonFiles

How to Use PGP

First I will give you a brief description on what PGP is:

Basically PGP stands for Pretty Good Privacy, it is a program that allows the user to encrypt and decrypt any type of data. The most common use  (at least on the dark net) is to encrypt the text messages you send, particularly between vendors and customers .

It is vital not to send your details unencrypted because odds are you are getting watched by someone you don’t want to know the contents of the message.

Now back to PGP:

Saturday, February 13, 2016

what is Computer encryption

Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. The earliest forms of encryption where the scytale’s and the creation of cipher texts. These forms of cryptography would rely on both parties knowing the key used or the correct cipher before the message could be delivered. Here's an example of a typical cipher, with a grid of letters and their corresponding numbers:

1 2 3 4 5
1 A B C D E
2 F G H I/J K
3 L M N O P
4 Q R S T U
5 V W X Y Z


If a general wanted to send the message “I love ponies” he would write the series of corresponding numbers: 42 13 43 15 51 53 43 33 42 51 34. Only the person with this cipher text would be able to reach the message. Now obviously, to make the message more difficult to decipher, the letters inside the table would be arranged differently. Computer encryption uses algorithms to alter plain text information into a form that is unreadable. Most people believe that AES will be a sufficient encryption standard for a long time coming: A 128‐bit key, for instance, can have more than 300,000,000,000,000,000,000,000,000,000,000,000 key combinations. Today’s AES standard is AES 256bit encryption which has 256 ^ 2 possible combinations.
As we said before, there are many reasons for encryption. One purpose of encryption is the act of transforming data from a state that is readable to a state that cannot be read by a third party that does not have permission. The result of the process is encrypted information (in cryptography, referred to as ciphertext).

The reverse process, i.e., to make the encrypted information readable again, is referred to

as decryption (i.e., to make it unencrypted). It is also important to know that the word  ncryption can implicitly refer to the decryption process. For example, if you get an encryption program, it encrypts information as well as decrypts it.

There are two types of encryption that should be used for two different purposes: symmetric (private key encryption) and asymmetric (public key encryption). Symmetric encryption is used the most because it is fast, easy to use, and is the most widely needed. You will use this form of encryption when there is only one password being used (such as TrueCrypt or another simple file encryption utility).

Asymmetric encryption on the other hand uses two keys, one to encrypt information and the other to decrypt the information.