What makes a Vortex link legitimate?
Not every .onion address claiming to be Vortex is Vortex. Phishing clones — some active since late 2024 — reproduce the purple and cyan interface in full, right down to the login form and the built-in exchange UI. The site looks identical. The address doesn't.
Vortex's visual identity can be copied in a few hours by anyone with basic web skills. The cryptographic signature behind a canonical link announcement cannot. That's the dividing line between a real mirror and a credential-stealing clone.
The PGP announcement system
Vortex publishes new or updated .onion addresses exclusively through PGP-signed announcements. Each is signed with Vortex's master PGP key, which has been published and cross-referenced across multiple darknet community threads since the platform launched in October 2023.
When Vortex rotates or adds a mirror address, the operators create a plain-text file containing the new addresses, sign it with their private PGP key, and post the resulting .asc file to their official announcement thread on Dread. Anyone holding Vortex's public PGP key can verify the signature in under 30 seconds.
Phishing operations cannot replicate this. They don't hold the private key. Any .onion address not backed by a valid Vortex PGP signature should be treated as unverified — regardless of what the site looks like once you connect.
The addresses on this page match the current PGP-verified canonical announcement. See the three-step verification process below to confirm this yourself.
Checking against Dread forum
Dread hosts Vortex's official subforum. This is where the development team communicates with the community, posts maintenance notices, and responds to reports of phishing or downtime. It's the closest thing Vortex has to a public-facing support channel.
To find the official thread: access Dread via Tor Browser. Search for the Vortex subforum. Look for posts by the verified Vortex moderator account — Dread moderator badges cannot be impersonated. The pinned link in the subforum header should match the addresses on this page exactly.
What to look for in the Dread thread:
- Verified moderator badge on the account posting links
- A pinned post containing a signed link announcement (.asc attachment)
- Post dates consistent with Vortex's operational history (October 2023 onwards)
- No suspicious redirects when following linked addresses
If the Dread subforum links don't match what you're looking at, stop. Don't proceed. Report the discrepancy in the subforum thread.
The one-character phishing attack
Here's exactly how it works. A phishing operator registers a hidden service with an address that differs from a legitimate Vortex mirror by a single character. The v3 onion address format uses 56 characters of base32 encoding. One substitution creates a completely different hidden service, routing traffic to an entirely different server with an entirely fake interface.
Hypothetical example:
bar47oi7dym5soxvaehmd2lt7jjw3gdoxekynyflx3jc5qfarsfyz2id.onion ← verified
bar47oi7dym5soxvaehmd2lt7jjw3gdoxekynyflx3jc5qfarsfyz3id.onion ← hypothetical clone
Spot the difference? Character 54: 2 versus 3. The sites look identical. Lose concentration for a second while typing manually, and you've handed credentials to a fake. This is why the copy button exists. Use it.