/ PROTOCOLS_AND_FAQ
Operational Security & General Information
01 // General Intelligence
WeTheNorth URL is the authoritative clearweb directory for WeTheNorth Market. We provide signed, verified mirrors and status updates. Our purpose is to mitigate phishing risks by serving as a trusted entry point. Always verify the PGP signature of any mirror obtained here before entering credentials.
Restricting operations to Canada eliminates the single highest risk vector in darknet commerce: International Customs. By keeping all packages within the domestic mail stream, seizure rates drop to near zero, ensuring reliability for buyers and longevity for vendors.
Yes. WeTheNorth est fier d'ĂȘtre bilingue. The entire platform, including support tickets, vendor interactions, and interface elements, is fully supported in both English and French to serve the entire Canadian demographic.
02 // Security Protocols
- Import the official WeTheNorth Public PGP Key into your GPG software (Kleopatra/GPG4Win).
- Access the login page. You will see a "Verify this Mirror" message.
- Copy the message block.
- Decrypt/Verify in your software.
- IF THE SIGNATURE IS INVALID, LEAVE IMMEDIATELY. It is a phishing site stealing credentials.
Generally, no. Using a VPN with Tor (Tor-over-VPN or VPN-over-Tor) can introduce a permanent entry/exit node and a money trail. The Tor network is designed to be sufficient for anonymity. Configure your Tor Browser to 'Safest' security levels and disable JavaScript completely.
STRICTLY PROHIBITED. Rule #2 of the market forbids sharing or requesting external contact handles (Telegram, Signal, Wickr, ProtonMail). This creates a security vulnerability and bypasses Escrow protection. Violators are banned immediately. All comms must remain encrypted within the market ticket system.
03 // Financial Operations
We accept both, but strongly advocate for Monero (XMR). Bitcoin transactions are recorded on a public ledger forever. Chain analysis firms can trace BTC from an exchange to a market wallet. Monero uses ring signatures and stealth addresses to break this link. Use XMR for operational security.
When you purchase, funds move to the Market Escrow Wallet, not the vendor.
1. Vendor ships order.
2. Buyer receives order.
3. Buyer clicks "Finalize" -> Funds release to vendor.
If the order does not arrive, do not finalize. Open a dispute before the auto-finalize timer (14 days for physical goods) expires.
1. Vendor ships order.
2. Buyer receives order.
3. Buyer clicks "Finalize" -> Funds release to vendor.
If the order does not arrive, do not finalize. Open a dispute before the auto-finalize timer (14 days for physical goods) expires.
04 // Support
The Tor network is subject to DDoS attacks. If the main link is unresponsive, check the Mirrors Page for alternative rotating mirrors. Never search for links on Google, Reddit, or Wikipedia as these are often poisoned by phishers.
If you have your PGP key associated with your account, you can reset credentials. If you did not set up PGP or lost your private key, the account is irretrievable. Admins cannot restore access without PGP verification to prevent social engineering.