News, status updates, downtime reports, feedback and innovation

Tutorial: How to encrypt E-Mail with PGP

Posted: March 21st, 2014 | Author: | Filed under: General | Comments Off on Tutorial: How to encrypt E-Mail with PGP

It has been a while but we’re back with some tips for protecting your privacy online. In this post we will explain how to encrypt your e-mail, so all of you can exchange e-mails securely between one another.The more people encrypt their communications the harder it will become for bodies like the NSA to monitor everything we do.
How will this work? Very simple: lets assume that at this point in time the NSA collects a couple of thousand encrypted e-mail everyday, this is a minor nuisance to them as they have to decrypt these e-mails by brute-force, which costs them quite some computing power.
Now imagine that they intercept millions and millions of encrypted emails everyday, they would be overwhelmed by the sheer amount of computing power they’d need to crack all those encrypted mails. So lets make life harder for the internet spies and massively encrypt our emails! It is a short and simple process and comparable to adding an email address to your contacts.
So lets get right to it:

Encrypting E-Mail on Mac OSX

What will I need?

After you have downloaded everything you need, we can get started. Note: For this tutorial we assume you have already set up your Mail Client with the e-mail addresses you wish to use and encrypt.We will start by launching the GPG Tools application.
The first thing you want to do is press the ‘New’ button in the top left corner of the application (you can also press ‘cmd N’ or go to ‘Key > Generate…’), to generate a new key for your email address, this will open a little window asking you to fill in your Name (this is so other people can find your public key by your name, more on this later) and your E-Mail address.
After you have filled out the form make sure you check the ‘Upload public key after generation’ box and press ‘Generate Key’.
The application will start loading (depending on your computing power, this might take a while) and after some time ask you to fill in a passphrase, this passphrase is very important since you will be using it to encrypt/decrypt messages you send/receive, so make sure you keep it safe and don’t forget it (Important: don’t share this passphrase with anyone).
Repeat this process for every email address you want to use with PGP encryption.

Congratulations, you now have generated both a Public and Secret Key to encrypt your email with. You now might wonder why you need two keys and why one of them is public, don’t we want secrecy?
Yes, we want secrecy and with this method we will achieve it. This is how the public and secret key combo works:

Lets assume we are writing an encrypted email to adam@somemail.com and Adam has already generated both a public and secret key for his email. So, when we are sending him an email, we use his public key (which we got from the public keyserver, how to do this will follow) to encrypt the email. Adam check his email and sees that we have sent him an encrypted message, he now uses his secret key to decrypt (unlock) the email we have sent him and can read it. When Adam wishes to reply to the email he then encrypts the mail with our public key and we will be able to decrypt it with our secret key.
Pretty simple right?

The question most of you will have right now is: how do I get the public key of my contacts?
This is a very easy on-time process. In the GPG application, go to ‘Key > Search For Key…’ or press ‘cmd F’ now just type in the Name or E-Mail address of the person you are looking for. A window will open with a list of relevant search results, just check the ones you want to add and press the ‘Retrieve Key’ button. This proccess can be quite time consuming depending on the amount of contacts you want to send encrypted mail to.

Now that you have collected some public keys from your contacts you can start setting up your Mail Client to work with PGP.
This step is fairly simple.
Enigmail for Mozilla Thunderbird has a pretty straight-forward setup wizard which will only take one or two minutes to complete. In case Enigmail can’t find the location of your PGP, just tell it the path to the GPG Tools application.
GPGMail for Apple Mail is part of the GPG Tools suite we have downloaded earlier, therefore this add-on does not need any additional setup. You can start sending and receiving encrypted emails immediately.
That’s it! You are now able to protect your privacy by sending encrypted E-Mail. Now help the world protect itself from mass surveillance and teach your friends & family how to encrypt their E-Mail or just refer them to this tutorial.

 

 

Encrypting E-Mail on Windows
Note: We don’t have access to a Windows computer, therefore the instructions will not be as detailed as the ones for the Mac tutorial.

What will I need?

After you have downloaded everything you need, we can get started. Note: For this tutorial we assume you have already set up your Mail Client with the e-mail addresses you wish to use and encrypt.
We will start by launching the GPG4Win application.
The first thing you want to do is generate a new key for your email address, this will open a little window asking you to fill in your Name (this is so other people can find your public key by your name, more on this later) and your E-Mail address.
The application will start loading (depending on your computing power, this might take a while) and after some time ask you to fill in a passphrase, this passphrase is very important since you will be using it to encrypt/decrypt messages you send/receive, so make sure you keep it safe and don’t forget it (Important: don’t share this passphrase with anyone).
Repeat this process for every email address you want to use with PGP encryption and don’t forget to upload your generated key to the public keyserver.

