Well if that were true, they would be shutting down sites that sell grenades for example, as a matter of national security...but they can't.
I'd say it was because they aren't making enough noise (or aren't annoying the right people yet) in order to get shut down. I can purchase plenty of explosive material at my local gun shop, small amounts of pre-made ordnance isn't really a threat to anyone - yet.
Silk Road was a big player and even the normies knew about it, so it got a lot of attention and shut down. Tell someone that you can buy a grenade on the "dark web" and they'll just go "yeah, ok."
All I'm saying is that is a site like Poal were to be on the darknet, and it were to make enough noise, someone would notice and resources would be expended to find it.
What resources can locate it, and what example are you citing?
If someone were interested in where Poal's darknet server was located, it would be very easy to set up an exit node. Eventually you'd capture some traffic of interest and probably be able to de-crypt it. There have been examples of that on the network before, bad exit nods that seem to be there for password or traffic snffing or people doing it just because:
https://nakedsecurity.sophos.com/2015/06/25/can-you-trust-tors-exit-nodes/
https://www.f5.com/labs/articles/threat-intelligence/snooping-on-tor-from-your-load-balancer
You'd be foolish to assume that no government organization has control of or interest in an exit node, especially with the propensity of illegal transactions that tend to occur on the network. TOR doesn't seem to care until it they get called on it, they're perfectly happy to let drugs and kiddie porn propagate across the network.
Many of those illegal websites are honeypots run by the feds.
Feds are selling grenades, LOL?
Tha's how they do their sting operations they set up some patsies by selling them illegal goods and arresting them afterwards. https://www.breitbart.com/border/2015/06/03/feds-uncover-grenade-black-market-near-texas-border/
(post is archived)