No deposits are required, you pay once you've selected what you wish to buy. Vendors can withdraw as soon as the order is finalized and confirmed.
Users are anonymous by default, usernames are a random string. Passwords are stored using the bcrypt algorithm. Vendors are forced to sign a Bitcoin message with their address every time they log in.
No shared wallets. The mixing service doesn't mix all the funds together, every payment address is unique. Transaction outputs are then filtered by periodically by randomly creating new transactions to new addresses, to mimic the appearance of normal transactions in the blockchain.
PGP encryption is enforced for delivery instructions and strongly recommended for messages containing private data. Delivery instructions can be encrypted inside the browser using the vendors public key, this is not recommended, and delivery instructions sent to the server which do not contain a valid PGP message will be rejected and not stored.
I have an extensive history with securing UNIX machines and web services. I have no need to employ anyone to help me. I can run a tight and efficient operation alone, without having to deal with any fallout caused by giving away the details of transactions and private messages to others.
The Tor hidden service only connects to controlled and aged guard nodes, limiting the risks of a timing attack. I2P support is operational, but is not planned to be used currently.
If you want to protect yourself use Tor for more of your daily browsing. If you want to help the rest of the network, consider running Tor as a non-exit relay. https://www.torproject.org/docs/tor-doc-relay.html.en
Be safe www.erowid.org/psychoactives/psychoactives.shtml
Heisenberg