CoinJoin can't work. Period. I had another debate in the CoinJoin thread a few weeks ago with gmaxwell and I won. Go read it for yourself.
The problem is you can't prevent someone from denial-of-service attacking by refusing to sign the second stage of the operation. They can block all DarkSends this way.
There is not any anonymity offered by DarkSend, because the shorts will simply attack it once the coin becomes valuable and DarkSends won't get processed. The system will jam. And the price will plummet.
I am not talking about DOS protection against sending transactions. Your developer misunderstood me before. I am talking about denial by refusing to sign the second stage of the DarkSend. Then the DarkSend has to reset and start over again. The attacker can do this over and over, and blacklisting can't work. If you blacklist the IP address, he can just get a botnet. If you blacklist the block chain address, he will just go through another instance of the DarkSend that uses a different blacklist. If you use one blacklist system wide, then you can have cheating miners or pools who cause legitimate users to become blacklisted.
http://www.cryptocoinsnews.com/2014/02/24/interview-anoncoin-developer-speaks-zerocoin-implementation/P.S. Just wait until DarkCoin's CoinJoin is denial-of-service attacked (if necessary I will do it to prove it is vulnerable, will wait until it becomes more popular then bet short on it and DOS-attack it). Tried to tell them that, but they didn't want to listen. Oh well. CoinJoin can't be protected against this because it is a two-step process (not atomic). Go read my debate with gmaxwell in the CoinJoin thread. Blacklisting input addresses is futile.
iirc drk dev asked you to exploit it in the test net setting but you disappeared.
It's possible I remember wrong though.
They never PM'ed me as I requested. I don't spend my time monitoring that DK thread that has several pages per day of new posts.
Did they attempt to do anything to deal with DOS-attacks? The problem is that if you blacklist the input address, someone can just go create another input address (even passing through another instance of the mixer). If they are sharing a single blacklist coin-wide, then it is not a decentralized coin (i.e. some pools could lie and cause addresses to become unspendable). Etc, etc, etc.
Nothing in their whitepaper about DOS protection:
http://darkcoin.io/downloads/DarkcoinWhitepaper.pdf