Privacy Policy
Torzon is designed to minimize data, avoid identifiers, and keep your activity unlinkable. This page explains what is and is not collected when you use the marketplace.
1. Core Privacy Principles
Torzon is built as a privacy-first darknet marketplace. The platform is engineered to operate with as little data about you as technically possible.
There is no clearnet access, no traditional password login, and no requirement to share real-world identity. Access is restricted to Tor, and sensitive operations are protected with PGP and Monero by default.
This document describes privacy practices in simple terms. It is not a legal contract but a transparent overview of how Torzon handles (and avoids) data about your activity.
2. What Torzon Does Not Collect
The safest data is the data that never exists. Many categories of information are intentionally never stored or requested.
- No real-world identity fields such as legal name, phone number, email address or government-issued IDs are required to use Torzon.
- No direct IP logging: all access is expected via Tor v3 onion services. Clearnet IPs are not part of the normal threat model.
- No tracking pixels, ad beacons or third‑party analytics tools are embedded into the marketplace pages.
- No precise geo‑location, device fingerprint or long‑term browser identifiers are intentionally collected.
3. Technical Data That May Be Processed
Some minimal technical information is required to keep the marketplace stable, prevent abuse, and resolve disputes.
To maintain performance and security, Torzon may temporarily process non-identifying technical data such as request timestamps, error codes, onion endpoint usage, and basic rate-limiting counters. These values are used to detect abuse, DDoS attempts and malfunctioning services.
Where possible, such data is stored in aggregate or short‑lived form, without strong links to individual user identities. Long-term profiling of specific users is not an intended design goal of the platform.
4. Accounts, PGP and Messages
Accounts on Torzon are designed around PGP keys and pseudonyms instead of real-world profiles.
User accounts are identified by pseudonymous handles and cryptographic keys. PGP is used both for authentication and for encrypting sensitive content such as messages, order notes, and support tickets, when users choose to do so.
Plaintext content that you submit (for example, messages without PGP encryption) can be read by the marketplace software. For maximum privacy, you are strongly encouraged to use PGP for all important communications, especially anything that could identify you or your counterparties.
5. Payments and Monero Privacy
Torzon is built around Monero to reduce traceability of financial activity.
When you deposit or spend funds, Monero’s privacy features — ring signatures, stealth addresses and confidential transactions — help keep payment flows unlinkable on the public blockchain. The marketplace does not see your real‑world identity behind the wallet you control.
Internal balances, order amounts and escrow states are tracked within the platform to resolve disputes and finalize trades. These values are stored in a way that is necessary for correct accounting but are not intended to be tied to real‑world individuals.
6. Logging and Retention
Logs exist primarily to keep the service running and to react to security incidents, not to profile users.
Technical logs may contain short‑term information about requests, errors, performance metrics and security-related events. These entries are used for debugging, intrusion detection and service reliability.
Retention periods are kept as short as operationally possible. Old diagnostic data and obsolete logs are periodically pruned or rotated, especially when they are no longer needed for security or dispute resolution.
7. Vendors and Additional Data
Vendors may voluntarily share more information in their profiles or listings. This is their responsibility.
Vendors can control how much information they expose in listings, descriptions and profile pages. Torzon does not require real‑world identification for vendor profiles, but vendors are responsible for the text, images and metadata they choose to publish.
Buyers should treat any information shared by vendors as third‑party content. Torzon cannot guarantee that vendors follow best privacy practices outside of the platform (for example, in external communication channels).
8. Data Security Measures
Internal access to marketplace systems is tightly restricted and monitored to reduce insider and external risks.
System components are segmented, internal interfaces are minimized, and administrative actions are limited to a small set of operators. Hardened configurations, regular security reviews and defense‑in‑depth mechanisms are used to reduce the impact of potential compromise.
Even with these protections, no system can be considered invulnerable. This is why Torzon’s design relies heavily on PGP encryption and Monero privacy, so that sensitive information remains protected even if infrastructure is attacked.
9. Your OPSEC Responsibilities
Strong platform privacy does not replace basic operational security on the user side.
Use Tor Browser, a VPN you trust, and dedicated devices or clean environments. Avoid reusing usernames, PGP keys, or wallet addresses across unrelated platforms. Never disclose real‑world identity, phone numbers, emails or social media links in messages or order notes.
Torzon cannot protect you from mistakes made outside of the platform, such as logging into personal accounts in the same browser session, reusing passwords elsewhere, or sharing sensitive data over insecure channels.
10. Changes to This Policy
Privacy practices may evolve as the platform and threat landscape change.
This policy may be updated to reflect new security measures, protocol changes, or adjustments to logging and retention practices. When significant changes are introduced, a notice can be posted in the news or updates section of the marketplace.
Continued use of Torzon after policy updates means that you understand the revised practices. You are encouraged to review this page from time to time, especially after major platform announcements.