Congratulations, you now have generated both a Public and Secret Key to encrypt your email with. You now might wonder why you need two keys and why one of them is public, don’t we want secrecy?
Yes, we want secrecy and with this method we will achieve it. This is how the public and secret key combo works:

Lets assume we are writing an encrypted email to adam@somemail.com and Adam has already generated both a public and secret key for his email. So, when we are sending him an email, we use his public key (which we got from the public keyserver, how to do this will follow) to encrypt the email. Adam check his email and sees that we have sent him an encrypted message, he now uses his secret key to decrypt (unlock) the email we have sent him and can read it. When Adam wishes to reply to the email he then encrypts the mail with our public key and we will be able to decrypt it with our secret key.
Pretty simple right?

The question most of you will have right now is: how do I get the public key of my contacts?
This is a very easy on-time process. In the GPG4Win application, use the search function and type in the Name or E-Mail address of the person you are looking for. A window will open with a list of relevant search results, just check the ones you want to add and press the ‘Retrieve Key’ button. This process can be quite time consuming depending on the amount of contacts you want to send encrypted mail to.

Now that you have collected some public keys from your contacts you can start setting up your Mail Client to work with PGP.
This step is fairly simple.
Enigmail for Mozilla Thunderbird has a pretty straight-forward setup wizard which will only take one or two minutes to complete. In case Enigmail can’t find the location of your PGP, just tell it the path to the GPG4Win application.
Outlook Privacy Plugin offers a simple set-up wizard which shouldn’t cause you any problems.
That’s it! You are now able to protect your privacy by sending encrypted E-Mail. Now help the world protect itself from mass surveillance and teach your friends & family how to encrypt their E-Mail or just refer them to this tutorial.

 

Notes:
– Are you stuck? Or are some things not clear to you? Feel free to ask us for an additional explanation!
– If you have more detailed knowledge on how to set up PGP for Windows, please let us know what is missing in our tutorial.
– Linux tutorial coming soon!

 


Introducing The Proxypedia

Posted: February 21st, 2014 | Author: | Filed under: General | Comments Off on Introducing The Proxypedia

It’s been a while but we have something new for you.A tool designed to help you find all the proxies you need for your favorite torrent sites.
We ourselves have always found it annoying that there is no proper list of available proxies for sites other than The Pirate Bay. Those sites are, of course, less popular than TPB but they deserve an index of proxies too.
That’s where our new website The Proxypedia comes in. A website that lists available proxy sites of many popular torrent sites.

Do you own or use a proxy which isn’t on the list? Simply add it by submitting it through the form on the right site of the page. With the help of you, the community, we can create the biggest index of proxies on the web and help countless people circumvent censorship.

So, next time you can’t find a proxy for your favorite torrent side head to http://www.proxypedia.nl

Happy Sharing!


A message to our UK users

Posted: December 22nd, 2013 | Author: | Filed under: General | Tags: , , , , | Comments Off on A message to our UK users

Concerning all UK based Pirates, as you might have noticed pirateshore.org and katshore.org have been blocked by some ISP’s.
In the past few days we have been working hard to find a solution for this.
Currently we are busy with setting up pirateshore.nl to enable you full access to The Pirate Shore again.
In the meantime you can access the Pirate Bay with out other proxy www.bayproxy.nl and the katshore should be still available via our IP-address (5.157.80.91).
Just type that number into your browser and hit enter.
We will keep you updated on our progress and we wish you all happy sharing and a Merry Xmas!

Update: pirateshore.nl is now online an accessible to Uk users and the rest of the world. Happy New Year!


The Proxy Shore – Settings Explained

Posted: November 13th, 2013 | Author: | Filed under: General | Comments Off on The Proxy Shore – Settings Explained

As promised here is a more detail description of the available settings from The Proxy Shore. This will soon also be available to see on the site itself.

 

– Include mini URL-form on every page

This option lets you decide whether or not you want to see a URL and option bar on top of the page your browsing to.
Enabling this option lets you change other settings and surf to other pages during your session.
Disabling this option will just show you the entire page you’re browsing as if you weren’t using a proxy.

