Author

Topic: [Eng: Tutorial] PGP Signature - Encrypt/Decrypt message (Linux Only) (Read 596 times)

hero member
Activity: 714
Merit: 1298


Paste this command line in your terminal
Code:
gpg --full-generate-key
, and it will ask what kind of key you want to generate. RSA and RSA are the default, and I will generate the RSA and RSA one. To generate RSA and RSA keys, type 1 and enter.

RSA keys can be from 1024 bits to 4096 bits long. 3072 is the default one, but I am creating 4096 here. So write 4096 and hit enter. See the image below;



I would advocate expert mode
Code:
gpg --expert --full-generate-key


which brings up more wider list of options, particularly ECC algorithms,  including my favorable one i.e. based on ed 25519 curve, which I use for setting up my hardware PGP cards

Quote from: satscraper

Besides, I would install Kleopatra to manage certificates, Sign/Encrypt and Verify/Decrypt actions:

Code:
sudo apt-get update

sudo apt-get -y install kleopatra

Also, I prefer to keep my   private keys inside the chips of FIPS pgp cards rather in software key manager:

Code:
gpg --allow-secret-key-import --import 

gpg --expert --edit-key

gpg> toggle

gpg> keytocard

(answer Yes and then choose 1)

gpg> key 1

gpg>  keytocard

(answer Yes and then choose 2)

gpg> key 1

gpg> key 2

gpg> keytocard


(answer Yes and then choose 3)

gpg> quit

Choose No ( If you choose Yes, local security key will be deleted and thus, can't be imported into another card)


Insert hardware pgp card into relevant port, launch Kleopatra and import public key relevant to private key you have imported into pgp card.
hero member
Activity: 462
Merit: 767
Instant cryptocurrency exchange with own reserves!
Oh, when you said you never used this software, I thought we were talking about GnuPG. So, above, I tried to help show you the version of GnuPG that you are using to run the GNU Privacy Assistant application on Debian Linux.
I got it. No problem. It is also true that I didn't use GnuPG before the day I installed it. As I already said, I am new to Linux and have never used macOS. I have used Cleopatra in Windows for PGP and OpenKeychain for Android. I was already happy with Cleopatra, but as you can see now, I have tried these OS just because I wanted to write a tutorial and try Linux for security purposes.

I'm a macOS user. The command line in the macOS Terminal is almost the same as the command line in the Linux Terminal that you use.
Interesting. Recently, I was about to buy a used Macbook Pro but then came to know it's too outdated, and if I want to repair something, I have to spend a lot of money on it. So, I went for another Lenovo Laptop besides my desktop.
legendary
Activity: 2296
Merit: 2892
#SWGT CERTIK Audited
As far as I know, that's the case as long as you're using GnuPG 2.1+
That's awesome. I didn't know these things. I never used this software.

I even saw you using GnuPG version 2.2.40-1.1 in the PGP tutorial in this thread.
I see the source of the packages from here: https://packages.debian.org/sid/all/gnupg2/download.

I know what software I installed and what I have used. I didn't mean I never used the software. I wanted to say that I didn't use this software till I installed Debian 12 last month. I do not have experience using this software. These were my first tries, so I don't know the detailed information about it. I didn't explore the options. I don't use Linux for daily use. I mostly use it for wallet management and some other security stuff.

Oh, when you said you never used this software, I thought we were talking about GnuPG. So, above, I tried to help show you the version of GnuPG that you are using to run the GNU Privacy Assistant application on Debian Linux.

Here is the version of GnuPG I mean:

Quote

Quote

I tried to find the source of the package, and it came from here:
https://packages.debian.org/sid/all/gnupg2/download




I'm a macOS user. The command line in the macOS Terminal is almost the same as the command line in the Linux Terminal that you use.
hero member
Activity: 462
Merit: 767
Instant cryptocurrency exchange with own reserves!
As far as I know, that's the case as long as you're using GnuPG 2.1+
That's awesome. I didn't know these things. I never used this software.

I even saw you using GnuPG version 2.2.40-1.1 in the PGP tutorial in this thread.
I see the source of the packages from here: https://packages.debian.org/sid/all/gnupg2/download.

