System Knowledge Base
Operational security protocols, transaction mechanics, and platform specifications. Read carefully before initiating any transfers.
This website acts as the authenticated entrance node for the Kerberos ecosystem. The Tor network is volatile; hidden services move frequently to mitigate DDoS attacks.
We maintain the Darktrain Express directory here—a list of cryptographically signed mirrors that are rotated hourly. This ensures you always have a valid path to the market without falling victim to phishing sites on the clear web.
CRITICAL SECURITY STEP: Never trust a link blindly. When you arrive at the market login page:
- Locate the PGP signed message on the login page.
- Import our official Public Key (available on the About page) into your PGP client (Kleopatra, GPG Keychain).
- Verify the signature. It must return a "Good Signature" result.
- Ensure the domain in your address bar matches the domain mentioned inside the signed message.
- Immediate shredding of RAM and temporary logs.
- Rotation of onion services to cold standby nodes.
- Encryption lockdown of all wallet daemons.
Native privacy. Uses Ring Signatures, RingCT, and Stealth Addresses. Transactions are opaque on the blockchain. Highly recommended for all OpSec-conscious users.
Standard support. We utilize a proprietary coin-join mixer for deposits, but Bitcoin remains a transparent ledger. Use at your own risk or mix before depositing.
We operate a 2-of-3 Multisignature Escrow system. Keys are held by the Buyer, Vendor, and Market.
- Standard Escrow: Funds are locked until you mark the order as "Received".
- Auto-Finalize (AF): If you do not respond within 14 days (physical) or 48 hours (digital), funds release to the vendor automatically.
- Early Finalization (FE): Only available for vendors with "Verified" or "Elite" trust ratings. Requires buyer consent.
- × Hitman/Assassination Services
- × Weapons/Explosives/Poisons
- × Fentanyl/Carfentanyl
- × CSAM (Child Exploitation)
- × Doxing/Harassment Tools
- × Terrorism Funding
How it works: Upon login, the server presents an encrypted message block. You must decrypt this using your private key to reveal the one-time verification code. This makes your account unhackable even if your password is stolen.
Still have questions?
Our support staff operates 24/7. Please create an account to access the ticketing system.