The p50 / p95 latency profile across all three production mirrors, sampled across fresh Tor circuits over the past 24 hours.
Median platform-level p50: 141 ms. The headline mirror leads at roughly 108 ms p50 with a 214 ms p95; backup A sits at 141 ms p50 with 267 ms p95; backup B sits at 287 ms p50 with 612 ms p95 (degraded-mode classification). All three numbers are sampled across fresh Tor circuits, not from a steady-state pool, so they reflect a worst-case-realistic profile rather than warm-cache best-case.
What changes the numbers: Tor guard rotation on the platform side, congestion in the broader Tor network, and the time of day (latency rises during European-evening peak). The numbers above are 24-hour aggregates; the homepage panel shows the most recent cycle's figures.
0x7F2A0A9D unchanged. No interruption to active sessions; legacy addresses 410 Gone after 96 hours per policy.
/login. Anti-DDoS challenge ("Checking your browser") elevated for 26 minutes. Browsers passing the challenge experienced a single-page extra hop, no credential or session issues.
Three independent v3 hidden services, each on its own guard pool. The probe rotates Tor circuits per request to measure user-realistic latency.
Authentication endpoint backed by per-session ephemeral keys. Health = the same probe completing a full handshake against a synthetic account.
2-of-3 escrow contract orchestration: order lock, dispute branch, payout. Health = signer round-trip well under 200 ms.
Shop management, listings, order queue. Status reflects success rate of synthetic vendor read/write cycles, not raw latency.
Three-way dispute panel rota. Health = mean ticket pickup time below the published 6-hour SLA.
End-to-end encrypted vendor ↔ buyer thread. Health = synthetic message round-trip under 1 s.
Status changes are mirrored to public RSS at /status.rss, Atom at /status.atom, and a JSON snapshot at /status.json. PGP-signed advisories accompany every state change. The feed endpoints are anonymous — no clearnet email or identifier is collected.
No. As of 2026-05-05 03:13 UTC all main services are operational. Mirror C is reporting degraded latency, which is normal during Tor guard rotation. Use Mirror A or Mirror B.
The probe runs every 60 seconds against fresh Tor circuits. Numbers above represent the most recent completed cycle.
Mirror C lives on slower guard nodes intended as fallback. Latency above 250 ms reflects circuit congestion, not a problem with the market itself.
From this page. The mirror addresses above are the live, signed v3 onions in 2026. Each is verified against PGP fingerprint 0x7F2A0A9D on every probe cycle.