Access & Connectivity
How does the network utilize Tor/Onion routing?
The infrastructure relies on the Tor network to anonymize traffic, routing connections through multiple independent relays before reaching the destination server. This cryptographic protocol ensures the geographical and operational privacy of the primary nodes.
Why might node connections experience downtime?
Connectivity interruptions typically occur during scheduled server maintenance, distributed denial-of-service (DDoS) mitigation periods, or network-wide routing adjustments. The architecture is designed to temporarily restrict bandwidth to preserve core data integrity.
What are the browser requirements for analyzing the network?
Researchers must utilize the Tor Browser, configured to standard secure settings. It is strictly advised to maintain JavaScript in a disabled state (Safest mode) to properly evaluate the platform's raw infrastructure without exposing local execution environments.
How are alternating connection points managed?
The system employs a rotating network of mirrors to distribute traffic load and mitigate targeted disruption. Researchers are required to maintain updated routing lists derived strictly from cryptographically verified public announcements. Example routing format:
torzon4rzcg5sjjq63xmcn6usud4fhcz7zidpjbuiemtg2wiltv6pyid.onion
Security Architecture
How does the platform implement PGP verification?
Public-key cryptography is enforced for all communications. Users must import the platform's root public key to verify signed messages and structurally encrypt their own outbound data transmissions, ensuring end-to-end mathematical security.
What protocols govern Two-Factor Authentication (2FA)?
2FA protocols require users to decrypt a unique, time-sensitive cipher block using their previously registered private PGP key. Successfully returning the decrypted token authenticates session access upon initial login attempt.
How is credential integrity maintained?
Security systems rely on strictly enforced cryptographic signatures for all announcements and mirror validations, ensuring origin authenticity without relying on external entities or centralized certificate authorities.
What measures protect against session hijacking?
The architecture utilizes aggressive session timeouts, binding active sessions to specific Tor routing paths, and requiring complete PGP re-authentication for any sensitive account modifications or fund transfers.
Market Functionality
How does the internal escrow system operate?
The platform holds cryptocurrency deposits in a neutral multisig wallet system until the transaction is definitively finalized by both participating parties. This mechanism prevents unilateral fund diversion and requires mutual consensus.
Which cryptographic assets are supported for operations?
The infrastructure primarily integrates Monero (XMR) for its default privacy-preserving ring signatures and stealth addresses, alongside Bitcoin (BTC) utilizing traditional unspent transaction output (UTXO) ledger mechanics.
What are the merchant bond requirements based on historical data?
Historical analysis indicates new merchants are required to lock a specific cryptocurrency bond within the platform's smart-contract equivalent. This acts as a substantial financial deterrent against malicious network behavior.
How do auto-finalize timers function?
System protocols dictate that if a transaction remains unaddressed beyond a predetermined 7 to 14-day window, funds automatically release to the merchant. This automated safeguard prevents indefinite escrow gridlock.
What is the mechanism for multi-signature (Multisig) transactions?
Multisig transactions require unique cryptographic approval from two of three distinct parties (the two transacting entities and the platform arbiter) to successfully broadcast and execute a blockchain transfer.
Troubleshooting
How are cryptographic captcha anomalies resolved?
If the visual or cryptographic captchas fail to render correctly, researchers are advised to request a new Tor circuit or entirely restart the Tor Browser to refresh the session state and obtain a newly generated challenge.
What is the protocol for account recovery?
Account restoration strictly requires the unique mnemonic seed phrase generated during initial registration. Due to the decentralized hashing architecture, data recovery is mathematically impossible without this specific string.