I'd say it was because they aren't making enough noise (or aren't annoying the right people yet) in order to get shut down. I can purchase plenty of explosive material at my local gun shop, small amounts of pre-made ordnance isn't really a threat to anyone - yet.
Silk Road was a big player and even the normies knew about it, so it got a lot of attention and shut down. Tell someone that you can buy a grenade on the "dark web" and they'll just go "yeah, ok."
All I'm saying is that is a site like Poal were to be on the darknet, and it were to make enough noise, someone would notice and resources would be expended to find it.
What resources can locate it, and what example are you citing?
If someone were interested in where Poal's darknet server was located, it would be very easy to set up an exit node. Eventually you'd capture some traffic of interest and probably be able to de-crypt it. There have been examples of that on the network before, bad exit nods that seem to be there for password or traffic snffing or people doing it just because:
https://nakedsecurity.sophos.com/2015/06/25/can-you-trust-tors-exit-nodes/
https://www.f5.com/labs/articles/threat-intelligence/snooping-on-tor-from-your-load-balancer
You'd be foolish to assume that no government organization has control of or interest in an exit node, especially with the propensity of illegal transactions that tend to occur on the network. TOR doesn't seem to care until it they get called on it, they're perfectly happy to let drugs and kiddie porn propagate across the network.
You have no examples of a site being busted without an insider. And if the deep state wants to sell grenades to freedom fighters, I support that.
(post is archived)