Mirror optimization
Primary endpoints stable, rotation improved phishing protection.
Access Nexus only via Tor, trade through crypto escrow and keep all communication under PGP — no emails, no profiles, no clearnet footprint.
Clearnet registration is disabled. All links must be verified against PGP‑signed notices inside Nexus.
Tor-only marketplace engineered for escrow-secured anonymous trading with a focused, minimal interface.
Nexus treats security as a baseline constraint, not a feature. All critical paths — signup, login, messaging, order creation and dispute handling — are designed around encryption and isolation. Vendors are screened on operational history, PGP discipline and dispute ratios before they can list anything.
Every order is locked into escrow until the buyer explicitly confirms delivery or a dispute is resolved. There are no direct payouts, no side channels, and no “trust me” flows. Escrow timing is tuned for darknet conditions, prioritizing predictable outcomes over speed.
Instead of legacy forum-style layouts, Nexus keeps navigation shallow: categories, search, listings, order. Each screen shows only the fields required to make a decision — price, vendor history, shipping, and risk signals — without distracting banners or noise.
Every transaction layer isolated and hardened against attack vectors and operational failure.
Nexus operates exclusively as a Tor v3 onion service with multiple hardened endpoints. Primary mirrors rotate automatically to counter DDoS attacks and service disruption. All traffic paths are validated against PGP-signed endpoint lists published inside the marketplace. Clearnet proxies and VPNs explicitly blocked.
Funds lock into platform-controlled multisig escrow immediately upon order creation. Release requires buyer confirmation or admin arbitration after dispute window. No vendor-side withdrawals possible until fulfillment proof uploaded and verified. High-value orders (> $5000) require additional PGP-signed delivery confirmation.
Vendor onboarding requires PGP key verification, minimum 90-day operational history on other markets, and zero unresolved disputes. Active vendors maintain 95%+ fulfillment rate measured across last 100 orders. Suspicious activity triggers automatic listing suspension pending manual review.
Infrastructure undergoes weekly security audits including dependency scanning, container vulnerability checks, and traffic pattern analysis. Code deployments require multi-signature PGP approval from core team. All logs are encrypted at rest and purged after 24 hours. Attack surface minimized through container isolation and zero-trust networking.
Safely access the Nexus marketplace through Tor — here's how clearnet and darknet differ.
Your ISP sees every site you visit and can log your connection to Nexus
Three-node onion routing hides your IP from Nexus and exit nodes
Browsers leak screen size, fonts, plugins — easily correlated to identity
Resists fingerprinting, blocks trackers, enforces no-script by default
Websites detect timezone, language, geolocation via WebRTC leaks
Your traffic blends with millions of Tor users worldwide
Email, phone, cookies link your Nexus activity to clearnet identity
Nexus onion link only reachable through Tor, no cross-site tracking
Official Tor Project site. Always verify the PGP signature after download.
Always verify these links against PGP-signed announcements inside Nexus marketplace.
Rotate automatically during DDoS attacks. All mirrors PGP-signed and published inside Nexus.
Platform announcements and security notices.
Primary endpoints stable, rotation improved phishing protection.
New vendors must verify PGP before listing active.
Dynamic release based on order size and vendor rating.
Before using the Nexus marketplace, understand how access, mirrors, links and OPSEC are handled.
Always use the official Nexus marketplace onion link from inside the market itself. Verify each mirror against a PGP-signed notice, and avoid random “onion link lists” that are not confirmed by Nexus. Access only via Tor Browser downloaded from torproject.org.
A mirror is considered valid only if the onion link appears in the official mirrors section inside the Nexus marketplace and is covered by a PGP-signed announcement. Any onion that cannot be matched to that signed list should be treated as phishing.
PGP is mandatory for all vendors and strongly recommended for buyers. The Nexus marketplace is designed around encrypted messages only: disputes, order updates and sensitive data must be exchanged as PGP blocks, never in plain text.
If a vendor stops responding, the order remains locked in escrow while Nexus dispute rules are applied. Exit-scam scenarios are mitigated by holding funds until a decision is reached based on history, messages and delivery proofs stored inside the marketplace.
Reusing a single PGP key or login identity across multiple markets makes correlation easier. For the Nexus marketplace, treat your account, keys and onion bookmarks as single‑purpose and never share them with other platforms.
No, Nexus is exposed only as a Tor v3 onion service. There is no clearnet domain or HTTP proxy. Any so‑called “direct link” to Nexus outside Tor is either a scam or a traffic collection trap.
Bookmark the current primary onion link inside Tor Browser and periodically confirm it against the mirrors page inside the Nexus marketplace. Do not store critical links or PGP keys in cloud notes, synced browsers or clearnet password managers.