Technical Knowledge Base

This database serves as a comprehensive archive of technical specifications, operational logic, and security protocols utilized by the DrugHub Market infrastructure. The data below is aggregated from network analysis and public PGP documentation.

LAST UPDATED: 2025-05-12 DOC VERSION: v2.4.1 STATUS: VERIFIED

Network Architecture & Access

DrugHub operates exclusively as a Tor hidden service (v3 onion). Traffic is routed through three random nodes (Guard, Middle, Exit) within the Tor network, encrypting the data at each step. This architecture ensures that the server's physical location and the user's IP address remain concealed from each other.
The verified mirror system is a distributed hosting strategy designed to mitigate Distributed Denial of Service (DDoS) attacks. By spreading traffic across multiple .onion addresses that point to the same backend database, the market maintains availability even if specific nodes are targeted.
Connectivity issues in Tor hidden services are often caused by network congestion, circuit rotation latency, or active DDoS mitigation filters. Users observing timeout errors are typically advised by the protocol documentation to refresh their Tor circuit or attempt an alternative verified mirror.
Accessing DrugHub's .onion infrastructure requires the Tor Browser configured with the 'Safest' security setting. JavaScript is often disabled by default on the client side to prevent de-anonymization exploits, though the market's frontend is built to function with minimal script requirements.

Security Protocols & PGP

The Passwordless PGP Login replaces traditional credentials with cryptographic challenge-response authentication. The server generates a random string encrypted with the user's public PGP key. The user must decrypt this string using their private key and return the token to prove identity, eliminating the risk of password interception.
Two-Factor Authentication (2FA) via PGP adds a secondary layer to the login process. Even if a password is valid, the system requires the decryption of a unique code. This prevents account takeover via phishing or database leaks, as the attacker would need the user's local private key.
A Warrant Canary is a cryptographically signed message published periodically (usually every 14 days) by the market administrators. It certifies that the platform has not been compromised or served with a secret government warrant. If the canary expires or is missing, it serves as a warning to the user base.

Transactions & Cryptocurrency

Research indicates DrugHub enforces an 'XMR Only' or 'XMR Preferred' policy due to Monero's inherent privacy features, such as Ring Signatures, RingCT, and Stealth Addresses. Unlike Bitcoin, which has a transparent public ledger, Monero transactions obfuscate sender, receiver, and amount, rendering blockchain analysis ineffective.
Yes, the infrastructure supports 2-of-3 multisignature transactions for Bitcoin (where applicable). This requires signatures from two of the three parties (Buyer, Seller, Market) to release funds, preventing any single entity from seizing assets unilaterally.
Statistical analysis of market listings suggests a standard escrow window of 7 to 14 days, depending on the product category (digital vs. physical). Funds are held in a multisig wallet controlled by the market logic until the buyer confirms receipt or the timer expires (Auto-Finalize).

Market Infrastructure

Upon account creation, the DrugHub architecture generates a unique mnemonic seed phrase. This phrase is the only cryptographic method to reset a lost PGP key or recover account access. The system does not store backups, making the user solely responsible for seed retention.
When a transaction is disputed, the escrowed funds are frozen. A moderator reviews the transaction history, chat logs, and cryptographic proof of delivery/non-delivery. The moderator then signs the transaction to release funds to either the buyer or the vendor based on the evidence provided.