Privacy Policy (Effective January 2026)

This Privacy Policy defines how Kerberos Darknet Market Documentation Hub (“the Hub”) treats user information within the Tor network. All processes are audited for conformity with cryptographic best practices and aim to ensure maximal anonymity and data minimization.

1 · Data Collection and Scope

Kerberos Hub does not collect personal information, IP addresses, identifiers, or tracking cookies.  Interaction with this site occurs entirely inside the Tor network; communication metadata is ephemeral and destroyed on session close. The site implements no analytics scripts or third‑party beacons.

2 · Cookies and Local Storage

Cookies exist only for functional session management inside Tor Browser. They store no user data and are non‑persistent.  Local storage is not used, and JavaScript execution is minimal to respect user privacy. Disable JavaScript entirely for maximum safety.

3 · Anonymity and Encryption

Every request to the Hub is encapsulated within multi‑layer onion encryption provided by Tor.  Any PGP keys published here are hosted as static resources, signed by Kerberos administrators and verifiable offline.  The Hub uses HTTPS via Onion TLS—not to identify users but to prevent exit‑node tampering.

4 · Information Produced by Users

The site contains no interactive fields. All information you view is static documentation. When submitting messages through the Kerberos Market platform, privacy is governed by its separate PGP communication rules. Users should never input personal data on any Kerberos interface.

5 · Data Retention and Deletion

No persistent logs are stored. Server memory is volatile and wiped regularly. By design, the Hub cannot retrieve past session data.  Backups are limited to static HTML documents and PGP fingerprints, rotated using hash‑based timestamps for integrity audits.

6 · External Links

External hyperlinks provided in this documentation lead to open‑source projects such as Tor Project or PGP documentation.  These sites have their own policies; Kerberos has no control over out‑of‑network tracking mechanisms. Access from within Tor minimizes exposure.

7 · User Rights

Because no personal data is collected, there is nothing to erase or export.  Users retain autonomous control over their Tor identity and device.  Kerberos supports full self‑sovereignty in data management — your information remains yours alone.

8 · Security Auditing

The Kerberos team conducts quarterly internal audits of infrastructure hashes and PGP signatures.  Public transparency reports demonstrate that no user‑originating data is stored or cross‑referenced beyond runtime memory.  All scripts included on this site are openly verifiable within HTML source.

9 · Policy Amendments

This policy was last updated on January 5, 2026.  Future revisions will be digitally signed and communicated through our PGP public channel.  Continuing to use the documentation after updates constitutes acceptance of the new version.

10 · Contact and Verification

The only way to reach Kerberos Documentation Team is by sending PGP‑encrypted messages to the key listed on the Official Mirrors page.  No clearnet emails exist. For verification, compare fingerprints and signatures against our root key.