// frequently.asked
Everything new and returning users ask
These are the questions that show up every week in community threads, encrypted mailing lists, and vendor chat. The answers here go deeper than one-liners. For step-by-step walkthroughs, see the access guide or the platform overview.
Vortex Market launched in October 2023, opening to all users by 2024. It appeared during a period when several long-running marketplaces had collapsed following law enforcement actions — including the takedown of Hydra, which had served the Russian-speaking segment for years. Vortex positioned itself as a platform for the next generation of buyers and vendors who wanted more payment flexibility than existing alternatives provided.
The defining feature is a built-in cryptocurrency exchange. Most marketplaces accept one or two currencies and expect you to handle conversion externally. Vortex integrates the conversion directly: swap XMR, BTC and USDT at live rates inside the same Tor session where you place your order. No external account, no additional KYC surface, no leaving the network.
As of April 2026, the platform reports 54,447 registered accounts, 4,536 approved vendors with PGP keys on file, and 13,158 active listings across all categories. Uptime over the rolling 30-day window sits at 97.7%. Those numbers come from platform announcements cross-checked by independent community observers on Dread. Read more about the platform architecture in the platform overview. For technical context on the cryptographic standards underlying any marketplace, the CryptoNote Protocol documentation is the authoritative starting point.
The sequence that works is short, but each step matters:
- Download Tor Browser directly from torproject.org and verify the installer signature before running it. Never use a search result — attackers buy top placements and ship tampered binaries.
- Set security level to Safest via the shield icon near the address bar. This disables JavaScript across all sites. Vortex's core flow works without it — and any mirror asking you to enable JS is a phishing page.
- Copy a verified .onion address from this directory or from the mirror registry. Paste it — never type. A 56-character base32 address has zero tolerance for typos.
- After pasting, check the first six and last six characters against the published address before pressing Enter.
For elevated threat models, run Tor inside Whonix (routes every packet through Tor at the gateway VM) or use a live Tails USB (leaves no persistent disk trace on reboot). Both approaches add real protection over running Tor Browser on your daily machine. The Privacy Guides site has current comparisons for different operating environments. Do not bookmark .onion addresses in a non-Tor browser — browser sync can leak the URL to a cloud service.
If the Vortex login page looks different from the design described in the overview — specifically the deep-purple background and cyan accents — close the tab immediately and check your address against the registry.
Vortex supports three currencies: Monero (XMR), Bitcoin (BTC), and USDT on the TRON network (TRC20). The built-in exchange handles conversion between all three at live rates, so you do not need to bring all three — start with whatever you already hold.
Monero is the privacy default. It uses ring signatures, stealth addresses, and confidential transactions to hide sender, receiver, and amount from chain observers. No address reuse issues, no output linking. The official Monero documentation explains the underlying model. XMR is what serious privacy-focused users fund their wallets with before depositing. The CryptoNote Protocol that Monero builds on has been formally analyzed since 2012.
Bitcoin offers wider liquidity and more wallet options, but the UTXO model is transparent. Every transaction is traceable on-chain unless you take additional steps — coin control, coinjoin, or converting to XMR before depositing. Do not fund a marketplace wallet directly from a KYC exchange and expect that to be private. Use an intermediate mixing step or route through Monero first.
USDT TRC20 is a stablecoin pegged to the US dollar on the TRON network. For buyers who want to hold a specific order value constant during the 14-day escrow period, it eliminates crypto volatility risk. A $200 order in BTC can swing 8% in a week. The same $200 in USDT stays $200. The Electronic Frontier Foundation has written extensively on financial privacy — understanding the tradeoffs between currencies is a key component of that broader picture.
The built-in exchange is Vortex's most distinct feature and the reason many users cite for choosing it over competing platforms. Currency conversion happens inside the platform interface without routing to any external service. You remain on the same .onion address, inside the same Tor session, with the same authenticated account.
Rates refresh every 90 seconds against live market data. The spread — the difference between what you pay and the theoretical mid-price — stays inside 0.4% during normal market hours. That is competitive with most clearnet spot exchanges and dramatically faster than finding an external peer-to-peer swap service, especially from inside Tor.
