13

If you use any of the dark markets, I would consider stopping temporarily. Hansa and Alphabay were raided and shut down recently, and the owner of Alphabay was found dead on the end of a rope in Thailand. A couple of days ago, the owner of bitmixer.io - the largest Bitcoin mixer - announced that they were shutting down.

Despite the huge profit we earn, we are closing our activity. Let me explain why.

I'm bitcoin enthusiast since 2011. When we started this service I was convinced that any Bitcoin user has a natural right to privacy. I was totally wrong. Now I grasped that Bitcoin is transparent non-anonymous system by design. Blockchain is a great open book. I believe that Bitcoin will have a great future without dark market transactions. You may use Dash or Zerocoin if you want to buy some weed. Not Bitcoin.

I hope our decision will help to make Bitcoin ecosystem more clean and transparent. I hope our competitors will hear our message and will close their services too. Very soon this kind of activity will be considered as illegal in most of countries.

In my opinion, this is complete bullshit and they have been threatened, this is why they are closing. This is happening far too soon after the market closures for it to not be a coincidence.

I have also seen rumours floating around about the dream market. It may have been seized and could be under the control of the FBI, so be careful with what you're doing on there. Also bear in mind that the Hansa closure resulted in lots of user information becoming available to the authorities. If you have an account on there or Alphabay that has the same credentials you use anywhere else, burn the account and make a new one.

If you use any of the dark markets, I would consider stopping temporarily. Hansa and Alphabay were raided and shut down recently, and the owner of Alphabay was found dead on the end of a rope in Thailand. A couple of days ago, the owner of bitmixer.io - the largest Bitcoin mixer - announced that they were [shutting down](https://bitcointalk.org/index.php?topic=2042470.0). >Despite the huge profit we earn, we are closing our activity. Let me explain why. >I'm bitcoin enthusiast since 2011. When we started this service I was convinced that any Bitcoin user has a natural right to privacy. I was totally wrong. Now I grasped that Bitcoin is transparent non-anonymous system by design. Blockchain is a great open book. I believe that Bitcoin will have a great future without dark market transactions. You may use Dash or Zerocoin if you want to buy some weed. Not Bitcoin. >I hope our decision will help to make Bitcoin ecosystem more clean and transparent. I hope our competitors will hear our message and will close their services too. Very soon this kind of activity will be considered as illegal in most of countries. In my opinion, this is complete bullshit and they have been threatened, this is why they are closing. This is happening far too soon after the market closures for it to not be a coincidence. I have also seen rumours floating around about the dream market. It may have been seized and could be under the control of the FBI, so be careful with what you're doing on there. Also bear in mind that the Hansa closure resulted in lots of user information becoming available to the authorities. If you have an account on there or Alphabay that has the same credentials you use anywhere else, burn the account and make a new one.

10 comments

[–] phoxy 2 points (+2|-0)

Can't they just move to tor to be anonymous?

[–] Skyrock 1 points (+1|-0)

TOR has been compromised a long time ago.

I'm really glad now that I have never got into Bitcoin, but have been more conservative about my investments.

[–] phoxy 1 points (+1|-0)

Oh I didn't know Tor was compromised, what happened to it?

[–] Skyrock 2 points (+2|-0)

https://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity

The same goes for any letters agency in the US since then. Don't rely on TOR for privacy for any activity that could be relevant for any letters agency, which is basically any activity.

[–] PMYA [OP] 2 points (+2|-0) Edited

I wouldn't say it has been compromised, but the design is flawed and there is no doubt it is partially compromised in the same way that the rest of the internet is.

Lets say you run some tor nodes, and I'm using them to connect to the network. If you're running the first node I connect to, you can see my IP, and that is all you can see. If you're running the last node I connect to, you can see the IP of the node I was connected to before yours and also the thing I'm looking at, like a website.

These two things alone are not enough because there are multiple points in between those two nodes, so even if you know my IP from the first connection, you won't be able to match it to the last node and be able to see that my IP is accessing whatever site it is.

But, if you happen to own all of the nodes in between, you can see everything. This is highly highly unlikely though. Say I am connected to a chain of nodes. You own the first and the last. Let's say you own the website I'm looking at. You can set something up so an identifier of some sort is sent back to me from the website I've just loaded, which will appear on all of the nodes you own and can be traced back to me.

This is the reason that it is recommended to not load javascript on websites over tor, because it is a lot easier to identify someone. An example of one of the ways this can be achieved is by using browser fingerprinting. The tor browser is designed to look like every other tor browser, making it difficult to use this method. However, if I write a simple script on my website to check the size of the browser window you're using, and I also own the exit node and entry node that you're using to connect to my site, I can tie a browser window size to your IP.

The best case scenario is that you're using the browser in the size that it opens in, in which case I won't be able to match you exactly and I can only cancel you down. In the worst case, you are using a unique window size and I know your IP plus the site you're on. This all seems very complex and time consuming, but this method has been used to catch people before. In fact, the creators of the tor browser now recommend that you do not alter the window size at all, even if you're making it full screen.