Skip to content
VORTEXportal Copy link
// cb42 · verified node · 2026-04-22

Vortex market
verified .onion links
for 2026

A growing privacy network marketplace launched October 2023 with a built-in crypto exchange, 14-day multisig escrow, and USDT (TRC20) support. Three mirrors. Zero guesswork. This page is the reference.

Loading...
  • Verified links
  • Updated daily
  • 62,299 users
  • PGP-secured
62,299registered users
2,639approved vendors
17,297active listings
97.1%uptime
// testimonials · verified voices

What users say after using this directory

Three short quotes, collected on Dread and Reddit throughout March 2026. No cherry-picked superlatives — just what people actually write when they find a working mirror.

"Three mirrors on one page. The primary was down, second one loaded instantly. Address matched the Dread PGP post character by character."

m_ridge42 Dread · March 2026

"Found Vortex here after two phishing clones tried to trick me. The built-in exchange works exactly as advertised. Converted BTC to XMR without touching an external service."

quiet_anon Reddit /r/onions · March 2026

"USDT on TRC20 is why I stick with Vortex. Escrow timeout gave me peace of mind on a first order. Directory checked out — verification timestamp was from the same day."

rail_09 Dread · February 2026
// features · what sets vortex apart

Why Vortex is different from other markets

Two things make Vortex worth finding: the built-in cryptocurrency exchange (eliminating external conversion friction) and USDT support (the only major privacy network market offering stablecoin payments). Combined with multisig escrow and PGP, it targets users who want maximum payment flexibility.

Vortex marketplace interface screenshot
01 — core

Built-in cryptocurrency exchange

Vortex integrates the exchange directly: convert between XMR, BTC, and USDT at real-time rates within the same interface. This reduces friction and keeps every transaction flow entirely within Tor. No external services. No bridging across clearnet exchanges. Swap and spend on the same screen. A direct response to user feedback about bottlenecks in the early 2024 purchase flow, and now a defining reason to use the platform at all.

How the exchange works →
Vortex escrow protection system
02 — escrow

14-day multisig escrow

Standard 14-day 2-of-3 multisig. Buyer, vendor, and Vortex each hold one key. No unilateral fund release — even admins need two-party agreement to move escrow funds. Simple. Solid.

Vortex network infrastructure
03 — stablecoin

USDT (TRC20) support

Tether on TRON offers fast, low-fee stablecoin transactions. For buyers who want to dodge crypto price volatility during a 14-day escrow window, USDT removes that risk entirely. Rare outside major centralized exchanges.

Vortex encryption protection
04 — crypto

PGP 2048+ bit communications

PGP 2048+ bit for all vendor communications, AES-256 for sessions, ECDSA for digital signatures, SHA-256 for hashing. Standard-issue industrial cryptography — nothing experimental, nothing undocumented. Familiar primitives, correct implementation.

Vortex dispute resolution process
05 — FE

Finalize Early for major vendors

Buyers can release payment to trusted vendors before delivery. FE is available only to vendors who have accumulated sufficient positive feedback. The platform rewards proven sellers while keeping standard escrow as the default for new relationships. You pick the risk model per order.

Vortex safety and legal information
06 — identity

Purple & cyan — instantly recognizable

Deep purple, cyan, and terminal green. Orbitron and Exo 2 fonts. Vortex has a distinctive visual identity you can recognize on sight — and immediately distinguish from phishing copies. But the .onion address is the only thing you can fully trust. Verify every character before entering credentials on any mirror, every single time. Visual cues are a hint; the address is the proof.

See all verified mirrors →
// about · background & context

A short background on Vortex and why this directory exists

Vortex market opened its doors in October 2023 and grew into a top-ten privacy network marketplace within fifteen months. The timing was deliberate. Hydra had ceased operations in early 2022. Operators of AlphaBay and Wall Street Market were working through long court cases. International law enforcement collaboration had tightened. The ecosystem was nervous. Vortex arrived with a specific pitch: a cleaner interface, a built-in crypto exchange, support for USDT on the TRON network, and a 14-day multisig escrow that matched what experienced buyers already expected from proven platforms.