I know what software I installed and what I have used. I didn't mean I never used the software. I wanted to say that I didn't use this software till I installed Debian 12 last month. I do not have experience using this software. These were my first tries, so I don't know the detailed information about it. I didn't explore the options. I don't use Linux for daily use. I mostly use it for wallet management and some other security stuff.

Maybe you can see the explanation in the following reference: https://stackoverflow.com/a/589850
Thanks for the link.
legendary
Activity: 2296
Merit: 2892
#SWGT CERTIK Audited
As far as I know, that's the case as long as you're using GnuPG 2.1+
That's awesome. I didn't know these things. I never used this software.

I even saw you using GnuPG version 2.2.40-1.1 in the PGP tutorial in this thread.
I see the source of the packages from here: https://packages.debian.org/sid/all/gnupg2/download.

Maybe you can take a look back at the GnuPG installation process below:

-snip-
➥ Install Gnupg and gpa:

Let's get started!
Open your terminal and paste this command line
Code:
sudo apt-get install gnupg2 gpa

If you have given the root privilege already, it won't ask for the password. If you haven't, please write your system password, and it should install gnupg2 and gpa. Look at the screenshot below;

Quote
-snip-
Quote


Unfortunately, at this time, I don't have an Android smartphone or an Android Emulator to try the PGP application.
However, after I tried to look at the details of the Public Key that you generated using the OpenKeychain application, I confirmed that it was not a 4096-bit RSA but a 3072-bit RSA.
My bad. Yes, it is a 3072-bit RSA. I do not understand the difference between the 4096-bit RSA and 3072-bit RSA. -snip-

Maybe you can see the explanation in the following reference: https://stackoverflow.com/a/589850


By the way, a little information (for those who don't know):
Bitcoin's public-key cryptography uses secp256k1 with the ECDSA algorithm.

Reference:
- https://en.bitcoin.it/wiki/Secp256k1
- https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm

You can create an elliptic curve of type secp256k1 in the ECC key.

hero member
Activity: 462
Merit: 767
Instant cryptocurrency exchange with own reserves!
As far as I know, that's the case as long as you're using GnuPG 2.1+
That's awesome. I didn't know these things. I never used this software.

Unfortunately, at this time, I don't have an Android smartphone or an Android Emulator to try the PGP application.
However, after I tried to look at the details of the Public Key that you generated using the OpenKeychain application, I confirmed that it was not a 4096-bit RSA but a 3072-bit RSA.
My bad. Yes, it is a 3072-bit RSA. I do not understand the difference between the 4096-bit RSA and 3072-bit RSA. But when I try to import another key generated by OpenKeyChain, it shows the key is 3072-bit RSA. This app doesn't give me a choice to pick 3072-bit RSA or 4096-bit RSA. So, 3072-bit RSA is generated by default from Openkeychain.

By the way, it seems that you forgot to delete one empty character before writing -----BEGIN PGP PUBLIC KEY BLOCK----- in the public key code above.
Thanks for pointing this out. I fixed it.
legendary
Activity: 2296
Merit: 2892
#SWGT CERTIK Audited
Yes, you are right. The only difference in the message's contents is the fingerprint link listed according to the public key algorithm I used to encrypt the message.
Okay. Thanks for the confirmation. So, my decryption was successful. That means you can decrypt multiple algorithms even though your key is generated using RSA only.

As far as I know, that's the case as long as you're using GnuPG 2.1+


-snip-
Anyway, I have tried an Android app called OpenKeyChain, which you can see here: https://bitcointalksearch.org/topic/android-tutorial-pgp-signature-encryptdecrypt-message-5474187
Do you think it's real RSA 4096? I don't know if a specific device needs some power to use these algorithms. I know a little about mining algorithms that need more and more power to verify blocks. But I guess mobile CPUs are enough to generate a key using the RSA algorithm. What do you think about it? 
-snip-
To see your public key, tap on the clipboard Icon, which will copy your PGP Public key. In my case, this is my Mobile Public key, which I generated a minute ago:

Code:
 -----BEGIN PGP PUBLIC KEY BLOCK-----
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=rso3
-----END PGP PUBLIC KEY BLOCK-----

Unfortunately, at this time, I don't have an Android smartphone or an Android Emulator to try the PGP application.
However, after I tried to look at the details of the Public Key that you generated using the OpenKeychain application, I confirmed that it was not a 4096-bit RSA but a 3072-bit RSA.

