In your opinion, what is the most concerning opsec vulnerability for Arch users/vendors that can arise from the seizure? : Archetyp | Torhoo darknet markets
Now that LE has full access to Arch, what are some of the more concerning opsec vulnerabilities that are possibly being exploited by LE right now? According to LE, 7 vendor arrests have been made so far due to the Arch seizure.. What do you think were the vulnerabilities that led to these vendor arrests and overall what would you be most concerned about if you were a user of Arch? Stuff like saved XMR withdrawal addresses, auto-encrypted messages, etc.
I think we all hope that data was actually cleared from the system after 30 days like YGW claimed.. But we can't really know for sure what type of shit was saved on the backend and what LE currently has access to. Maybe its a lot less than what LE was hoping for.. And to remain positive I hope that is the case but its also good to assume the worst.
This is my first market seizure and for anyone who has been through this many times in the past.. if LE is being truthful with the seven vendor arrests one month into the seizure, does that seem to be more or less than seizures in the past? Basically, is seven vendor arrests one month in surprising at all to any of the veterans here or does that seem to be an average amount of take downs for this amount of time?