Sources & Methodology

Transparency in our research process: citations, editorial policy, and methodology for Nexus Market darknet coverage.

All content is based on publicly available information from reputable sources.

Primary Sources

Law Enforcement & Government

  • Europol — Internet Organised Crime Threat Assessment (IOCTA), press releases on darknet operations
  • U.S. Department of Justice (DOJ) — Press releases on darknet marketplace enforcement actions
  • FBI / IC3 — Cybercrime reporting and public advisories

Blockchain Analytics

  • Chainalysis — Cryptocurrency tracing reports, darknet marketplace transaction analysis
  • TRM Labs — Blockchain intelligence research, illicit finance reports

Threat Intelligence Firms

  • Mandiant (Google Cloud) — Threat intelligence reports, phishing kit analysis
  • Recorded Future — Darknet monitoring, threat landscape assessments
  • Intel 471 — Underground economy intelligence
  • Flashpoint — Threat intelligence and risk analysis
  • DarkOwl — Darknet data and monitoring

News & Journalism

  • Reuters — International news coverage of cybercrime enforcement
  • BleepingComputer — Cybersecurity news and analysis
  • KrebsOnSecurity — Investigative cybersecurity journalism

Phishing & Domain Intelligence

  • PhishTank — Community-driven phishing verification
  • DomainTools — Domain registration and infrastructure analysis

Editorial Policy

  • We only publish information that can be attributed to publicly available sources.
  • We do not fabricate statistics, vendor counts, listing numbers, or uptime data.
  • Claims that cannot be independently verified are labeled as "unverified" or "reported."
  • We do not publish onion links, mirrors, access instructions, or any content that facilitates illegal activity.
  • All content is reviewed for compliance with our safety guidelines before publication.

Methodology

Our research methodology follows standard OSINT practices:

  1. Source identification: We monitor official press releases, reputable news outlets, and established threat intelligence publications.
  2. Cross-referencing: Claims are verified against multiple independent sources before inclusion.
  3. Attribution: All factual claims are attributed to their source.
  4. Regular review: Content is periodically reviewed and updated as new information becomes available.
  5. Safety review: All content undergoes a safety review to ensure it does not facilitate illegal activity or enable phishing.

Recommended Reading

  • Europol IOCTA 2025 — Annual darknet threat assessment
  • Chainalysis Crypto Crime Report — Annual cryptocurrency crime analysis
  • SANS Institute — Darknet marketplace research papers
  • Journal of Financial Crime — Academic research on darknet finance