Kerberos FAQ — 2026 Update
1. Where are the official Kerberos links?
The verified addresses are listed on the Official Mirrors page and PGP‑signed by the Kerberos Team. Never trust unverified aggregators.
2. How do I verify a mirror?
Check the PGP fingerprint published with the onion URL. Run gpg --verify mirror.sig.asc mirror.txt and compare hashes.
3. Do I need PGP to use Kerberos?
Yes. PGP ensures authentic messages and mirror lists. Follow the PGP Setup guide for configuration.
4. Is Tor Browser mandatory?
Absolutely. Kerberos resources exist only onion‑side; attempts via Clearnet are unsafe and unsupported.
5. How to stay safe on Tor?
Use Tails, disable JavaScript, avoid external links. Refer to the Security Guide.
6. Which cryptocurrency is supported?
Monero (XMR) only — it protects transaction privacy through ring signatures and stealth addresses.
7. How to detect phishing sites?
Compare fingerprints and SSL cert timestamps. Kerberos never uses Clearnet mirrors or URL shorteners.
8. What if a key doesn't match?
Discard immediately and report the incident to support using encrypted email. Only accept signatures from latest key chain.
9. How to contact Kerberos support?
Via encrypted email address found in PGP Settings. Messages without PGP encryption are ignored for security.
10. Does Kerberos log visitors?
No. The hub is 100 % static and has no server‑side tracking or cookies. Privacy is by design.
11. How often are updates released?
Documentation and mirror lists refresh weekly. PGP subkeys rotate every 60 days for security.
12. Can I use Kerberos on mobile?
Yes, using Tor Browser for Android or Orbot + Onion Browser (iOS). Ensure you verify fingerprints before entry.
13. Where can I learn more?
Explore the Kerberos Wiki for technical details on architecture, cryptography and network operations.