Knowledge Base
V2.4This document outlines the operational security protocols, financial mechanisms, and user policies of DrugHub Market. Review this information thoroughly to ensure proper OpSec integration and platform usage. For issues not covered here, utilize the PGP-signed support ticket system.
Platform Infrastructure
DrugHub is a decentralized, privacy-focused marketplace operating exclusively on the Tor network. Our infrastructure is built to eliminate single points of failure and prioritize user anonymity.
We employ a strict Monero-only payment rail to ensure financial privacy and a passwordless authentication system to mitigate credential harvesting. Our goal is to provide a utilitarian, high-security environment for peer-to-peer commerce without the tracking vectors present in legacy web systems.
Verification is critical for security. Always cross-reference the .onion URL you are accessing with the signed list available on our main landing page or trusted directories (e.g., Dread). We cryptographically sign all mirror lists with the DrugHub PGP key (Fingerprint: 8A4F 2B9C...).
Note: Never input private keys or sensitive data on a URL that has not been verified against our public key signature.
Cryptography & Authentication
We have deprecated static passwords to eliminate credential theft vectors. Authentication utilizes a Challenge-Response protocol:
- User initiates login with Username.
- Server generates a random alphanumeric token.
- Server encrypts this token with the User's stored Public PGP Key.
- User decrypts the message locally using their Private PGP Key.
- User submits the plaintext token to the server to authorize the session.
This ensures that account access is mathematically impossible without possession of the private key.
Monero & Multisig Escrow
We utilize a standard 2-of-3 Multi-Signature Escrow architecture. Upon order creation, funds are moved to a multisig address controlled by three keys:
- Key A: Buyer
- Key B: Vendor
- Key C: Market Administrator
To release funds, 2 signatures are required. In a successful trade, Key A + Key B sign. In a dispute, Key C reviews evidence and signs with the prevailing party. This prevents unilateral theft by any single participant.