PGP Configuration Guide
This section explains how to set up, import, and validate Kerberos PGP keys. All market announcements and vendor messages are cryptographically signed using the Kerberos master key. By verifying PGP signatures, users ensure that they are interacting with authentic sources within the darknet infrastructure.
1 · Generate New PGP Keypair
gpg --full-generate-key
Choose RSA 4096 bits and set expiration (optional). Avoid using real names or identifiable emails. Once generated, export the public key:
gpg --armor --export your_key_id > public.asc
2 · Import Kerberos Public Key
gpg --import kerberos_public.asc
Compare its fingerprint to the PGP string on Official Mirrors page before trusting any message or address.
3 · Verify Signed Message
gpg --verify message.txt.asc message.txt
Result should read “Good signature from Kerberos Market (key ID B9F78D440C219C88)”. If you receive a mismatched key or expired sub‑key, it indicates tampering or phishing.
4 · Encrypt and Send Message to Kerberos
Use the following syntax to encrypt text before sending:
gpg --encrypt --armor -r kerberos@market yourmessage.txt
Never paste unencrypted content into web forms. Always encrypt text locally and check for ASCII armor format.
5 · Key Rotation and Backup
Kerberos rotates its sub‑keys monthly while keeping the root fingerprint identical. Users can refresh the keychain:
gpg --refresh-keys kerberos@market
Store private key files on encrypted drives, preferably detached media (USB or Tails persistent volume).
6 · Troubleshooting
- “No public key” → re‑import Kerberos key.
- “Bad signature” → verify mirror source and timestamp.
- Key expired → fetch fresh rotation from Official Mirrors.