The practical workflow: deposit XMR. Open the exchange widget. Convert to BTC. Fund your order in BTC because that specific vendor does not accept XMR directly. Everything happens in one browser session. No second account, no second KYC exposure, no second phishing surface to navigate. The Monero documentation covers wallet setup if you need a starting point for the XMR side of the equation.
One caveat: exchange rates move. If you convert a large amount and then delay placing the order, the USDT or BTC value may shift. Convert close to the time of your order, not hours in advance. For USDT specifically, the peg is designed to be stable — but Tether Ltd, the issuer, retains centralized control. Use USDT for transactional value, not as a long-term store.
Standard orders use 14-day 2-of-3 multisig escrow. Three parties each hold one cryptographic key: you (the buyer), the vendor, and Vortex. To release funds, any two of the three keys must sign. That means Vortex cannot unilaterally drain your escrow funds, and neither can the vendor. Both require a second signature from someone else in the triad.
When you place an order, the funds lock in the escrow contract. On delivery, you click "release" and the vendor's key plus yours release the funds to the vendor's wallet. If you do not release and do not dispute within the 14-day window, funds auto-release to the vendor. The clock starts the moment the order status changes to "shipped."
If something goes wrong — item not arrived, significantly not as described, damaged — open a dispute before the 14-day window closes. The clock matters. A moderator will request evidence from both sides: order messages (decrypted), screenshots, any tracking information. Hold funds remain locked during moderator review. When a ruling comes, the two-of-three signature requirement still applies — the moderator's ruling determines which party Vortex signs with.
Keep decrypted copies of your entire order thread on local encrypted storage. Screenshots help. Some disputes turn on details that only appear in the original UI layout, and you may not be able to access the marketplace at the exact moment the moderator needs evidence. Document proactively, not reactively. The Briar messenger can be used for secure out-of-band communication with vendors if the dispute requires real-time coordination.
Finalize Early (FE) lets a buyer release payment to a vendor immediately, before delivery confirmation. No 14-day wait. No escrow hold. The vendor receives funds the moment you click finalize. For established vendor-buyer relationships where trust is well-documented, FE cuts friction significantly. For everyone else, it transfers the entire risk to the buyer.
FE status is not self-assigned. Vortex awards it only to vendors who have accumulated sufficient verified positive feedback — a track record long enough that the platform considers them lower-risk. The threshold is not public, but community consensus on Dread suggests the bar sits around 200 verified transactions with high ratings over an extended period.
When to consider FE: the vendor has 300+ reviews, the average is above 4.8, the most recent reviews are from the past 30 days, and there are no unresolved dispute flags in the visible feedback history. You have made at least one standard escrow order with this vendor previously and can verify consistency.
When to avoid FE: first order with any vendor. Any vendor with fewer than 100 reviews. Any vendor with a rating dip in the last 60 days. Any vendor who asks for FE directly — legitimate FE usage should be buyer-initiated, not vendor-pressured. New users should complete their first five purchases under standard escrow regardless of vendor credentials. The 14-day window is your protection — use it until you have enough data to make an informed choice.
The Vortex interface — deep purple background, cyan accent elements, Space Grotesk and Inter typography — is distinctive. Phishing sites copy it exactly, sometimes pixel-for-pixel. Visual verification is not sufficient. The only value that cannot be spoofed is the .onion address itself.
The verification process that actually works:
- Find Vortex's PGP-signed announcements on Dread forum or encrypted mailing lists. The signature is what makes the announcement unforgeable — anyone can post text claiming to be Vortex, but only the private key holder can produce a valid PGP signature.
- Import the Vortex public key and verify the signature on the announcement. GnuPG:
gpg --verify announcement.asc - Extract the .onion addresses from the verified announcement. These three addresses are the authoritative source.
- Compare them against the addresses in this registry character by character. The three addresses on this page match the PGP-signed announcement verified on 2026-04-22.
- After pasting into Tor Browser, verify the first six and last six characters before pressing Enter.
The Access Now digital security helpdesk has published guides on using PGP for verification in high-risk contexts. The Electronic Frontier Foundation's Surveillance Self-Defense project covers the fundamentals of key verification that apply directly to this workflow.
Never get Vortex links from Telegram, Reddit, or random forum posts without PGP verification. The signal-to-noise ratio in those channels is close to zero and phishing links are the majority.
