Tor Access Guide

This section explains how to reach official Kerberos onion mirrors safely using Tor, verify links with PGP, and maintain strong operational security (2026 recommended methods).

 1 – Install Tor Browser

Download Tor Browser from the official website only, or via https://torproject.org. Avoid third‑party distributions. Verify the .asc signature provided in the same directory using PGP as described in the PGP Setup section.

 2 – Connect Through Tor Network

Launch Tor Browser and choose “Connect”. Once loaded, paste one of the verified Kerberos onion mirror addresses from the Official Mirrors page. Ensure the URL ends with “.onion”. If your connection fails or redirects to a different URL, stop immediately — do not re‑enter credentials.

 3 – Verify PGP Signature

Use your PGP client (GnuPG, Kleopatra, or mobile port) to import the Kerberos market public key and validate the mirror announcement. Each official address comes with a signed note containing the same fingerprint as listed on the Official Mirrors page. Only trust a link after successful PGP verification.

4 – Stay Anonymous

Use Tails OS or Whonix for isolation. Never mix clear‑net and darknet browsing. Disable JavaScript and store no cookies between sessions.

5 – Prepare Your Wallet

Fund only small amounts into a new sub‑wallet when using Kerberos market. XMR is recommended for its privacy layer.

6 – Bookmark Safely

Save the verified URL locally inside encrypted notes or password manager — never as a browser bookmark visible to third parties.

 Checklist

  • ✅ Official Tor Browser installed and verifiably signed.
  • ✅ Using verified Kerberos onion link only.
  • ✅ PGP fingerprint matches documentation.
  • ✅ Device isolated or running Tails/Whonix.
  • ✅ JavaScript disabled and no active extensions.