By March 2026 the platform reported 62,299 registered users, 2,639 approved vendors, and 17,297 active listings. Uptime landed at 97.1% across a rolling 90-day window. The numbers are modest compared to the largest competitors — but the growth direction has been steady, and the onboarding experience has fewer rough edges than platforms that launched before the built-in exchange became a standard expectation.

This page is not run by the Vortex team. It is a volunteer-maintained directory. We verify .onion addresses against PGP-signed announcements on Dread, we regenerate the sitemap daily, and we flag any mirror that fails validation. Phishing clones copy the purple-and-cyan brand almost perfectly; they count on users typing the address by hand. That is the specific problem this directory solves. Copy from here, paste into Tor, verify the interface matches, and move on with your day.

We do not rate vendors. We do not broker disputes. We do not claim to have insider knowledge about the platform operators. What we do, narrowly and consistently, is keep three working onion addresses reachable with fresh verification timestamps so the first thirty seconds of your Vortex session are not spent guessing which character in a 56-character address might be wrong. Done right, that is the entire value of an independent directory: remove a specific, common, avoidable failure mode.

// how-to · seven verified steps

How to access Vortex market safely

Read once. Do it once. This walkthrough covers Tor download, wallet setup for XMR or USDT, PGP key generation, and first-login verification. Every step has been tested against the current Vortex interface as of April 2026. Need the short version? Copy the link, paste into Tor, log in. Done.

  1. Tor Browser download and install
    01

    Download Tor Browser from the official source

    Go directly to torproject.org. Download the browser for your operating system. Verify the signature against the Tor Project public key before launching — the verification instructions are on the download page. Tor Browser is the only tool needed to reach .onion services. Do not use proxies, VPN-over-Tor hacks, or third-party Tor forks for a first visit. Get the build from source. Install. Launch. If you plan to use Tor on more than one device, repeat the download and signature check on each machine. Bookmarks and sessions do not sync; that is not a bug — it is exactly what you want when you are aiming for minimal persistent state across devices.

  2. Tor Browser configuration
    02

    Set security to the safest profile

    Click the shield icon in the toolbar, pick "Safest". That disables JavaScript site-wide, blocks certain fonts, and stops risky media content. Vortex works without JavaScript. The purchase flow, escrow status, and messaging all render server-side. You lose nothing by hardening the browser. You gain a smaller attack surface against browser exploits — and that matters when the address is an .onion. Leave the security slider on Safest permanently. Do not lower it for a single site. Do not install extensions. Do not change the default window size, because that reveals your screen resolution to sites that fingerprint visitors. Treat Tor Browser as a single-purpose tool, not a general-purpose browser.

  3. PGP key generation
    03

    Generate a PGP key before you register

    Install GnuPG or a friendlier front-end like Kleopatra. Generate a 4096-bit RSA key with a strong passphrase. Export the public key as ASCII-armored text. You will paste this into Vortex during registration. Keep the private key on an encrypted volume — VeraCrypt works — and never on cloud storage. Backup the passphrase somewhere physical, like KeePassXC kept on temporarily inaccessible media.

  4. Vortex login interface with PGP 2FA
    04

    Copy a verified link from this page

    Use the primary .onion above or one of the two mirrors listed below. Copy — never type. Phishing sites rely on mistyped characters and a nearly identical purple-and-cyan interface. If the character 4 is off by one slot, you land on a clone. The Copy button next to each link hands the exact string to your clipboard. Paste into Tor Browser. Press Enter.

  5. Anonymity best practices
    05

    Prepare a wallet for XMR, BTC, or USDT (TRC20)

    Install a Monero wallet like Cake Wallet or the official getmonero.org GUI. For Bitcoin, use a non-custodial wallet with control of private keys. For USDT, use a TRC20-compatible wallet like Trust Wallet or a Tron-aware hardware wallet. Load a small amount first. The built-in exchange handles conversions once you are logged in, but having a funded wallet in one supported currency is the starting line.

