Multi-Signature Escrow
A 2-of-3 multi-signature escrow model ensures that no single party can unilaterally release or withhold funds. The buyer, vendor, and platform moderator each hold one key. All three cannot collude without detection.
Platform Guide
A detailed examination of the WeTheNorth darknet marketplace: its history, operational model, security architecture, and the twelve core features that define the platform. Content is for informational and research purposes only.
WeTheNorth emerged in the summer of 2021 as a successor to Canadian darknet communities left without a dedicated platform following the coordinated takedown of Wall Street Market in 2019 and the exit of several Canadian-focused vendors from Empire Market in 2020. The name is drawn from the rallying cry of Canadian basketball fans, signalling a deliberate Canadian identity.
From its inception, the platform distinguished itself through several structural decisions: a Tor-only access model, mandatory PGP encryption for all vendor-buyer communication, and an escrow system requiring multiple-signature approval before fund release. These architectural choices reflected lessons learned from predecessor platforms that suffered from single points of failure.
By 2022, the WeTheNorth darknet marketplace had established itself as the dominant Canadian-focused marketplace on the Tor network, drawing a combination of domestic vendors, cross-border US sellers, and a growing number of international participants attracted by its reliability and security posture.
The technical infrastructure operates entirely within the Tor network. There is no clearnet component, no CDN that could leak IP addresses, and no reliance on centralised hosting providers. The .onion address system provides cryptographic proof that traffic reaches the intended server without interception.
Communication between the platform and users is layered: Tor provides transport-layer anonymity, while platform-level PGP encryption protects message content even from the platform operators themselves. This separation of concerns — transport privacy versus content privacy — is a distinguishing security feature.
Platform Capabilities
A comprehensive breakdown of the features that constitute the WeTheNorth platform's operational and security model.
A 2-of-3 multi-signature escrow model ensures that no single party can unilaterally release or withhold funds. The buyer, vendor, and platform moderator each hold one key. All three cannot collude without detection.
PGP encryption is enforced for all order communications containing shipping information. The platform provides integrated key management to assist less technical users while maintaining cryptographic security standards.
Ratings are linked to verified purchases only — there is no way to leave feedback without completing a transaction. Ratings are broken into subcategories: quality, stealth, speed, communication, and overall experience.
Vendors are required to provide written stealth descriptions before buyers commit. This transparency allows buyers to evaluate packaging approaches and make informed decisions about risk exposure.
Monero is the primary currency and is strongly encouraged. Bitcoin is supported as a secondary option. Deposit wallets are non-custodial: funds are not pooled with other users' balances until actively spent.
The market operates exclusively as a v3 .onion hidden service. V3 onion addresses are 56 characters long and provide stronger cryptographic identity guarantees than older v2 addresses.
Disputes are mediated by platform moderators with defined timelines. Evidence upload systems allow buyers and vendors to submit photographs, messages, and tracking information. Resolution typically occurs within 7 days.
Account security is strengthened through a TOTP-based 2FA system. PGP-based login confirmation is also supported, providing a second layer of cryptographic verification for account access.
Vendors pay a non-refundable bond to list products. This financial commitment creates accountability and filters out low-quality or fraudulent sellers. Bond rates are tiered based on vendor history and category.
The marketplace is organised into clearly defined product categories with robust search and filtering. Price range, vendor level, shipping origin, and rating filters allow precise discovery without exposing unintended content.
All buyer reviews are cryptographically linked to completed orders, making feedback manipulation impossible. Review history is preserved permanently and forms the core of the vendor reputation system.
Orders auto-finalize after a configurable period if the buyer does not confirm receipt. This protects vendors from indefinite fund lockup while still allowing adequate time for buyers to raise disputes.
Security Architecture
The WeTheNorth darknet platform's security model operates at three distinct layers, each addressing a different threat vector.
Tor's onion routing encrypts traffic across three relay nodes. No single relay knows both the user's IP and the destination. V3 .onion addresses include cryptographic proof of server identity, preventing man-in-the-middle attacks.
Platform-level PGP encryption means that even if server databases were compromised, message content remains unreadable without the recipient's private key. The platform itself cannot read encrypted order messages.
Multi-signature escrow ensures funds cannot be stolen by a single compromised party. Monero's cryptographic privacy means transaction amounts and parties cannot be identified through blockchain analysis.
Related Guides
Find the verified WeTheNorth onion address, PGP verification, and a step-by-step guide to entering the marketplace securely.
Enter Market →Detailed operational security practices for buyers and vendors, including tool recommendations, red flags, and common mistakes to avoid.
Read OPSEC Guide →How to acquire, store, and use Monero and Bitcoin privately. Exchange selection, wallet setup, and transaction best practices.
Crypto Guide →