WeTheNorth Logo Canadian Flag

WeTheNorth Secure Access Guide: Step-by-Step

This ultimate guide provides detailed, step-by-step instructions for safely accessing the market using the Tor network, complemented by essential security protocols.

1. Essential Security Prerequisites

PHASE A: Required Software Setup

Tor Browser Icon

Tor Browser

  • Download Source: Only from torproject.org. Avoid mirror sites for the browser itself, they may put you at risk.
  • Verification: Always compare your downloaded file's checksum/PGP signature to the one provided on the Tor Project official website.
  • Crucial Isolation: If possible, use a Virtual Machine, or a live operating system like Tails.
PGP Icon

PGP/GPG Software

  • Purpose: Encrypting your address provides secure communications between you and the vendor.
  • Recommended Tool: PGP Tool. It is the easiest to use, you can generate your key for 2FA and decrypt the challenge here.
  • Process Tip: After generating your PGP key, make sure to save the public AND private key, click the download button and put it in a safe place on your system of a USB.

PHASE B: Pre-Access Checklist

  1. Clean State: Close all the programs/applications that are not related to your darknet activities, maintain a clean system while accessing the market. Do this to avoid being spied on by programs like Discord.).
  2. Disable JavaScript: Consider disabling javascript to ensure high security, javascript puts you at risk of things like browser fingerpriting and zero-day exploits in Tor Browser.
  3. Optional VPN Layer: If you are using a VPN, connect to it NOW before starting Tor Browser, or Onion Browser if on mobile.

2. Secure Desktop Access Flow

The 5 Steps to Access

  1. Access Step 1: Launch & Connection: Launch your Tor Browser application, click connect, and wait for it to successfully connect, and for it to reach the Tor Browser homepage.
  2. Access Step 2: Window Sizing: CRUCIAL: Do not run Tor Browser in full screen mode, this would allow things like fingerprinting to collect the size of your screen, which can be used as evidence to identify you.
  3. Access Step 3: URL Entry: Copy the verified Onion URL from the box above, do not use other links. Bookmark the url once you connect to make it faster and safer to connect.
  4. Access Step 4: PGP Verification: Once you reach the entry captcha page, compare the URL with the one found on this website, if it does not match, LEAVE NOW.
  5. Access Step 5: Safe Login: Enter your details, login and start browsing. Deposit Monero instead of bitcoin for enhanced security.
Phishing Warning: Scammers will try to get you to use new links, do not do this. Once you have collected the link from this website, make sure to bookmark it.

3. Mobile Access Guide (Use with Caution)

Android: Official Tor Browser

Android Tor Icon

Recommended for Android

  • App: Use the official Tor Browser for Android, available on the Tor Project website or Google Play.
  • Connection: Launch the app and wait. Manually configure bridges if necessary in restrictive regions.
  • Browsing: Manually enter the full Onion URL. Avoid installing third-party keyboard apps while in use.

iOS: VPN + Onion Browser / Orbot

iOS Onion Icon

Recommended for iOS

  • App: Use Onion Browser, not other apps. Onion Browser is the official recommended browser for iOS by Tor Project. You will need to run Orbot alongside it.
  • VPN Layer: Orbot is a safe vpn, routing all connections on your device through Tor
  • Warning: Mobile devices offer less security and anonymity when browsing the darknet, it is recommended to use a Linux operating system such as Tails OS or a Whoonix VM.

4. Post-Access: Account Security & Ordering

Account Registration and Mnemonic

After you have created your account, generate a PGP key using the tool on this website, and enable 2FA on your account with it. Make sure to download the private and public key before enabling 2FA so you do not lock yourself out!.

Encrypting Shipping Details (Required For Safety)

  1. Get the vendors public key from their profile.
  2. Use the PGP tool on this website to encrypt your address with the vendors public key.
  3. Copy and paste the PGP encrypted message into the shipping details box on WeTheNorth Market.
  4. Do not send cleartext shipping details, because in the end WTN Market was seized by law enforcement, they will be able to see your address in the database!

Order Finalization and Escrow

The market uses Escrow, which is a system where the market admins will hold your funds in the softwate, and will not release it to the vendor until you click the Finalize button. Always verify a vendors reputation before placing orders, check the reviews, rating, and everything on their profile.
Monero Is Recommended: Monero is alot safer than Bitcoin, for example, the Bitcoin blockchain is completely public, while the XMR blockchain is completely private and contains many decoy transactions for every real one.