  6. Advanced Tor security setup
    06

    Register, verify, and authenticate via PGP

    On Vortex, create a username and passphrase — unique, not reused from any clearnet service. Paste your PGP public key in the field during sign-up. Enable PGP 2FA. On every subsequent login, Vortex will hand you an encrypted challenge string; decrypt it locally with your private key, paste the plaintext back, and you are in. This closes off password-only attacks entirely. If someone obtains your username and passphrase, they still can not log in without your private key.

  7. Tor access FAQ reference
    07

    Understand escrow before your first purchase

    Standard orders: 14-day escrow, automatic release to the vendor unless you file a dispute. FE vendors: check their feedback score and order count before using Finalize Early — you take on the risk. For first purchases, stick to standard escrow. Always. There is no urgency that justifies skipping protection. When in doubt, ask the vendor a question via PGP-encrypted message first. Response time alone tells you whether you are talking to a real operator or an idle scammer.

// opsec · threat-model primer

OPSEC for Vortex: a working threat model

Four layers. Each layer reduces a different category of risk. You do not need all four on day one. You do need to know what you are opting out of when you skip one. This section is not legal advice — read EFF for that — it is a plain-language map.

layer 01

Tor Browser, safest profile

This is the floor. If you are not using Tor, you are not on the privacy network. Download from torproject.org only. Verify the signature. Pick the Safest security level. Vortex renders without JavaScript, so there is no usability cost to hardening the browser. This single step closes off the majority of browser-based fingerprinting and drive-by exploitation.

layer 02

PGP 2FA and vendor messaging

Upload your PGP public key during Vortex registration. Enable PGP challenge-response 2FA. Every login becomes a challenge that only your private key can decrypt. Encrypt vendor messages end-to-end with PGP as well — the platform stores encrypted blobs, not plaintext. If anyone ever gains access to your account, they still cannot read the message history without your private key.

layer 03

Monero over Bitcoin whenever possible

Bitcoin is traceable. Chain analysis firms sell the lookups. Monero’s ring signatures, stealth addresses, and confidential amounts break the link between sender and receiver by design. Vortex’s built-in exchange makes the swap inside Tor. Start with BTC if that is what you have, convert on-platform, spend the XMR output. Use getmonero.org tooling for anything you hold outside the market.

layer 04

Live OS or compartmentalization

Run Tor Browser inside Tails from a USB drive, or run Whonix compartmentalization inside Qubes OS. Tails leaves no trace on disk after shutdown. Whonix forces every network call through Tor at the gateway level. Pick one based on how much friction you can tolerate. Both are free, both are audited, both are referenced in Privacy Guides recommendations.

Keep long-term secrets — PGP private key, Monero seed, wallet passphrases — off cloud storage. Use VeraCrypt for encrypted containers, KeePassXC for password management. For sensitive communications outside the platform, Signal and Proton Mail both support anonymous signup. If you share files with someone, OnionShare keeps the transfer inside Tor. When in doubt, bounce the question off DuckDuckGo and triangulate across three independent sources before acting. Alternative routing is also worth understanding — I2P and Briar solve different problems than Tor and are useful to know about even if you do not use them daily.

// faq · 9 quick answers

Need to know: Vortex quick answers

Nine of the questions we see most often on Dread and r/onions. Short answers. Direct. If you need the long version, follow through to the tutorial page.

What is Vortex Market?

Vortex is a privacy network marketplace launched in October 2023. Its defining feature is a built-in cryptocurrency exchange that lets users convert between XMR, BTC, and USDT directly within the platform. It uses 14-day multisig escrow and supports Finalize Early for major vendors. The platform has grown into the top 10 active markets by March 2026, with 62,299 registered users and 2,639 approved vendors.

How do I access Vortex?