PGP is not just supported on Vortex — it is used for two distinct security functions. First, vendor communication encryption: every message that contains an address, a tracking number, or sensitive order details should be PGP-encrypted with the vendor's public key. If the platform's message database is ever compromised, an attacker sees ciphertext. Second, two-factor authentication: during login, Vortex encrypts a one-time code with your public key. Only your private key can decrypt it. No private key means no login, even if your password is exposed.
Setup before registration:
- Generate a fresh keypair using GnuPG on Linux (
gpg --full-generate-key) or Kleopatra on Windows. Choose RSA 4096-bit or Ed25519. Do not reuse a key from another context. - Pick a key user-id with no connection to your real identity. Do not embed your email address unless it is also a pseudonymous account.
- Back up the private key to an encrypted temporarily inaccessible container or air-gapped USB. Losing it means losing access to your message history and possibly your account.
- During Vortex registration, paste the ASCII-armored public key into the designated field.
- Enable PGP 2FA in account settings. Test it by logging out and logging back in before placing any order.
Use Proton Mail's built-in key manager if you want a GUI-friendly starting point. For vendor messages, decrypt everything locally with GnuPG rather than relying solely on the platform's built-in decryption — local decryption reduces your exposure to any platform-side vulnerabilities. The OpenSSL documentation covers the cryptographic primitives underlying PGP for anyone who wants to understand the math rather than just follow steps.
OPSEC is not a one-time configuration. It is a set of habits you repeat every session. The biggest risk is not the platform's security — it is predictable personal patterns that create attribution opportunities over time.
The baseline that applies to every user:
- Dedicated access device. Run Vortex sessions from a machine or partition that has never touched your clearnet identity. Tails USB is the simplest option — it leaves no persistent storage on the host after reboot. Whonix provides stronger isolation for users who need persistence.
- No identity reuse. Generate a unique username for this platform. A pseudonym used across three marketplaces links all three profiles to anyone watching correlation patterns.
- Separate wallet. Keep the wallet you fund Vortex orders from completely separate from any wallet connected to a KYC exchange. Convert to XMR and route through at least one intermediate hop before depositing. Never send directly from a Coinbase or Kraken withdrawal.
- Air-gapped private keys. The machine that signs wallet transactions should not have persistent internet access. OnionShare documentation covers secure file transfer patterns if you need to move unsigned transactions between airgapped and networked machines.
- Rotate Tor circuits. Different entry node, different time of day, different physical network location where possible. Traffic pattern analysis depends on behavioral consistency. Make yourself unpredictable.
For users with elevated threat models, add Mullvad as an outer VPN layer before Tor. Mullvad does not log and accepts cash payments — it does not add KYC exposure. The combination of VPN → Tor reduces the ability of ISP-level observers to see that you are connecting to the Tor network at all. Element or Briar can replace vendor chat for sensitive communications that need to stay off the platform entirely.
The physical delivery layer is where most attribution happens, not the digital one. Use a pseudonym at an address you control but that is not your primary residence. Never use your full legal name or home address for any darknet delivery.
// security.pgp · encrypted communications layer
// escrow.multisig · 14-day 2-of-3 protection active
// related.documentation
Go deeper on specific topics
The FAQ covers the fundamentals. For step-by-step walkthroughs, verified links, and full platform context, these pages go further.
// guide
Full access guide
Eight-step Tor setup with wallet configuration, PGP generation, registration walkthrough, and first-order escrow guidance.
// mirrors
Mirror registry
All three verified Vortex .onion addresses with latency data, PGP verification status, and last-confirmed dates.
// platform
Platform overview
Vortex architecture, built-in exchange mechanics, escrow system, vendor tiers, and full market statistics in one place.
// external
Privacy Guides
Independently maintained OPSEC recommendations for browsers, operating systems, VPNs, and communication tools.
// external
Tor Project
Official Tor Browser downloads with verified signatures. The only source that guarantees an untampered binary.
// external
Monero documentation
Official XMR wallet setup, ring signature primer, and node configuration for users who want to understand the privacy model.
Ready to connect? Get the verified address.
Three mirrors live. Multisig escrow by default. Copy, paste into Tor, verify the first and last six characters.