Security Fundamentals Guide
Essential security practices for darknet marketplace access. Read this BEFORE accessing WeTheNorth Market. Your anonymity and safety depend on following these guidelines.
π‘οΈ Essential Security Stack
These tools are MANDATORY for safe darknet marketplace access. Skipping any of these dramatically increases your risk of exposure.
π Tor Browser REQUIRED
Download: torproject.org
Why: Routes traffic through 3+ encrypted nodes, masking your IP address. NEVER access .onion sites without Tor.
Settings: Use "Safest" security level (Settings β Privacy & Security β Security Level: Safest). Disables JavaScript by default.
π VPN Before Tor HIGHLY RECOMMENDED
Recommended: Mullvad, IVPN, ProtonVPN
Why: Hides Tor usage from your ISP. VPN β Tor is standard darknet OPSEC.
Important: Use VPN that accepts crypto, doesn't log, and has kill switch enabled.
π» Tails OS (The Amnesic Incognito Live System) OPTIONAL BUT IDEAL
Download: tails.net
Why: Boots from USB, leaves no trace on computer, routes all traffic through Tor, amnesia on shutdown.
Use Case: Maximum security for high-risk activities. Prevents forensic recovery.
π PGP Encryption REQUIRED
Software: GPG (Linux/Mac), Kleopatra (Windows), PGP Suite (Mobile - use desktop only)
Why: Encrypts communications, verifies vendor identity, protects shipping address from marketplace admins.
Requirement: WeTheNorth requires PGP-encrypted addresses for all orders.
β οΈ Critical Security Rules - NEVER Break These
β NEVER Use Your Real Identity
No real names, addresses (except encrypted shipping), phone numbers, emails, or identifying information. Create entirely separate identity for darknet.
β NEVER Reuse Passwords
Every darknet account needs unique password. Use password manager (KeePassXC) with master password you memorize. If one site gets compromised, others remain safe.
β NEVER Access from Smartphone
Mobile Tor browsers are insecure. Smartphones leak location data, have weak isolation. Desktop/laptop with Tor Browser ONLY.
β NEVER Screenshot or Save Sensitive Info
Screenshots contain metadata. Don't save order confirmations, addresses, or communications to hard drive. Use clipboard for copy-paste, clear after use.
β NEVER Store Large Amounts in Marketplace Wallet
Exit scams are common. Only deposit exact amount needed for immediate purchase. Withdraw unused funds to personal wallet immediately.
β NEVER Access Over Public WiFi
Public WiFi can be monitored. Use home internet with VPN, or mobile hotspot with VPN. Never access from workplace, school, or cafe networks.
π Tor Browser Setup & Configuration
Step-by-Step Setup:
- Download Tor Browser: Visit torproject.org (clearnet) and download official Tor Browser for your OS
- Verify Signature: Check PGP signature to ensure download wasn't tampered with
- Install & Launch: Extract and run Tor Browser (no installation to system required)
- Configure Security Level: Click shield icon β Advanced Security Settings β Set to "Safest"
- Disable JavaScript Globally: Safest mode does this automatically, but verify in about:config
- Never Maximize Window: Unique window sizes fingerprint users. Keep default size.
- Bookmark Verified .onion: After PGP-verifying WeTheNorth link, bookmark it in Tor Browser
π VPN Configuration for Tor
Why VPN + Tor?
VPN β Tor β WeTheNorth is the recommended setup:
- Hides Tor Usage from ISP: Your ISP sees VPN connection, not Tor. Important in countries monitoring Tor users.
- Extra Anonymity Layer: Even if Tor is compromised, VPN provides additional obfuscation.
- Protects Against Traffic Analysis: Makes timing attacks more difficult.
Recommended VPN Providers (No Logs, Accept Crypto):
πΈπͺ Mullvad VPN
β¬5/month, accepts XMR/BTC, no email required, independently audited. Best privacy-to-cost ratio.
πΊπΈ IVPN
$6-10/month, accepts XMR/BTC, open-source apps, warrant canary. Strong privacy policy.
π¨π ProtonVPN
Free tier available, accepts BTC, based in Switzerland (strong privacy laws). Premium recommended for Tor use.
π Operational Security (OPSEC) Best Practices
Computer Security:
- Dedicated Device: Ideally, use separate computer/laptop exclusively for darknet access. Reduces cross-contamination risk.
- Full Disk Encryption: Enable BitLocker (Windows), FileVault (Mac), or LUKS (Linux) to protect data if device is seized.
