Secure Access Protocols

Documentation for establishing a secure connection to the WeTheNorth Market infrastructure. Follow these protocols to ensure cryptographic integrity and anonymity.

Accessing WeTheNorth Market requires traversing the Tor network. This tutorial outlines the technical requirements for account generation, encryption setup, and order placement within the Canadian darknet ecosystem. Strict adherence to these steps is mandatory for operational security (OpSec).

01

Network Configuration

The marketplace is hosted as a hidden service on the Tor network. Standard browsers (Chrome, Safari, Firefox) cannot resolve .onion top-level domains. You must install the Tor Browser to route your connection through encrypted relay nodes, masking your IP address and physical location.

Requirement Tor Browser (Latest Stable Build)
Configuration Security Level: "Safer" or "Safest"
02

V3 Onion Connection

Utilize the official verified V3 onion address below. This address is cryptographically generated and cannot be spoofed. Ensure you are not utilizing dynamic links found on unverified third-party indexers.

SHA-256 Verified • V3 Protocol • Up Time: 99.9%

03

DDoS Mitigation

Upon initial connection, you may encounter the WeTheNorth Guard interface. This is a perimeter defense system designed to filter automated bot traffic and DDoS attacks.

  • Solve the rotating CAPTCHA or clock puzzle.
  • Allow the browser to generate the Proof-of-Work (PoW) token.
  • Do not refresh the page during the verification queue.
04

Identity Creation

Navigate to the "Register" section. The platform requires zero Personal Identifiable Information (PII).

Credentials

Select a unique username unconnected to your clear-net identity. Use a high-entropy password (alphanumeric + symbols).

Withdrawal PIN

Define a 6-digit numeric PIN. This is required for all wallet actions and order confirmations.

Mnemonic Recovery Key

The system will display a Mnemonic Key ONLY ONCE upon registration. Save this offline immediately. It is the only cryptographic method to recover a lost account. Support cannot reset passwords.

05

PGP 2FA Verification

For maximum security, enable Two-Factor Authentication (2FA) immediately. Navigate to user settings and upload your PGP Public Key.

Once configured, the server will present an encrypted message block upon every login attempt. You must decrypt this message using your private key to reveal the authorization code. This ensures account integrity even in the event of password compromise.

View PGP Documentation

Connection Issues? Verify the network status or utilize an alternative mirror from our Mirrors Registry.