WeTheNorth Market is a darknet marketplace that emerged as a Canada-focused successor following the shutdown of earlier platforms. Operating exclusively on the Tor network, it has established itself as one of the most stable and feature-rich darknet marketplaces, consistently appearing in discussions across darknet research communities and cybersecurity publications.

The platform earned its name as a reference to Canadian national identity — a nod to the "We The North" motto popularized by the Toronto Raptors. This Canadian focus is reflected in its vendor base, which skews heavily toward domestic Canadian sellers, though the platform is accessible from anywhere via the WeTheNorth Url on the Tor network.

From its escrow system and PGP-encrypted messaging to its strict no-FE policy and multi-signature transaction options, WeTheNorth Market has built a reputation for buyer protection that rivals the most established platforms in the space. Below, we examine each of the 12 core features that define the platform's security architecture and user experience.

Quick Platform Facts

  • Launched: 2021 (as successor to earlier Canadian markets)
  • Focus: Canada-first, with international vendor access
  • Network: Tor hidden service (.onion only)
  • Payment: Bitcoin (BTC) and Monero (XMR)
  • Escrow: Standard + Multi-sig available
  • FE Policy: Strictly prohibited for all vendors

12 Core Security & User Features

A comprehensive breakdown of the features that make WeTheNorth one of the most trusted darknet marketplaces in operation.

PGP encryption envelope icon

PGP Message Encryption

All buyer-vendor communications are encrypted with PGP (Pretty Good Privacy). The market provides in-browser PGP tools, but using your own local keypair is always recommended for maximum security.

Two-factor authentication phone icon

Two-Factor Authentication (2FA)

TOTP-based 2FA is available for all accounts. The market supports Google Authenticator, Aegis, and KeePassXC. Enabling 2FA significantly reduces account hijacking risk even if your password is compromised.

No finalize early policy icon

Strict No-FE Policy

WeTheNorth Market enforces a platform-wide prohibition on finalize early (FE) requests. Any vendor asking buyers to FE can be reported, with their account subject to immediate suspension and bond forfeiture.

Anonymous registration silhouette icon

Anonymous Registration

No email address or personal information is required to register. Account creation requires only a username, password, and a 6-word mnemonic recovery phrase. The entire process occurs within the Tor network.

Multi-signature escrow locks icon

Multi-Signature Escrow

For high-value transactions, the market supports 2-of-3 multi-signature Bitcoin escrow. This requires agreement from both parties and the platform before funds are released, eliminating exit-scam risk.

Tor network onion icon

Tor-Only Access

There is no clearnet version of WeTheNorth. The platform is accessible exclusively via its v3 .onion address, ensuring all traffic is routed through the Tor network and that both user and server IPs remain hidden.

Dispute resolution gavel icon

Structured Dispute Resolution

A dedicated moderation team handles buyer-vendor disputes. After initiating a dispute, both parties present their case within a defined window. The moderator reviews evidence and issues a binding decision.

Vendor bonds safe with coins icon

Vendor Bond System

Prospective vendors must deposit a refundable bond before they can list products. This financial barrier filters out low-commitment or fraudulent vendors, maintaining a higher average quality across listings.

Stealth shipping package icon

Stealth Shipping Indicators

Vendor profiles include explicit stealth shipping ratings from verified buyers. The community-driven rating system helps users identify vendors with strong track records for discreet, secure packaging.

No JavaScript required icon

JavaScript-Free Operation

The platform is fully functional with JavaScript disabled — the only secure configuration for browsing .onion sites. This design decision eliminates an entire category of browser exploitation vectors.

Canadian maple leaf marketplace icon

Canadian Market Focus

WeTheNorth was built with the Canadian darknet community in mind. The majority of active vendors operate domestically, offering significantly faster shipping times and more reliable stealth packaging for Canadian buyers.

Anti-phishing protection hook shield icon

Anti-Phishing Protections

The market publishes PGP-signed URL verification messages regularly. Users are encouraged to verify the current WeTheNorth Url against the market's official public PGP key before each session.

WeTheNorth vs Other Darknet Markets

Understanding how WeTheNorth Market compares to competing platforms helps contextualize its security model and user protections. Based on community research and open-source reporting:

Feature WeTheNorth Typical Market A Typical Market B
No-FE Enforced ✓ Yes ✗ Optional ✗ No
Multi-Sig Escrow ✓ Yes ✗ No ~ Partial
Monero (XMR) Support ✓ Yes ✓ Yes ✗ BTC only
Vendor Bond Required ✓ Yes ✓ Yes ✗ No
JS-Free Operation ✓ Yes ✗ Required ~ Optional

How the Escrow System Works

Understanding the WeTheNorth escrow system is critical for all users. Here is the step-by-step flow of a standard transaction:

  1. Buyer places order: Buyer selects a listing and places an order. The exact cryptocurrency amount is displayed.
  2. Buyer sends funds: The buyer sends BTC or XMR to the escrow wallet address generated by the platform.
  3. Vendor confirms and ships: Once the escrow wallet receives the correct amount, the vendor is notified and processes the shipment.
  4. Tracking & delivery window: The vendor marks the order as shipped. A dispute window begins — typically the expected delivery timeframe plus 3–5 days.
  5. Buyer finalizes: After receiving the package, the buyer marks the order as received, releasing funds from escrow to the vendor.
  6. Auto-release: If the buyer does not finalize or dispute within the window, funds are automatically released to the vendor after the defined period.
  7. Dispute option: If there is an issue, the buyer can open a dispute before the auto-release deadline, freezing funds until a moderator resolves the case.

How to Register on WeTheNorth Market

Registration on WeTheNorth requires only a few steps, all performed within the Tor Browser:

  1. Download and install Tor Browser from torproject.org (the only official source)
  2. Navigate to the verified WeTheNorth Url — always confirm via PGP before visiting
  3. Click "Register" and choose a unique username. Do not reuse any clearnet username
  4. Set a strong, unique password (20+ characters, randomly generated)
  5. Save your 6-word mnemonic recovery phrase offline in a secure location
  6. Enable 2FA immediately after first login via Account Settings → Security
  7. Upload your PGP public key to enable encrypted communications with vendors

Access the Verified WeTheNorth URL

The only way to safely access WeTheNorth Market is through the PGP-verified .onion link. Visit our Access page for the verified link and PGP signature check instructions.

WeTheNorth Market — Security Architecture Summary

The WeTheNorth Darknet platform's security posture rests on several interdependent layers. At the network level, v3 onion services provide 256-bit end-to-end encryption and prevent exit-node attacks. At the application level, PGP encryption, 2FA, and JavaScript-free design eliminate the most common attack vectors against market users.

At the transaction level, the multi-signature escrow and strict no-FE policy protect buyers financially. The vendor bond system creates accountability on the supply side. Combined, these layers provide a more defensible security architecture than most competing platforms.

However, no platform architecture can compensate for poor OPSEC on the user's end. Read our comprehensive OPSEC guide to understand how to protect yourself beyond the platform's built-in protections.

Ready to Access WeTheNorth Market?

Get the PGP-verified .onion address, check market statistics, and follow the step-by-step anonymous access guide.

Get Verified Access Link →