Educational Resource

Secure Access Protocol

A comprehensive technical guide for establishing a secure connection to the WeTheNorth infrastructure. This manual covers operational security, PGP encryption, and blockchain verification.

Operational Security Overview

Accessing hidden services on the Tor network requires strict adherence to security protocols to maintain anonymity and prevent data leakage. WeTheNorth Market operates exclusively as a Tor hidden service. Standard browsers (Chrome, Firefox, Safari) cannot access these protocols. The following steps outline the theoretical best practices for interacting with the platform.

Step 1: The Environment

01

Before attempting connection, ensure your environment is configured for privacy:

  • Download the official Tor Browser from the Tor Project.
  • Do not install third-party extensions or plugins.
  • Navigate to Settings > Privacy & Security.
  • Set the Security Level to Safer or Safest. This disables JavaScript on non-HTTPS sites and prevents many fingerprinting techniques.
Note: Disabling JavaScript completely (Safest) is recommended for maximum security, though it may affect some dynamic UI elements.

Step 2: Access & Verification

02

Phishing is the most common threat. Always verify the V3 Onion URL against a trusted PGP signed message.

hn2paw7mb3tf4lpnb6lg3abjrwtpbukndf4k7v3u2ax3acuy2khxz6ad.onion

Upon loading the page, you will encounter a DDoS protection queue. This is standard behavior. Once through, verify the page's PGP signature if available in the footer of the login page.

Step 3: Account Security

03

Credentials

Create a unique username not used on other platforms. Use a randomly generated alphanumeric password of at least 16 characters.

The Mnemonic

During registration, you will be shown a Mnemonic Phrase. You must save this offline immediately. It is the only cryptographic method to reset a lost password or recover an account. Support cannot assist without it.

Step 4: PGP Encryption

04

PGP (Pretty Good Privacy) is mandatory for secure communication. Clear text messages are a security vulnerability.

  1. Generate a new PGP Key Pair (4096-bit RSA recommended) using software like Kleopatra or GPG4Win.
  2. Copy your Public Key.
  3. Navigate to account settings on WeTheNorth and paste your Public Key.
  4. Enable 2FA (Two-Factor Authentication). The market will encrypt a challenge message to your key; you must decrypt it to sign in.

Step 5: Funding (Educational)

05

WeTheNorth utilizes an integrated wallet system. For educational purposes, understanding the difference between transparent and private ledgers is crucial.

Monero (XMR)

Recommended protocol. Monero uses ring signatures and stealth addresses to obfuscate the sender, receiver, and amount.

Bitcoin (BTC)

Supported but less private. Bitcoin transactions are traceable on a public ledger. If used, coin mixing is often discussed in security research.

Step 6: The Order Process (Conceptual)

06

Understanding market mechanisms prevents loss of funds.

  • Escrow: Funds are held by the market until the order is finalized. This protects the user if goods are not delivered.
  • Finalize Early (FE): Funds are released immediately to the vendor. This carries high risk and should only be done with highly reputable vendors with established trust.
  • Disputes: If an issue arises, extending the auto-finalize timer and opening a dispute allows moderators to mediate based on evidence.

Have specific questions?

Our Frequency Asked Questions page covers detailed nuances about PGP errors, wallet synchronization times, and mirror availability.

Visit Knowledge Base