Device hygiene
Never mix Nexus activity with everyday computing on the same device. Browser history, DNS cache, autocomplete data, and thumbnail caches all persist in ways most users don't account for. If you use a shared or multi-purpose computer, use Tails OS from a USB stick every time — it starts clean and leaves nothing.
Whonix is an alternative for users who want a persistent setup — it routes all traffic through Tor via a dedicated gateway VM. Nothing leaves the Whonix gateway without going through Tor. Good for users who need persistence; Tails is better for users who prioritize amnesia.
Address and identity compartmentalization
Generate a fresh delivery address profile for each vendor relationship. Do not reuse shipping details across vendors — cross-vendor profiling is one of the more effective investigative techniques, and it only works if you use the same address. Nexus supports encrypted address storage; your address is encrypted with the vendor's PGP key before storage, so Nexus staff cannot read it.
The pseudonym you chose in step 5 should never appear in any clearnet context. Not Reddit, not forums, not email. One cross-reference between a Nexus handle and a clearnet identity is all an investigator needs to build a full dossier. The EFF's anonymity guides cover this in useful depth.
When to rotate your Tor circuit
Rotate your Tor circuit (Ctrl+Shift+L in Tor Browser) if you experience repeated timeouts on a single mirror. Do not interpret a connection failure as a platform outage until you've tried a fresh circuit. Tor circuits can become slow or broken independently of the destination service. If all four Nexus mirrors time out on fresh circuits, check the Nexus Dread subdread for maintenance announcements before looking for alternative link sources.
Managing your PGP private key long-term
Your Nexus PGP private key is your identity. Keep it on an encrypted volume — VeraCrypt with a strong passphrase works. Back up the encrypted volume to a second physical storage medium kept in a separate location. If you lose the private key and have no backup, your Nexus account is permanently inaccessible. If someone else gets the private key plus the passphrase, they have full access to your account.
Most failures happen not at the technical layer but at the operational one. The tool is secure. The habit is where it breaks.
Reading the security landscape in 2026
Darknet market security in 2026 is meaningfully different from 2020. Chain analysis capabilities have improved significantly — particularly for Bitcoin. Monero remains resistant but requires proper handling (two-hop withdrawal, not direct-from-exchange). Browser fingerprinting techniques have advanced; Tor Browser's defenses have kept pace but require Safest mode to be effective.
Privacy Guides maintains current, well-researched tooling recommendations. The EFF Deeplinks blog covers enforcement actions and their technical implications as they happen. Both are worth bookmarking separately from Nexus itself.