Security & OpSec Guide
Mandatory protocols for safe navigation of WeTheNorth Darknet. Mistakes in operational security lead directly to loss of funds or identity exposure.
Identity Isolation
Maintaining a strict firewall between your real-life identity and your Tor identity is the foundation of operational security. Any cross-contamination compromises the integrity of your entire persona.
-
×
Never mix identities. Your digital footprint on the clearweb must never intersect with your hidden service activities.
-
×
No username/password reuse. Do not use credentials that have ever been used on clearnet sites, forums, or previous markets.
-
×
Zero personal contact info. Never provide real names, standard email addresses, or social media handles to any entity within the market ecosystem.
Connection Defense & Verification
The Tor network is susceptible to Man-in-the-Middle (MitM) attacks. Malicious actors frequently deploy proxy servers that imitate the real market interface to intercept credentials and cryptocurrency deposits.
Verifying the PGP signature of the onion link is the ONLY absolute method of confirming you are connected to the authentic infrastructure.
Defense Protocols:
- Always verify the market's PGP signed message containing the current mirrors.
- Do not blindly trust links found on random wikis, unverified forums, or Reddit threads.
- Setup 2FA (Two-Factor Authentication) using PGP immediately upon registration.
Tor Browser Hardening
The standard Tor Browser requires manual adjustments to maximize operational security and prevent de-anonymization vulnerabilities.
Security Level
Set your Tor Browser security slider to "Safer" or "Safest". This inherently disables dangerous web features that can be exploited.
Disable JavaScript
Utilize the built-in NoScript extension to explicitly disable JavaScript wherever possible. JS is the primary vector for browser exploits.
Window Fingerprinting
Never resize the Tor Browser window. Maximizing or altering the dimensions of the browser window transmits your exact screen resolution, providing a unique data point used for browser fingerprinting.
Financial Hygiene
Cryptocurrency ledgers are public. Poor financial hygiene creates an immutable, permanent link between your real-life identity and market operations.
PGP Encryption (The Golden Rule)
"If you don't encrypt, you don't care."
PGP (Pretty Good Privacy) is non-negotiable. It is the only mathematical guarantee that your communications remain secure, even if law enforcement seizes the market's servers.
-
AClient-Side Encryption Only All sensitive data (shipping addresses, specific communications) MUST be encrypted locally on your own machine using software like Kleopatra or Gpg4win before it is pasted into the browser.
-
BNever Trust "Auto-Encrypt" Never use a built-in "Auto-Encrypt" checkbox provided by a marketplace. Server-side encryption requires you to trust the server with plaintext data. If the server is compromised or malicious, your unencrypted data is captured instantly.
Commandments
- I. Thou shalt not use a VPN with Tor.
- II. Thou shalt verify ALL PGP signatures.
- III. Thou shalt use XMR when available.
- IV. Thou shalt enable 2FA on all accounts.
- V. Thou shalt not reuse passwords.
- VI. Thou shalt encrypt locally.
PGP Toolchain
Recommended local software for cryptographic operations: