![bill torchat bill torchat](http://get.unshelved.com/strips/20120807.gif)
TorChat can be used for both instant messaging and file sharing, making it a go-to for dark net businesspeople. TorChat also encrypts messages (like the PGP emails before) making the text of the messages sent impossible to intercept. TorChat uses Tor networks, which is a decentralized network to make tracking traffic nearly impossible. The Tox hacker decided that TorChat was best, because it best ensured anonymity. Instead, he wanted to use another chat client. He prefers to audit all the communication software he uses, and he wasn't sure about Skype's security. The Tox hacker said he would be interested in talking, but did not want to use Skype. (Screenshot) What an encrypted message looks like when you put copy and paste it to GmailĪnd, what do you know, less than a day later I got a reply from the email I sent! Given that no one but you knows the private key, it is nearly impossible for anyone to intercept the message and decode it.
![bill torchat bill torchat](https://vignette.wikia.nocookie.net/lawandorder/images/1/1b/Billturbit.jpeg)
You must then put your private key into the PGP software to decrypt the message. So I send you a message that is encrypted using your public key. Then, using software, I write my message and the text is ciphered in a way that is unique only to your public key.īut the only way for this message to be deciphered is to use the second part of the puzzle - your private key. PGP works like this: If I want to send a message to you, I first need to know your public key (there are online repositories with public keys available). Everyone using PGP must have two keys - a public key and a private key. A PGP key is a way that internet users can encrypt their messages, making it nearly impossible for anyone but the sender and receiver to read the message. PGP stands for Pretty Good Privacy - no joke. Using these two pieces of information, I delved further, and ultimately found a way for us to talk in private. It boiled down to a possible email address that he used and a PGP key (see my explanation on what that is below).
BILL TORCHAT HOW TO
Using the information this Tox hacker had posted, I had very few details on how to contact him.