- Strong BIOS Password: Prevents unauthorized boot or BIOS-level attacks.
- Disable Webcam/Microphone: Physically cover webcam, disable microphone in BIOS when not in use.
- Regular OS Updates: Keep system patched against exploits, but avoid bleeding-edge updates (wait 1-2 weeks for stability).
Behavioral Security:
- Clear Browser Data After Each Session: Even in Tor Browser, manually clear history/cookies before closing.
- Never Discuss Orders Unencrypted: All vendor communications must use PGP encryption.
- Avoid Patterns: Don't access at same time daily, vary session lengths, randomize behavior to prevent traffic analysis.
- Separate Identities: Never link darknet activity with clearnet social media, forums, or email.
- Trust No One: Assume all marketplace staff, vendors, and buyers are potential threats or law enforcement.
Physical Security:
- Secure Physical Location: Access from private residence only, never public spaces with cameras.
- Lock Computer When Away: Use password-protected screensaver with 1-minute timeout.
- Emergency Shutdown Plan: Have rapid shutdown procedure if interrupted (close Tor, disconnect VPN, shut down computer).
- Disposal Protocol: When retiring darknet device, physically destroy hard drive or use military-grade wipe (DBAN 7-pass minimum).
π¨ Common Security Mistakes (Don't Make These)
Discussing Orders on Clearnet
Never discuss darknet activities on Reddit, Discord, Telegram, or clearnet forums. These are monitored and archived. Use Dread forum (darknet) if you need community discussion.
Using Tor on Mobile Devices
Mobile Tor browsers (Onion Browser, Orbot) are significantly weaker than desktop Tor Browser. Mobile devices leak metadata, location, and have poor isolation. Desktop ONLY.
Searching for .onion Links on Google
Never search for marketplace links on clearnet search engines. Results are 99% phishing scams. Use PGP-verified links only from trusted sources like Dread forum.
Buying Crypto with Credit Card/Bank
KYC exchanges (Coinbase, Kraken, Binance) link your identity to crypto purchases. Law enforcement can trace. Use LocalMonero, Bisq, or Bitcoin ATMs for anonymous acquisition.
Using Personal Email for Accounts
WeTheNorth doesn't require email, but if other services do, create anonymous ProtonMail/Tutanota via Tor. Never use Gmail, Yahoo, Outlook linked to real identity.
Signing for Packages
If package requires signature, it may be controlled delivery. Never sign. If package arrives without signature, wait 24-48 hours before opening (cool-off period).
πΏ Advanced: Using Tails OS for Maximum Security
Tails (The Amnesic Incognito Live System) is the gold standard for darknet security. It's a bootable Linux OS designed for anonymity:
Why Tails?
- Amnesia: Runs entirely in RAM, leaves no trace on hard drive after shutdown
- Forced Tor Routing: ALL network traffic automatically routed through Tor (no leaks possible)
- Encryption Built-In: Persistent storage encrypted with LUKS, PGP tools pre-installed
- Portable: Boot from USB on any computer, no installation required
- Forensic Resistance: Even if computer is seized while running, shutdown destroys all evidence
Quick Tails Setup:
- Download Tails ISO from tails.net (verify signature)
- Create bootable USB with Etcher or dd command (requires 8GB+ USB stick)
- Reboot computer, enter BIOS/UEFI, set USB as boot priority
- Boot from USB, Tails Welcome Screen appears
- Configure persistent storage (encrypted) for PGP keys, bookmarks (optional)
- Connect to VPN (if using VPN-before-Tor setup)
- Launch Tor Browser (pre-installed), access WeTheNorth
β Pre-Access Security Checklist
Before accessing WeTheNorth Market, verify ALL of these:
- β VPN connected (Mullvad/IVPN/ProtonVPN with kill switch enabled)
- β Tor Browser launched (NOT regular browser, NOT mobile Tor)
- β Security Level set to "Safest" (shield icon β settings)
- β JavaScript disabled (automatic in Safest mode)
- β Webcam covered, microphone disabled
- β PGP software installed and tested (GPG/Kleopatra)
- β Password manager ready (KeePassXC with unique passwords)
- β Private location (no cameras, no other people present)
- β Using desktop/laptop (NOT smartphone or tablet)
- β No screen sharing software running (Discord, TeamViewer, Zoom)
- β .onion link verified via PGP signature (never trust search results)
- β Full disk encryption enabled (BitLocker/FileVault/LUKS)
Next: Learn PGP Encryption
Now that your security foundation is solid, learn how to use PGP encryption for protected communications.