This is an unofficial archive of PsychonautWiki as of 2025-08-08T03:33:20Z. Content on this page may be outdated, incomplete, or inaccurate. Please refer to the original page for the most up-to-date information.
UserWiki:Oskykins
Revision as of 09:11, 20 January 2015 by >Oskykins(→guide 2)
put decreased and increased bodily weight into novel states section instead of enhancement/suppression
4-aco-dmt For effects overhaul: make sure to change Visual effects - Psychedelics#Tracers|Tracers etc to Tracers
might have fucked up the text replace for muscle cramps, recheck at the end of the day
friday 29th 3:45 birth certificate uw madison check book ds11 form
low doses mxe(5mg or less) "infrequent (1–4 days/month, averaging 3.25 days/month) ketamine users and former ketamine users were not found to differ from controls in memory, attention and psychological well-being tests." "These results raise the possibility that chronic exposure to low, subanesthetic concentrations of ketamine, while not affecting cell survival, could still impair neuronal morphology and thus might lead to dysfunctions of neural networks"
Although it is strongly discouraged and will leave your identify and address unsecure, you may skip this step entirely.
PGP allows you to transmit your personal information and address securely using a system of symmetric-key encryption. While this isn't always necessary, many vendors require it in order to purchase a product. There is open source software available for Windows, Linux, and Mac. There is also a JavaScript web applet available here.
To create a public key for usage in two-factor authentication (which is necessary for Grams Helix tumbler service and some marketplaces to add an extra layer of security), you must generate a public key for yourself using PGP.
Below are instructions for securely creating an anonymous key:
JavaScript web applet (all operating systems)
The JavaScript web applet is the simplest, yet least secure method of using PGP to encrypt your address and personal details. If you would like the most security, it is highly recommended to download and utilize a PGP program using your computer instead.
Operating system: Windows
Operating system: Mac
Operating system: Linux
Arch Linux
1. Run your PGP program. In my case, I will be using Gnu Privacy Assistant (GPA) (version 0.9.6) in Arch Linux.
2. Go to "Keys" and select "New Key."
3. Enter an alias that you haven't used before.
5. Enter a fake email
6 Enter a secure password
6. It is recommended to create a back-up of the key-pair (optional).
7. Be patient while the key-pair is generated.
8. If you made a back-up, you should save it to a secure location such as an external drive kept in a safe place.
9. You should now have a PGP key. If you would like to copy it, you can right click on it and press "copy."
TAILS (The Amnesic Incognito Live System)
TAILS, a Linux-based system, is the safest and most secure method to use when purchasing from the darknet. A PGP application comes already installed on the system.
The following is a list of tutorials on how to use the PGP application on TAILS:
Although it is strongly discouraged and will leave your identify and address insecure, you may skip this step entirely.
PGP allows you to transmit your personal information and address securely using a system of symmetric-key encryption. While this isn't always necessary, many vendors require it in order to purchase a product.
There is open source software available for Windows, Linux, and Mac. There is also a JavaScript web applet available here.
To create a public key for usage in two-factor authentication (which is necessary for Grams Helix tumbler service and some marketplaces to add an extra layer of security), you must generate a public key for yourself using PGP.
Below are instructions for securely creating an anonymous key:
JavaScript web applet
The JavaScript web applet is the simplest, yet least secure method of using PGP to encrypt your address and personal details. If you would like the most security, it is highly recommended to download and utilize a PGP program using your computer instead.
Linux
Arch Linux
1. Run your PGP program. In my case, I will be using Gnu Privacy Assistant (GPA) (version 0.9.6) in Arch Linux.
2. Go to "Keys" and select "New Key."
3. Enter an alias that you haven't used before.
5. Enter a fake email
6 Enter a secure password
6. It is recommended to create a back-up of the key-pair (optional).
7. Be patient while the key-pair is generated.
8. If you made a back-up, you should save it to a secure location such as an external drive kept in a safe place.
9. You should now have a PGP key. If you would like to copy it, you can right click on it and press "copy."
TAILS (The Amnesic Incognito Live System)
TAILS, a Linux-based system, is the safest and most secure method to use when purchasing from the darknet. A PGP application comes already installed on the system. The following is a list of tutorials on how to use the PGP application on TAILS: