Kerberos Market Access Protocol
// OPERATIONAL SECURITY GUIDELINES // ENCRYPTION // ACCESS
Environment Configuration
Secure access to the Kerberos Market requires a properly configured Tor Browser environment. Do not use standard browsers or proxy services.
- > Download the latest Tor Browser binary.
- > Set Security Level to "Safest" (disables JavaScript).
- > Ensure window size is default to prevent fingerprinting.
Onion Routing
Use only cryptographically signed V3 onion addresses. The following Kerberos link is the primary entry node.
Network Redundancy (Mirrors)
| qsdrhrnp33deaysjdcqbvozdy2yi7nghik3crdm2zuvp5pmn6besgrqd.onion | |
| wwm6ytoh7nfihqpqtdeggb3zn6fmrdx3yiugvj4wptvbo52ky6kqmgyd.onion | |
| zha5xellbix2cwshpxyvsyzkda7wvu65dh5bdj5xdigr7bbk7gccmaid.onion | |
| x63jjhr2t6evrpmaqfx2z6t3xr4m7ol4ut6dllhchc2u2blufm24pzyd.onion |
DDoS Mitigation & Captcha
Upon accessing the Kerberos URL, you will encounter the automated defense layer. This system filters bot traffic to ensure market stability.
NOTE: If the connection times out, generate a new Tor circuit (Ctrl+Shift+L) and retry using one of the mirrors listed in Step 02.
Identity & Credential Management
Registration on Kerberos requires no personal information. You will define a username, password, and a numeric PIN for withdrawals.
Mnemonic Recovery
A 12-word phrase will be generated. Write this down on paper immediately. It is cryptographically tied to your account and is the ONLY method for password reset.
Login Verification
During registration, set a unique "Login Phrase". This phrase will be displayed every time you log in, verifying you are on the authentic server.
Encryption Layer (2FA)
For maximum operational security, enable PGP Two-Factor Authentication immediately.
- Generate a 4096-bit RSA key pair using GPG/Kleopatra.
- Navigate to User Settings > PGP.
- Paste your Public Key block.
- Decrypt the challenge message to verify ownership.
- Enable "2FA on Login".
This renders stolen passwords useless without the private key.