By the way, it seems that you forgot to delete one empty character before writing -----BEGIN PGP PUBLIC KEY BLOCK----- in the public key code above.
hero member
Activity: 462
Merit: 767
Instant cryptocurrency exchange with own reserves!
Yes, you are right. The only difference in the message's contents is the fingerprint link listed according to the public key algorithm I used to encrypt the message.
Okay. Thanks for the confirmation. So, my decryption was successful. That means you can decrypt multiple algorithms even though your key is generated using RSA only.

Only GnuPG 2.1+ and a few other PGP clients support ECC. You only need to change the command line to generate the key in the terminal.
If you carefully consider the sequence number in the section:  'Please select what kind of key you want,' then you will see that after no. 4, go straight to no. 14. What kind of keys are in between that?
Here's what I got:


Oh dear. Thanks for that. I forgot about that. I did not pay attention to these options since everyone uses the RSA algorithm. I also used the same. Sometimes, exploring between the options helps me learn new things.

Anyway, I have tried an Android app called OpenKeyChain, which you can see here: https://bitcointalksearch.org/topic/android-tutorial-pgp-signature-encryptdecrypt-message-5474187
Do you think it's real RSA 4096? I don't know if a specific device needs some power to use these algorithms. I know a little about mining algorithms that need more and more power to verify blocks. But I guess mobile CPUs are enough to generate a key using the RSA algorithm. What do you think about it? 

legendary
Activity: 2296
Merit: 2892
#SWGT CERTIK Audited
I'm just curious whether you can decrypt both or just one algorithm.

It seems I was able to decrypt both algorithms. But I am confused because it seems you have written the same message in both messages and the only difference is the Fingerprint. Can you please make sure I am correct or not?



Yes, you are right. The only difference in the message's contents is the fingerprint link listed according to the public key algorithm I used to encrypt the message.


It seems Interesting BTW. I guess my PGP keys used the RSA algorithm. But, I am curious to know how you created EdDSA/Ed25519 algorithm keys and messages. Did you use different PGP software? Which one is most secure?

Only GnuPG 2.1+ and a few other PGP clients support ECC. You only need to change the command line to generate the key in the terminal.

-snip-
➥ Generate Key:
Paste this command line in your terminal
Code:
gpg --full-generate-key
, and it will ask what kind of key you want to generate. RSA and RSA are the default, and I will generate the RSA and RSA one. To generate RSA and RSA keys, type 1 and enter.

RSA keys can be from 1024 bits to 4096 bits long. 3072 is the default one, but I am creating 4096 here. So write 4096 and hit enter. See the image below;

Quote

If you carefully consider the sequence number in the section:  'Please select what kind of key you want,' then you will see that after no. 4, go straight to no. 14. What kind of keys are in between that?
Here's what I got:





-snip- Which one is most secure?

Quote
I think your 4096-bit RSA keys will be good enough for your usage, to start with.
hero member
Activity: 462
Merit: 767
Instant cryptocurrency exchange with own reserves!
...snip...
Hey LB, I just had a quick question. What Linux distro are you using, with exact version and is it via duel boot or VMware virtual box method?

Hello bro. I am using Debian 12 with the Gnome 43 desktop environment. However, I have customized the interface a lot and now it looks like a Mac. LOL. Yes, I am using Linux with dual boot. Running on a virtual box is not recommended. You can still try if you want.

The customization is done by my best friend. I do not have any freaking idea how the hell he did them. I barely know these commands and the installation process. So, I won't be able to guide you.
sr. member
Activity: 322
Merit: 318
The Alliance Of Bitcointalk Translators - ENG>BAN
...snip...
Hey LB, I just had a quick question. What Linux distro are you using, with exact version and is it via duel boot or VMware virtual box method?
hero member
Activity: 462
Merit: 767
Instant cryptocurrency exchange with own reserves!
I'm just curious whether you can decrypt both or just one algorithm.

It seems I was able to decrypt both algorithms. But I am confused because it seems you have written the same message in both messages and the only difference is the Fingerprint. Can you please make sure I am correct or not?