Download Tor Browser from torproject.org. Copy one of the verified .onion links from this page. Paste into Tor Browser. Do not type the address — phishing sites rely on mistyped characters and look identical to the real Vortex interface. Once inside, sign up with a unique username, paste your PGP public key, and enable PGP two-factor authentication.

What cryptocurrencies does Vortex accept?

Vortex accepts Monero (XMR), Bitcoin (BTC), and USDT on the TRON network (TRC20). The built-in exchange lets you convert between these currencies without leaving the platform. Monero provides maximum privacy through ring signatures and stealth addresses. USDT offers price stability pegged to the US dollar. Bitcoin remains widely available but is more traceable — use Monero where possible.

What is the built-in exchange on Vortex?

Most privacy network marketplaces require users to handle currency conversion externally before purchasing. Vortex integrates the exchange directly: you can convert between XMR, BTC, and USDT at real-time rates within the same interface. This reduces friction and keeps transaction flows entirely within Tor. A direct response to early 2024 feedback about the clunky purchase flow, the exchange is now the reason many users pick Vortex over competitors.

Why does Vortex accept USDT?

USDT (TRC20) on the TRON network is a stablecoin pegged to the US dollar. For users who want to avoid cryptocurrency price volatility during the escrow period, USDT eliminates that risk entirely. Vortex is one of the few major marketplaces to offer this option — most rivals are XMR-only or BTC-only. Stablecoin support is the main practical difference between Vortex and older platforms.

How does Vortex escrow work?

Standard 14-day 2-of-3 multisig escrow. Buyer, vendor, and Vortex each hold one key. Two keys are required to release funds. If no dispute is filed within 14 days, funds release automatically to the vendor. Major vendors with verified track records can request Finalize Early (FE) status for customers who want instant release. A dispute keeps funds locked until arbitrators review the case.

What is Finalize Early (FE)?

FE allows buyers to release payment to vendors immediately, without waiting for delivery confirmation. It is available only to major vendors who have accumulated sufficient positive feedback. FE eliminates the escrow waiting period but transfers risk to the buyer — only use FE with vendors who have extensive verified reviews. For first orders, standard 14-day escrow is the default path. Do not be pressured into FE by a new vendor.

How many Vortex mirrors are there?

Vortex maintains 3 verified .onion addresses. All provide identical functionality. Use any mirror — they run the same platform. If one is slow or unreachable, switch to another. Mirrors are authenticated via PGP-signed announcements on Dread. The addresses on this page match those announcements exactly, and are re-verified whenever the sitemap is regenerated.

Is Vortex safe to use?

Vortex uses multisig escrow, PGP authentication, and end-to-end encryption — industry-standard security for established marketplaces. The built-in exchange keeps transactions within Tor. That said, accessing any privacy network marketplace carries legal risk in most jurisdictions. Pair Tor with Tails or Whonix if your threat model demands it. Review EFF and Privacy Guides for general OPSEC advice.

// stats · q1 2026 snapshot

Vortex by the numbers — March 2026

Figures compiled from platform-published dashboards cross-checked against Dread announcements throughout March 2026. Minor week-on-week drift is normal; the growth direction has been consistent since October 2023.

Metric Value Notes
Registered users62,299Cumulative since October 2023
Approved vendors2,639Vetted and feedback-verified
Active listings17,297Snapshot 2026-04-14
Uptime (90-day)97.1%Includes planned maintenance
Average rating4.7 / 5From 4,515 verified reviews
62,299 users
2,639 vendors
17,297 listings
97.1% uptime
// cta · final copy

Ready? Copy the verified Vortex link.

One click puts the full .onion address on your clipboard. Paste into Tor Browser. Verify the purple-and-cyan interface matches the Vortex brand. Sign in. That is the whole flow. Simple. Works.

Open Vortex in Tor

Need help? Read the full Vortex Beginner Tutorial or browse the Inside Vortex overview. Questions about mirrors land on Active Links.