Identifying vendors, buyer and market operators is very easy and doesn't require compromising the Tor Network. Do what you will with this information, use it to increase your safety. Its purpose isn't to help your adversaries find you, because if they're competent they will already know this method (and be using it?).
The downside of this technique is you don't know which identity belongs to which vendor/operator. But through further investigation you can decipher who's who using Traffic analysis of observed suspects. The point is LE have the real identities of individuals of whom are of a high probability involved in drug trafficking and other organized crime on Tor. If not they can be eliminated from the suspect list and that narrows it down.
Step 1.
Buy a cheap Bitcoin VPS and install TBB. Install and run the Bitcoin daemon. Install a file manager and database manager application. Remove headers, bind all connections to 127.0.0.1 and remove server information from error pages. Use scallion or shallot to generate a custom onion URL or use the random assigned one in the Torrec file.
Step 2.
Invent a brand name for a mixing service. Example: Bitcoin Cleaner.
Design a basic logo and website design or pay someone to do this on /r/jobs4bitcoins.
Using the Bitcoin daemon commands and PHP, you will create a simple Bitcoin mixing service. It is a trivial task for a developer with knowledge of the Bitcoin daemon and PHP/MySQL. Users deposit Bitcoins which increment their balance and users withdraw Bitcoin partially from several random addresses of deposits by other users to form the taintless Bitcoin withdrawal. Developers can be hired anonymously on /r/jobs4bitcoins or other employment websites.
You now run a commercial Tor hidden service capable of providing Bitcoin laundering.
Step 3.
When the user initiates a withdrawal of Bitcoin the user enters the destination address (Bitcoin Address X). This address passes through your centralized server and will be logged. Therefore, even though the Bitcoin is successfully mixed with 0% taint and traceability, the mixing service still knows the true destination address. It's impossible for a user to know that the mixing service has logged their destination address (Bitcoin Address X).
The user does not think that anything is wrong.
Step 4.
The user using his newly mixed Bitcoins and sells them on LocalBitcoins.com. Why? LocalBitcoins.com is the largest and one of the most anonymous ways to cash out Bitcoin. I estimate that most, if not the overwhelming majority of vendors and market operators use LocalBitcoins.com. If they use Coinbase or another exchange this is no problem.
The user sells his Bitcoin via bank transaction with a LocalBitcoins .com buyer. The user has now completed his sale of Bitcoin.
Step 5.
LE has the destination address (Bitcoin Address X).
Subpoena LocalBitcoins.com, Coinbase and ANY other exchange that is obliged to cooperate with government subpoenas and request the information of (Bitcoin Address X).
LocalBitcoins.com responds to the subpoena with the user who initiated deposit from that address, and gives LE the receipt of the bank transaction initiated by the same user. LE now has the name and bank details of the user who deposited Bitcoins to Bitcoin Cleaner.
Step 6.
Monitor/CD or swoop in for the arrest. You have his real identity, and the bank will hand over details of the user who owned the receiving account of the bank transfer.
The users who use Tor based Bitcoin laundering services are extremely likely to be engaged in illegal activity. Vendors, market operators, pedophile crowd funding users, the lot. If LE does not have evidence to attain a warrant or CD, you are still listed on their database and can be watched for further activity. And you won't even know that you are being watched or your identity has been uncovered.
Not FUD or fear-mongering. I believe this is a credible threat to everyone who uses DNMs.
<n/a>