[ FAQ ] USER GUIDE
Frequently Asked Questions
Collected answers on how to connect to Nexus, verify PGP, use Monero, and maintain privacy through advanced OpSec. Updated and validated by the Nexus Hub team at nexusprivate.net.
Nexus is a darknet market operating on Tor network that implements PGP verified user auth and multi‑sig transactions.
Use Tor Browser within Tails or Whonix. Verify you’re using legit onion mirrors from Links.
Official onion URLs are listed and signed at nexusprivate.net/links.html with PGP fingerprint validation.
Compare mirror PGP keys with the master fingerprint to avoid spoofed services.
Use GnuPG commands on Linux (`gpg --full-generate-key`) and store private key offline on encrypted media.
Monero ensures financial obfuscation; no public transaction tracking is possible like with BTC.
VPN over Tor adds another layer, useful in restricted regions but requires trust in the VPN provider.
OpSec — Operational Security — your discipline to avoid metadata leaks and correlation of online identities.
No KYC exists; communication and transactions are PGP encrypted, Tor hidden services mask IP addresses.
Yes, phishing clones exist. Always verify URLs and signatures on nexusprivate.net.
System scripts ping and PGP‑check mirrors every 12 hours. Inactive nodes auto‑expire from the list.
Yes, through Orbot + Onion Browser on Android, but desktop is more secure.
Use backup nodes listed on the Links page. Ping‑scripts maintain availability status daily.
Send PGP‑signed message to security@nexusprivate.net only. Unsigned emails are ignored.
Visit Nexus Wiki — technical manuals, terms and network architecture details are documented there.