It seems Interesting BTW. I guess my PGP keys used the RSA algorithm. But, I am curious to know how you created EdDSA/Ed25519 algorithm keys and messages. Did you use different PGP software? Which one is most secure?
legendary
Activity: 2296
Merit: 2892
#SWGT CERTIK Audited
-snip- In my case, this is my public key
Code:
-----BEGIN PGP PUBLIC KEY BLOCK-----
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=t6jo
-----END PGP PUBLIC KEY BLOCK-----

Below, I try to create a message that is encrypted using my two types of PGP Public keys (https://bitcointalksearch.org/topic/m.33414470)
- RSA algorithms (https://keys.openpgp.org/vks/v1/by-fingerprint/58BC997445D96F68DB65C169A2CA884F183D22E9)
- EdDSA/Ed25519 algorithms (https://keys.openpgp.org/vks/v1/by-fingerprint/C9B290C8C87C9BB5F440E82AD21FD04306AED362)

I'm just curious whether you can decrypt both or just one algorithm.

PGP Encrypted message - RSA:

Code:
-----BEGIN PGP MESSAGE-----

hQIMAxIivShhBiNAARAA7aUzrIhhnK1PzgPgcQolrdLHwyiPFKZVnE8MYktpcEXz
qzdw0Rg4BqqruplJiDvjg1UVohV0inj2ZWP3+QydLbs6/xQ9WkazVAOpbkBkqdR+
XY6MdUq+V5fbe2FnJwzquBPf8K1Y2Nz8CPIU5nNvHrmyLGNLgv/3wAnpZN1knlor
xRK+BOVa+snZDxMD9wi7L5Ln4QV3wsjSQF6t2GJbOiZ++v2qZY5PmRnF+q+nQIj9
PtQ3eeHFZ5pors1B1W+cnAIM+dnG1U1uqjk7RtG4BaxIQlNlqK9RFNGGMxUkgLx8
BD3TTTNHE8w0F5QKo40O3P9MTegPfm9YHzOBKyIUu05DuDiCJRTOg7/1RltnSV+Q
MGEfakCMhda5pFQ75np20jd291lEjzCJ3AcGjesjx/nbjH46Hwvwj8JKsL0Jrj2k
fMVNGYQ5aESFdvVLAnSRQuWElrrgjwOfpNiBTZA1OCCsTVSPM2vfOiEntVmPTgax
EUWknBMESyPz7HRKHKH8f4HJ94aCCJfTVz8lSZ1qZ4HaClXyaR24o6yaj34p49Dx
RP8PwICG8NDfmQMKFLU8XQ6PndzpXInVhmt2q/FonLaa2vgJiSzV4I6Hvih9bGdc
u8fkiN1bwNProe6WKVWjSkzkBaARUxN3qkeqts46vkh8tDMji+DhlrDJmKBCJsGF
AgwDG9v1xEHl6iEBD/4k8hoDXNNtxGoKpsqUsV0UTrAtzuKUtWH/ZaWPzvaj1m9h
