PGP Setup & Verification
The Kerberos darknet market relies entirely on PGP authentication. Follow this manual to generate, import and verify keys before trusting any mirror or message.
Generate Your PGP Key
In GnuPG terminal:
gpg --full-generate-key
Choose RSA 4096‑bit encryption and an expiration of 12–24 months. Store your private key offline or in a hardware token. Back up only encrypted formats.
Import Kerberos Public Key
Save the official key block and import into your PGP client:
gpg --import kerberos_public.asc
Fingerprint: 91A2 C8FE 4B1D F2B1 9A89 CE1E D432 F1AF 93D0 77DD
Verify Signature
gpg --verify mirror‑announcement.asc returns “Good signature from Kerberos Market”.
Encrypt Message
gpg --encrypt --armor -r kerberos@protonmail.com message.txt
Sign File
gpg --sign file.txt creates a trusted .asc signature for portability.
Safety Reminders
- Do not trust any PGP key unless its fingerprint matches the official Kerberos list.
- Never share your private or revocation key.
- Re‑check signatures after major system updates.