PGP Settings & Verification Guide

Complete PGP workflow for Kerberos darknet market users. Generate keys, import official fingerprints, verify signatures, and maintain key hygiene.

/generate_pgp_keypair

Generate 4096-bit RSA key with 2-year expiration for optimal security:

gpg --full-generate-key
# Select: (14) RSA (sign only), 4096-bit
# Enter 2y expiration date
# Generate strong passphrase (24+ chars)

Export public key for vendors: gpg --armor --export yourname@protonmail.com > public.asc

/kerberos_official_keys

Admin Key (Primary)

Security Officer

/import_verify_commands

# Import Kerberos keys
gpg --keyserver keys.openpgp.org --recv-keys 512EF114
gpg --fingerprint 512EF114

# Verify signed messages
gpg --verify announcement.asc announcement.txt

# Encrypt message to admin
gpg --encrypt --recipient 512EF114 message.txt

/key_maintenance

  • Renew keys every 18-24 months
  • Never share private keys or passphrases
  • Revoke compromised keys immediately
  • Backup encrypted on air-gapped USB