Tor Access Guide

The Kerberos Access Guide teaches operators how to safely initiate connections inside the Tor network and validate market identity. Follow these steps to maintain full integrity of your operations.

1 · Download and Verify Tor Browser

Only download Tor Browser from the official site:

After installation, run signature verification using GPG keys from Tor Project. Never trust unverified binaries.

2 · Configure Tor Launcher

Select “Connect” and allow Tor to build the circuit automatically. Advanced users can manually define entry nodes through torrc for region‑specific routing.

3 · Enter Kerberos Mirror

Visit the official onion URL listed on the Mirror Array. Input link directly into address bar; bookmark as HTML file instead of browser memory to avoid profiling.

4 · Validate PGP Fingerprint

gpg --import kerberos_public.asc
gpg --fingerprint kerberos@market

Confirm fingerprint output matches the official entry from links.html. Inconsistent PGP output means possible spoofing — terminate session immediately.

5 · Maintain Operational Security

  • Use virtualized environment (VMware / Qubes).
  • Disable JavaScript and WebGL.
  • Store wallets on detached USB with full‑disk encryption.
  • Use PGP for every message exchange.