PGP Settings & Verification Guide
Complete PGP workflow for Kerberos darknet market users. Generate keys, import official fingerprints, verify signatures, and maintain key hygiene.
/generate_pgp_keypair
Generate 4096-bit RSA key with 2-year expiration for optimal security:
gpg --full-generate-key
# Select: (14) RSA (sign only), 4096-bit
# Enter 2y expiration date
# Generate strong passphrase (24+ chars)
Export public key for vendors: gpg --armor --export yourname@protonmail.com > public.asc
/kerberos_official_keys
Admin Key (Primary)
Security Officer
/import_verify_commands
# Import Kerberos keys
gpg --keyserver keys.openpgp.org --recv-keys 512EF114
gpg --fingerprint 512EF114
# Verify signed messages
gpg --verify announcement.asc announcement.txt
# Encrypt message to admin
gpg --encrypt --recipient 512EF114 message.txt
/key_maintenance
- Renew keys every 18-24 months
- Never share private keys or passphrases
- Revoke compromised keys immediately
- Backup encrypted on air-gapped USB