Some update on the situation.
We have been investigating the identity of the scammer over the last couple of days. Luckily, he appears to be an amateur who thinks he is safe going through Tor but doesn't know how to set up his routing table properly to have out-of-band traffic route transparently over Tor. He is also suprizingly naive and fell for the obvious click bait that Ohad put in his latest email, thanks to which we now have a full packet dump and IDS traces of his multiple failed attempts at fetching an imaginary "final_proposal_v2" file that Ohad convinced him was waiting for him on Tauchain's server, complete with misrouted DNS queries, unobfuscated http headers, and a whole bunch of system finger prints. We also have his session info at TrustWave and TrendMicro (which he doesn't know how to configure properly either it seems), and plenty of gmail endorsed email proofs of this fraud.
As if that wasn't enough, as some have already noticed he has also been careless about managing his sock puppet accounts and keeps making the same grammatical faults (are been, is been, was been...), using the same broken idioms everywhere, and having his accounts support each other's fishy claims. We have been able to correlate him with a good bunch of Bitcointalk and social media accounts with a high degree of confidence, which means that we have a lot more charges to put against him when this affair goes to court. Oh and his ledger trails are laughably easy to track and nicely matching with addresses used by his sock puppets.
At this point we are confident that we have plenty enough material to justify engaging legal action against him. We are still discussing about what course to pursue on the matter. I'll be posting on the progress.
In the mean time and until further notice, we should still assume that the funds are gone and we will need to address quickly the issue of reissuing the assets, decide how to absorb the loss, and resume trading. Let's have this discussion going and come to an agreement.