– Remove client-side scripting (i.e JavaScript)
Enabling this option will make your browsing session much safer as malware is primarily spread through JavaScript across the web but it will also remove the functionality of some sites (some more than others). For example, the Facebook newsfeed is based on JavaScript, so when you enable this option Facebook will not work properly for you.
We recommend, during a browsing session to trusted websites, disable this option. When visiting websites whose sources you don’t know if you can trust, be safe and enable this option.
You can always en- or disable this option in the top bar.

– Allow cookies to be stored
Cookies are little files that help you load websites quicker, remember your logins and settings. But also are used by advertisers and websites like Google, Facebook and Twitter to track your actions across the web (which search results you click, to which websites you go, which sites you came from).
We recommend not to use cookies except if absolutely necessary for the functionality of a site.

– Show images on browsed pages
This is pretty straight-forward, this option lets you choose whether or not to load images on the sites you visits.
Not loading images has the benefit of sites loading faster so when you are on a slow connection and you’re heading to a mainly text-based website it is handy to disable this option.

– Show actual referring Website
This option simply means whether or not you want to tell other websites, which site you’ve just been on. And to be honest, why would you tell them?

– Use ROT13 encoding on the address
ROT13 is a simple encoding method often used to hide spoilers or sensitive material no everybody might want to read. The encoding method is pretty simply done by rotating letters of the alphabet.
The method might be fairly easily decoded it but does mean somebody has to take the time to decode the web addresses you are visiting. Or simply: nobody can tell by first glance of the url which site you are on.

– Use base64 encoding on the address
These encodings are commonly used to encode binary to text and transfer or store this data like with email or websites.
We recommend this option to be enabled for a more smooth experience of the web.

– Strip meta information tags from pages
This option pretty much explains itself. It gives you the choice of removing meta-data tags from pages you visit. Meta-data includes ip addresses, locations, date and time, browser version, operating system and more.
We recommend enabling this option for a more anonymous experience.

– Strip page title
This option lets you whether or not you want to remove the page titles of websites you visit. For example, if you visit youtube.com with this option enabled, the tab in your browser will display the current URL. With this option disabled it would say ‘YouTube’.
This setting has no anonymity or security features, it is just a matter of preference.

– Store cookies for this session only
With this option enabled, all the cookies you receive during your browsing session (given you have cookies enabled) will be deleted after you leave The Proxy Shore. When disabled, your cookies will be stored in your browser until you delete them manually or a scheduled delete takes place (depending on your browser settings).


Announcement: Pirate Shore Proxy is now The Proxy Shore

Posted: October 27th, 2013 | Author: | Filed under: General | 2 Comments »

In an effort to streamline our services’ names and adding the possibility for further innovations we have decided to rename the Pirate Shore Proxy to The Proxy Shore.
It will still have all the features you are used to and the only actual difference is the new name and the fact that now you can access it via: http://proxyshore.org or if you want an encrypted connection (which we recommend) https://proxyshore.org

When connecting through SSL you will get a security risk message, telling you our certificate isn’t trusted.
This is because we’re paying for these services out of our own pockets and therefore can’t afford an official certificate at this moment in time. We hope in the future to be able to change this.

Alternatively, http://pirateshore.org/proxy will now automatically redirect you to proxyshore.org

 

We wish you happy anonymous surfing and much fun enjoying an uncensored internet!

 

Note: You can also access The Proxy Shore through www.proxyshore.tk


Introducing Pirate Shore Proxy

Posted: September 25th, 2013 | Author: | Filed under: General | Tags: , , , | Comments Off on Introducing Pirate Shore Proxy

We’re happy to announce an exciting new feature to our site, from now own you can unblock any website you want to or just visit sites anonymously with the Pirate Shore Proxy.

How does it work?

Instead of visiting a website directly through your ISP (Internet Service Provider) and being subject to blockades and tracking, you will be telling our server to visit the website for you and display it on your screen. It will protect you from tracking as it is our server who visits the website not you and it will circumvent any blockades imposed by your ISP’s.

How will I get there?

There’s two ways to visit the Pirate Shore Proxy.

1. Directly
2. Through the Navigation Bar

– If you want to visit Pirate Shore Proxy directly, type http://www.pirateshore.org/proxy into your browser.

– We have updated the Pirate Shore homepage with a new navigation bar. It is fairly straight-forward but we’ll explain here in any case.
If you visit pirateshore.org you will notice two new buttons on the left side.
The top one, with the ‘P’ logo, will direct you to the Proxy.
The second button, with the bird logo, will bring you to our Twitter page where we will be taking feedback and suggestions as well as keeping you up to date with our site-status and new features.

Soon we’ll post a detailed explanation of the advanced options for the Proxy.