Critical Information

Security & OpSec Guide

Mandatory protocols for safe navigation of WeTheNorth Darknet. Mistakes in operational security lead directly to loss of funds or identity exposure.

01

Identity Isolation

Maintaining a strict firewall between your real-life identity and your Tor identity is the foundation of operational security. Any cross-contamination compromises the integrity of your entire persona.

  • ×
    Never mix identities. Your digital footprint on the clearweb must never intersect with your hidden service activities.
  • ×
    No username/password reuse. Do not use credentials that have ever been used on clearnet sites, forums, or previous markets.
  • ×
    Zero personal contact info. Never provide real names, standard email addresses, or social media handles to any entity within the market ecosystem.
02

Connection Defense & Verification

The Tor network is susceptible to Man-in-the-Middle (MitM) attacks. Malicious actors frequently deploy proxy servers that imitate the real market interface to intercept credentials and cryptocurrency deposits.

Verifying the PGP signature of the onion link is the ONLY absolute method of confirming you are connected to the authentic infrastructure.

Defense Protocols:

  • Always verify the market's PGP signed message containing the current mirrors.
  • Do not blindly trust links found on random wikis, unverified forums, or Reddit threads.
  • Setup 2FA (Two-Factor Authentication) using PGP immediately upon registration.
03

Tor Browser Hardening

The standard Tor Browser requires manual adjustments to maximize operational security and prevent de-anonymization vulnerabilities.

Security Level

Set your Tor Browser security slider to "Safer" or "Safest". This inherently disables dangerous web features that can be exploited.

Disable JavaScript

Utilize the built-in NoScript extension to explicitly disable JavaScript wherever possible. JS is the primary vector for browser exploits.

Window Fingerprinting

Never resize the Tor Browser window. Maximizing or altering the dimensions of the browser window transmits your exact screen resolution, providing a unique data point used for browser fingerprinting.

04

Financial Hygiene

Cryptocurrency ledgers are public. Poor financial hygiene creates an immutable, permanent link between your real-life identity and market operations.

Critical Error: Never send funds directly from a KYC (Know Your Customer) exchange like Coinbase, Kraken, or Binance directly to a market wallet.
Proper Routing: Always route funds through a personal, localized intermediary wallet (e.g., Electrum for BTC, official GUI wallet for XMR) that you control the private keys for.
Currency Selection: The use of Monero (XMR) is highly recommended over Bitcoin (BTC). Monero provides protocol-level privacy, obfuscating the sender, receiver, and transaction amount.
05

PGP Encryption (The Golden Rule)

"If you don't encrypt, you don't care."

PGP (Pretty Good Privacy) is non-negotiable. It is the only mathematical guarantee that your communications remain secure, even if law enforcement seizes the market's servers.

  • A
    Client-Side Encryption Only All sensitive data (shipping addresses, specific communications) MUST be encrypted locally on your own machine using software like Kleopatra or Gpg4win before it is pasted into the browser.
  • B
    Never Trust "Auto-Encrypt" Never use a built-in "Auto-Encrypt" checkbox provided by a marketplace. Server-side encryption requires you to trust the server with plaintext data. If the server is compromised or malicious, your unencrypted data is captured instantly.

Commandments

  • I. Thou shalt not use a VPN with Tor.
  • II. Thou shalt verify ALL PGP signatures.
  • III. Thou shalt use XMR when available.
  • IV. Thou shalt enable 2FA on all accounts.
  • V. Thou shalt not reuse passwords.
  • VI. Thou shalt encrypt locally.