Platform Guide

WeTheNorth Market — Complete Informational Overview

A detailed examination of the WeTheNorth darknet marketplace: its history, operational model, security architecture, and the twelve core features that define the platform. Content is for informational and research purposes only.

Origins & Background

WeTheNorth emerged in the summer of 2021 as a successor to Canadian darknet communities left without a dedicated platform following the coordinated takedown of Wall Street Market in 2019 and the exit of several Canadian-focused vendors from Empire Market in 2020. The name is drawn from the rallying cry of Canadian basketball fans, signalling a deliberate Canadian identity.

From its inception, the platform distinguished itself through several structural decisions: a Tor-only access model, mandatory PGP encryption for all vendor-buyer communication, and an escrow system requiring multiple-signature approval before fund release. These architectural choices reflected lessons learned from predecessor platforms that suffered from single points of failure.

By 2022, the WeTheNorth darknet marketplace had established itself as the dominant Canadian-focused marketplace on the Tor network, drawing a combination of domestic vendors, cross-border US sellers, and a growing number of international participants attracted by its reliability and security posture.

Platform Architecture

The technical infrastructure operates entirely within the Tor network. There is no clearnet component, no CDN that could leak IP addresses, and no reliance on centralised hosting providers. The .onion address system provides cryptographic proof that traffic reaches the intended server without interception.

Communication between the platform and users is layered: Tor provides transport-layer anonymity, while platform-level PGP encryption protects message content even from the platform operators themselves. This separation of concerns — transport privacy versus content privacy — is a distinguishing security feature.

2021
Founded
4,200+
Listings
1,100+
Vendors
CA
Primary Market

Key Trust Indicators

  • PGP-signed official announcements
  • Multi-sig escrow (2-of-3)
  • Vendor bond system
  • 4+ year operational history
  • Active dispute resolution

Platform Capabilities

12 Core Platform Features

A comprehensive breakdown of the features that constitute the WeTheNorth platform's operational and security model.

Multi-signature escrow

Multi-Signature Escrow

A 2-of-3 multi-signature escrow model ensures that no single party can unilaterally release or withhold funds. The buyer, vendor, and platform moderator each hold one key. All three cannot collude without detection.

PGP encrypted messaging

Mandatory PGP Encryption

PGP encryption is enforced for all order communications containing shipping information. The platform provides integrated key management to assist less technical users while maintaining cryptographic security standards.

Vendor rating system

Verified Rating System

Ratings are linked to verified purchases only — there is no way to leave feedback without completing a transaction. Ratings are broken into subcategories: quality, stealth, speed, communication, and overall experience.

Stealth shipping

Stealth Packaging Documentation

Vendors are required to provide written stealth descriptions before buyers commit. This transparency allows buyers to evaluate packaging approaches and make informed decisions about risk exposure.

Crypto payments XMR BTC

XMR-First Payment System

Monero is the primary currency and is strongly encouraged. Bitcoin is supported as a secondary option. Deposit wallets are non-custodial: funds are not pooled with other users' balances until actively spent.

Tor network only access

Tor-Exclusive Hidden Service

The market operates exclusively as a v3 .onion hidden service. V3 onion addresses are 56 characters long and provide stronger cryptographic identity guarantees than older v2 addresses.

Dispute resolution

Structured Dispute Resolution

Disputes are mediated by platform moderators with defined timelines. Evidence upload systems allow buyers and vendors to submit photographs, messages, and tracking information. Resolution typically occurs within 7 days.

2FA security

Two-Factor Authentication

Account security is strengthened through a TOTP-based 2FA system. PGP-based login confirmation is also supported, providing a second layer of cryptographic verification for account access.

Vendor bond system

Vendor Bond Accountability

Vendors pay a non-refundable bond to list products. This financial commitment creates accountability and filters out low-quality or fraudulent sellers. Bond rates are tiered based on vendor history and category.

Category browsing

Structured Category Browsing

The marketplace is organised into clearly defined product categories with robust search and filtering. Price range, vendor level, shipping origin, and rating filters allow precise discovery without exposing unintended content.

Buyer feedback

Verified Buyer Feedback

All buyer reviews are cryptographically linked to completed orders, making feedback manipulation impossible. Review history is preserved permanently and forms the core of the vendor reputation system.

Auto-finalization

Auto-Finalization with Delay

Orders auto-finalize after a configurable period if the buyer does not confirm receipt. This protects vendors from indefinite fund lockup while still allowing adequate time for buyers to raise disputes.

Security Architecture

How the Platform Protects Users

The WeTheNorth darknet platform's security model operates at three distinct layers, each addressing a different threat vector.

Transport Layer

Tor's onion routing encrypts traffic across three relay nodes. No single relay knows both the user's IP and the destination. V3 .onion addresses include cryptographic proof of server identity, preventing man-in-the-middle attacks.

Application Layer

Platform-level PGP encryption means that even if server databases were compromised, message content remains unreadable without the recipient's private key. The platform itself cannot read encrypted order messages.

Financial Layer

Multi-signature escrow ensures funds cannot be stolen by a single compromised party. Monero's cryptographic privacy means transaction amounts and parties cannot be identified through blockchain analysis.

Related Guides

Further Reading

Access the Market

Find the verified WeTheNorth onion address, PGP verification, and a step-by-step guide to entering the marketplace securely.

Enter Market →

OPSEC Guide

Detailed operational security practices for buyers and vendors, including tool recommendations, red flags, and common mistakes to avoid.

Read OPSEC Guide →

Cryptocurrency Guide

How to acquire, store, and use Monero and Bitcoin privately. Exchange selection, wallet setup, and transaction best practices.

Crypto Guide →