608fubfLKe97W+vZtotYP8unzQZ9VbW828f9llEX4EddQPcr484MHnU0KD/AZsed
eG2XkwKQC1tIrWa8hhOafiGmqyQHEtu+4fKgCzRFjsd2yRvF3ZZh6/qtp5mkmgbx
YRKeqioQoQWfCAAhnUHdd7rcqbHJNa0T30CgbVEsE7vTDUgVpSgVA/kb9X5YXNHS
sad5ee8xQOVpGCnokwm4TjRPGuOnESZdkxxm2AijahHFj8otaqM3erAkrKm6EOIa
Wt8w+XHycRI8PCcrQ+Xyu/HO3AKlnsmsg0woQNgey9Qh68iLNGQ5aGmA/6sJTRYh
zCGgcwMNgxLgdgQ1CP/yLUfsA8XuUbZCggMXkEZTLUMum1wTCJ8LSh/JjpJTTTgn
QKuW1oRBdYE+uvFBajHG6Vt4pCF4A677P3liT12M6a0stvSVGZkrMXYDW2Su7hwj
SqKpDOde0wVVR/uthlX/hy19IJdd1eUD6CmNbELowqURC0zJArycd3pP4qjGxeQG
O1LHUI+dZt+2LE1esPB8Q1x1pQbZNN6LJZXhR07ic3uyCnNY9xyP3ANRvJf0lBG1
IOkqbz1qRPhYeil5lwChSLfWxwVJEeafUzRNaWLRvzpAsUGv6y8eLu80sG42YNLp
AX2l+NqkvIJsEYUAF3e77LSYjYfOMosqi9vYinQxXRYU0Wmd3lgOCFL6nooCjVSv
ucIaU334+MSrHkVgpLLsg3PnldissuVs/QGsPXrkjv8zZW/BkxjIjccfvKNHVdvs
5Cgw/Rj/DpfoIBoEV1ugFuQq13E4HqSIU2sBarynQW6g/5HXC2twg/dIoJBFYwM1
1/whRzp41Ckk8XyUofaIQpS3sPhjUtkzlD99dcEPQ+0EKuBX0MXhQ4WkBkEIvkZM
WkFyDrrMXJeFX4wjOsLDLb083EVC6TG52CnYUA9xJd7KI/Zc9ZGrFEa90KCqOso6
jSNB+uKQ0QBXDaLrKteuhzHC0gOSSfN5/GMJVoHNO9y1PHDpTEDO2ZHLDghNXbOP
YNSsF5erLkI5vIqU+r6r/HRCg8Zpd56DkNhE3QorwcKQrjbSX2IYH58Ak66MP6ic
OBSNXqTS9qJstf4IPMbSlodGd3D7uywoLEYm7gMH3Gx5cNkrH0xD6tYmFedophu1
zFpEoEQGlSRtxvjp8vEm9EoUQEhrFXG1sIAWRhyUfCqOQub2nBvms8A7jAv92DVW
p/FTcPk6stysgdKPkML3X23Q1nJNipbCXM3m0Galrvd2SE+qDgzgxwl8RUQAZSxZ
2djuOhkNu0xK+pqtrzp3adiUuNIH44mr9l8OUkVNhmDAJIxXtpS8BguFFJEYQSn5
hNnTd6qeViqST9ydW6cxL0HQ9/+F4lJQBgWdYS2dnAzaafMqdiemryD7N/7teiUn
KmChVgrjaaUrPCbofjep6R6BdFQj6fT7im6cJDpo21ezx4OzLgBGmb3Lxwq6w6f7
c4Yfj4Z7mU8mVef4gLmqWpCDPH56lPo69GbRoloqu0UMlCb//DCU2AcyY8sWOqkI
o9Shbzjc8VCjit+ZrD3k+X2dnXadiqWuTQC+YHWQq6e/lVAnOz7E2WXkmkAZYqSz
RPJhdyCdvZPdNaciNpG0y7aRo8Akhw==
=OjlM
-----END PGP MESSAGE-----


