Market Protocols

Operational documentation for the Nexus darknet market ecosystem. Technical specifications, security procedures, and transaction logic.

Access Protocols

Nexus Onion serves as the static verification node for the Nexus darknet market. It maintains a synchronized registry of active V3 onion addresses and PGP keys. We do not host the marketplace infrastructure directly; rather, we provide the cryptographically signed entry points required to route connections through the Tor network to the backend servers.

Access to Nexus Market requires a Tor Browser instance. Connection is established via V3 onion services, which provide end-to-end encryption and location masking. The primary entry node is rmnvwgxnat4m4o6whqvh6dy7fhnasxa6cndufyrztgahtxwdhgr7thid.onion. Ensure your client is configured to disable Javascript execution (Security Level: Safest) to mitigate browser-based deanonymization vectors.

Registration is open and requires no PII (Personally Identifiable Information). The system generates a cryptographic salt based on your username and password. You must define a 6-digit withdrawal PIN. Upon creation, a 12-word mnemonic seed is displayed. This seed is the absolute and only method for account recovery. It is not stored in plaintext on the server; if lost, access is permanently revoked.

Cryptographic Security

Trust is established through PGP (Pretty Good Privacy) signatures, not domain names. Nexus Market signs all official communications and mirror lists with the private key corresponding to fingerprint 82AA 4B91 F322 901C. Users must import the public key into their keyring (e.g., GnuPG, Kleopatra) and verify the signed message on the landing page. A valid signature confirms the server's identity mathematically.

PGP 2FA is a mandatory security layer for vendors and an optional setting for buyers. Upon login attempt, the server encrypts a random challenge string using the user's public PGP key. The user must decrypt this challenge locally and input the resulting plaintext code. This protocol ensures that account access is impossible without possession of the associated private key, even if the password is compromised.

Nexus Market implements server-side hardening, but user-side OpSec is the responsibility of the client. Sensitive data (shipping addresses) should be encrypted client-side using the vendor's PGP key before submission. Use Monero (XMR) for blockchain privacy. Never reuse credentials across different marketplaces.

Financial Logic

The platform processes Bitcoin (BTC), Monero (XMR), and Litecoin (LTC). Monero is the recommended standard due to RingCT (Ring Confidential Transactions) and stealth addresses, effectively breaking on-chain analysis. Direct Pay (walletless) and Account Wallet modes are both supported.

Escrow is a holding state where funds are secured by the market's multi-sig system. Upon order initiation, funds are deducted from the buyer but not credited to the vendor. Release conditions are met when: 1) Buyer manually finalizes the order, or 2) The auto-finalize timer (7-14 days) expires without a dispute. FE (Finalize Early) is restricted to vendors with high trust scores.

Deposits incur 0% platform fees. Withdrawals are subject to a flat 1% processing fee to support mixer operations and network overhead. Standard vendor commissions apply to finalized sales. The minimum withdrawal threshold is $3.00 USD equivalent.

Governance & Disputes

Nexus Market enforces a strict harm reduction framework. Prohibited listings include: Fentanyl and synthetic analogues, CP, weaponry/explosives, poisons, and contract services (hitman/doxing). Violations result in immediate vendor account termination and forfeiture of bond.

Buyers may initiate a dispute if an order is non-compliant or undelivered. This action freezes the escrow timer and summons a moderator. Mediation requires evidence submission (logs, photos). Disputes must be opened within the 72-hour window following the auto-finalize date. Moderator decisions are final.

Tor network latency or DDoS attacks may cause intermittent timeouts. If the primary entry node is unreachable, utilize the rotational mirrors listed on the Links page. Mirror integrity must always be validated against the PGP signed message to ensure they are part of the official cluster.

Advanced Configuration

For detailed configuration regarding PGP key generation, Monero wallet setup, or Tor bridge configuration, consult the technical tutorial.