PGP Configuration Guide

Generate your personal PGP keypair, import Kerberos master keys, verify signatures. Essential for secure darknet communication.

Quick Commands

1. Generate Your PGP Keypair (Primary)

$ gpg --full-generate-key
Please select key type: RSA and RSA (default) [1]
What keysize: 4096
Real name: Your Darknet Alias
Email: [none] (recommended)
Passphrase: [ultra-secure, 20+ chars]

2. Export Your Public Key

Export ASCII Armored

$ gpg --armor --export "Your Darknet Alias" > mykey.asc
$ gpg --armor --export-secret-keys "Your Darknet Alias" > mykey-private.asc

Share Fingerprint Only

0xA1B2C3D4E5F67890123456789ABCDEF012345678

3. Essential PGP Commands (Memorize)

ActionCommandCopy
Import Kerberos Keygpg --import kerberos-master.asc
Verify Signaturegpg --verify message.txt.asc
Encrypt Messagegpg --encrypt --recipient 0xD3F6A120... message.txt
Sign & Encryptgpg --sign --encrypt --recipient 0xD3F6A120...

4. Platform Setup

🐧 Linux (GnuPG)

sudo apt install gnupg
Native CLI integration with all terminals.

🍎 macOS (GPG Suite)

gpgtools.org
GUI + CLI. Integrates with Mail/Thunderbird.

🏁 Windows (Gpg4win)

gpg4win.org
Kleopatra GUI + command line tools.

Verification Workflow (Kerberos Specific)

1. Copy master fingerprint from links.html
2. Import: gpg --import kerberos-master.asc
3. Verify onion site signature file
4. gpg --verify kerberos-site.asc kerberos-site.txt
5. Check: "Good signature from Kerberos Market Master Key" ✅

user@kerberos:~$ gpg --list-keys --fingerprint 0xD3F6A120B9EF77C6
pub   rsa4096 2024-01-01 [SC]
      D3F6 A120 B9EF 77C6 4D2E  F138 D2EE 473C 91F1 5C77
uid           Kerberos Market Master Key (2026)
_

Common Mistakes

  • Weak passphrases (<20 chars, dictionary words)
  • Key reuse (one key per market minimum)
  • Email in key (never use real/work email)
  • Private key sharing (only public key ever shared)