1. Verify the Exact .onion Address
Before entering any credentials, compare the full .onion URL in your Tor Browser address bar character-by-character against the verified URL from this page's access page. Even a single character difference indicates a different site. Bookmark verified addresses from a known-good source — do not rely on memory.
2. Check the PGP Signature
The strongest verification method. Any legitimate announcement from a marketplace, including link updates, must be signed with the market's official PGP key. The process:
- Download or copy the official PGP public key from a trusted source (our enter page)
- Import the key into your GPG keyring:
gpg --import market_key.asc
- Verify any signed message:
gpg --verify message.txt.asc
- Confirm the fingerprint matches exactly before trusting the content
3. Look for HTTPS Errors
Tor Browser does not show traditional SSL certificates for .onion sites, but watch for unusual security warnings or certificate prompts that you haven't seen on previous visits. These can indicate a MITM (man-in-the-middle) setup.
4. Cross-Check Deposit Addresses
On any marketplace, always verify that the deposit address shown in your account was generated by the platform — not replaced by an attacker's address. On phishing sites, all deposit addresses belong to the attacker. If the address looks different from previous deposits or doesn't match the pattern, do not send funds.
5. Check for JavaScript Requirements
Legitimate darknet marketplaces function fully with JavaScript disabled (Tor Browser "Safest" setting). If a site requires JavaScript to function, displays blank pages with JS disabled, or prompts you to enable JS, treat it as highly suspicious.
6. Review the SSL Padlock (where applicable)
For any clearnet sites claiming to list darknet resources, verify HTTPS certificates. A site without HTTPS claiming to list verified .onion links is itself suspicious and may serve malicious content.