PGP Encrypted message - EdDSA/Ed25519:

Code:
-----BEGIN PGP MESSAGE-----

hQIMAxvb9cRB5eohAQ//Sm2Aqft41NHlCUevbJWWwemNGFa63KU5MEUdZYMLwDUH
iWkfFrGlWPrUUX3sNSMdbB9d4hT1LdiZ4EMtrqFOuUFR5h5Wc6e10WQRvTnoHUxI
2Ioq7epLrvEaBnP9mY7iE56zUUU+by4IEVRHMQM0C05mq/I+hL0CD8SUQVj6/WIw
PDUZp5mymtw3xY7Revx3Rc8wbHUjGmMpBVhRG/dqkAvjyyt61p61SqvLNVMAKgaY
MKF5JHVRrv+Rnu1/ZO4ZMuEhqFZtoue/2MWwCXO4uxA/IVXvS2eLSmbj0Uvke6uD
m9VBSPQFdP53mxb3G13aM1ii07hHHkDWbPisDFkB9isD7snRsoWElb3Ngb5vQn9h
P5JS9jqMZyXnz1YlcrvlTbNaxSQbjl+4Jia78c7TuJGXbxiVwvpr1cdwH3K75Di8
x7Z7RDEYHNH7AnarQBJbbeHvQYk2Kfm6wQHOze6TkPrDvVG3/E5YAMWXj1CVQp/d
EF4AbofmGvstryDM2Qji/eLI/wUTE4mKnfQbuZKiwid1103eQ95fgPqw4UAtvpx9
HgeH18BwrQThVxUVQPyl9d2zndFkfGaCZMSEU1dNNk75e196YWjdnq4Iqxq4r0aO
cLJNJBOdRvpBzoSQzM0SdGIBj933fdTKWtZm2CGY7XniDKsTrgNjhx0tn4a+kcKE
XgNyRJkDiikO2BIBB0BVj59pTpsC3kLMHyx9Z671MPdlLyzLQf9bKuX9bXMlSDBR
7gD3bPNgJPToj4xF7h985ud7kLd9zRgFWhuzQE7FStNN41L4t7M2QLjS0X+CJ8TS
wFkBZMLQCfp8Gl5skXtu4/5WTwFBEe995eH99r4L48RZKStV4bgHpyzydbxdwYUS
+vzdM5N9DunLgJAJ6IBaA0KRBQSYrbXam8612otmPZwizUz9DClDQntGatXDiAv8
kGpz5k6jTkKk9AlM/1hcraST6K2ULyOtCAQkpcCCxabXDuipJHoPN40GyvtwnjAC
pHpiWhtxa/pdJVA90mzfQZP9FVnW4OFZ5BB0YC77U5vlY6lZyE+hBtdrOUclAP6w
Ut7JbMFss8i5Sr+h671zB14Zx3rhPLSb/H6p6M3u9XSmemPoRCXsUSgxeejNTPJT
RwVuD/1lG4ZokW6VM83Sip1/IAzwsXr+b9zA2E0z7248pdOkJp8cRSqJog==
=7057
-----END PGP MESSAGE-----
hero member
Activity: 862
Merit: 662
BUMP

I am not sure if this kind of messages need to be bumped, tbh no much people understands this well.
hero member
Activity: 462
Merit: 767
Instant cryptocurrency exchange with own reserves!
Here is my message for you:

Thanks for reading this and for the message you left.
Thanks for the nice message and the recommendation of that service. I haven't used it before. But since you suggested, I will try them for sure!
Here is my message for you too;

Code:
-----BEGIN PGP MESSAGE-----
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=dK9j
-----END PGP MESSAGE-----

BTW, Congratulations on nice looking merit numbers! I am glad that I was the one who was able to round the number.
hero member
Activity: 862
Merit: 662
Here is my message for you:

Code:
-----BEGIN PGP MESSAGE-----
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=54SA
-----END PGP MESSAGE-----

my stacked publickey:

Re: The BCT PGP/GPG Public Key Database: Stake Your PGP Key Here
hero member
Activity: 462
Merit: 767
Instant cryptocurrency exchange with own reserves!
Hi BitcoinTalk!

I have re-posted mdayonliner [Eng: Tutorial] PGP Signature - Encrypt/Decrypt message - Fingerprint because the images of main thread was broken and the author is not active anymore. As Husna QA suggested, I decided to write a tutorial for Linux users.



➥ Generate Key:
Paste this command line in your terminal
Code:
gpg --full-generate-key
, and it will ask what kind of key you want to generate. RSA and RSA are the default, and I will generate the RSA and RSA one. To generate RSA and RSA keys, type 1 and enter.

RSA keys can be from 1024 bits to 4096 bits long. 3072 is the default one, but I am creating 4096 here. So write 4096 and hit enter. See the image below;

Code:
-----BEGIN PGP PUBLIC KEY BLOCK-----
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=wFDZ
-----END PGP PUBLIC KEY BLOCK-----

I have saved his Public key block in a .txt file and imported it. See the image below;

Quote

Now click on the Windows tab and click on Clipboard.

Quote

Write your message, click on the file, and choose encrypt (See the image below):

Quote

Now click on Bitcoingirl's public key and click on the sign, too. It will ask for your passphrase; enter your passphrase and boom! Your encrypted message will appear in your Clipboard.

Quote



Code:
-----BEGIN PGP MESSAGE-----
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=WwRm
-----END PGP MESSAGE-----

There we go. We are done already. Let me know if I made any mistake here because I have been using Linux for a month only.
If you face any problem, post here, and I will try to help fix it. Even If I couldn't do it, there are a lot of community members who can step up.
Jump to:
© 2020, Bitcointalksearch.org