PGP Setup & Verification

The Kerberos darknet market relies entirely on PGP authentication. Follow this manual to generate, import and verify keys before trusting any mirror or message.

 Generate Your PGP Key

In GnuPG terminal:

gpg --full-generate-key

Choose RSA 4096‑bit encryption and an expiration of 12–24 months. Store your private key offline or in a hardware token. Back up only encrypted formats.

 Import Kerberos Public Key

Save the official key block and import into your PGP client:

gpg --import kerberos_public.asc

Fingerprint: 91A2 C8FE 4B1D F2B1 9A89  CE1E D432 F1AF 93D0 77DD

Verify Signature

gpg --verify mirror‑announcement.asc returns “Good signature from Kerberos Market”.

Encrypt Message

gpg --encrypt --armor -r kerberos@protonmail.com message.txt

Sign File

gpg --sign file.txt creates a trusted .asc signature for portability.

 Safety Reminders

  • Do not trust any PGP key unless its fingerprint matches the official Kerberos list.
  • Never share your private or revocation key.
  • Re‑check signatures after major system updates.