Security & OpSec Manual
Operational security principles for Kerberos darknet market. Protect your identity, secure your XMR wallet, avoid common threats.
Core OpSec Principles (Essential)
Compartmentalization
Never reuse identities. Separate clearnet/darknet personas completely. Different usernames, wallets, emails for each market.
XMR Only
Use Monero exclusively. Bitcoin leaves permanent blockchain signatures. Convert BTC → XMR via non-KYC exchanges only.
PGP Everything
Encrypt all communications. Never send sensitive data in plaintext. Verify all PGP fingerprints before trust.
Threat Model (Active 2026)
┌─ Active Threats ──────────────────────────────┐ │ 1. Phishing mirrors (67% of incidents) │ │ 2. Malicious exit nodes (ISP level) │ │ 3. Wallet malware (clipboard hijacking) │ │ 4. Correlation attacks (timing/longtail) │ │ 5. Social engineering (support scams) │ └───────────────────────────────────────────────┘
Phishing Defense
- Copy onion URLs from Official Mirrors only
- Verify PGP fingerprint matches master key exactly
- Never click links from Telegram/Discord "support"
- Check URL length & formatting (kerberosmarketxyz.onion = 19 chars)
XMR Wallet Safety
Recommended Wallets
| Monero GUI | ✅ Official |
| Cake Wallet | ✅ Mobile |
| Feather Wallet | ✅ Desktop |
Clipboard Protection
$ monero-wallet-cli --restore-from-seed Wallet: securexmr42... [WARNING] Clipboard monitored for hijacking
4AdkXq8...z3nB7uP (Example receive address)
Environment Hardening
Recommended Setup
- Tails OS (USB boot, amnesic, Tor pre-configured)
- Whonix (VM isolation, gateway workstation split)
- Qubes OS (VM compartmentalization per market)
# Tails OpSec verification $ tails-check ✓ Tor connection: 3 hops ✓ ✓ Persistence: disabled ✓ ✓ MAC spoofing: enabled ✓
OpSec Checklist (Daily)
□ Verify onion PGP fingerprint □ Use Tails/Whonix isolated environment □ XMR wallet offline signing □ No clearnet correlation (separate VMs) □ Clear Tor circuit before transactions □ PGP encrypt all communications