Security architecture

DRUGHUB Privacy Stack

Every layer of the DRUGHUB infrastructure is designed to eliminate metadata leakage, protect user identity and ensure no single component can compromise your privacy.

Privacy guarantees

Key metrics that define DRUGHUB's security posture and commitment to zero-knowledge operations.

100%
Tor v3 only
No clearnet endpoints, HTTP gateways or browser shortcuts
100%
PGP required
No passwords, no password databases, no credential stuffing risk
0
Data retention
Messages auto-delete after escrow, no IP logs, no behavioral profiles
100%
Crypto escrow
Multi‑signature holds protect buyer and seller until delivery confirmed

Architecture layers

DRUGHUB eliminates single points of failure through layered isolation and strict access controls.

Network isolation

Tor‑only endpoints prevent ISP correlation. v3 onion services with hardened rotation.

Entry → Middle → Exit

PGP‑only auth

Challenge‑response PGP eliminates credential storage. Fingerprint verification required.

No passwords stored

Ephemeral storage

Messages self‑destruct post‑escrow. No IP addresses, timestamps or behavioral logs retained.

Zero long‑term retention

Crypto multisig

Funds held in 2‑of‑3 multisig. Buyer, seller and arbitrator cannot act unilaterally.

Unilaterally unspendable

End‑to‑end encryption

All vendor/customer communication PGP‑encrypted. Platform cannot read messages.

Platform‑blind comms

Threat model

What DRUGHUB protects against and how each attack vector is neutralised by design.

ISP monitoring
Tor onion routing
✓ Protected
Phishing clones
PGP fingerprint verification
✓ Protected
Database breach
No credential storage
✓ Protected
Traffic analysis
Circuit padding + timing obfuscation
✓ Protected
Vendor exit scam
Multisig escrow
✓ Protected
Platform compromise
Sharded architecture
✓ Protected

PGP verification

Always verify DRUGHUB PGP fingerprint before trusting login challenges or communications.

Official DRUGHUB PGP fingerprint
ABCD 1234 EF56 7890 ABCD 1234 EF56 7890 ABCD 1234
1. Import key
2. Verify fingerprint
3. Trust login challenge