P.S. Just wait until DarkCoin's CoinJoin is denial-of-service attacked (if necessary I will do it to prove it is vulnerable, will wait until it becomes more popular then bet short on it and DOS-attack it). Tried to tell them that, but they didn't want to listen. Oh well. CoinJoin can't be protected against this because it is a two-step process (not atomic). Go read my debate with gmaxwell in the CoinJoin thread. Blacklisting input addresses is futile.
iirc drk dev asked you to exploit it in the test net setting but you disappeared.

It's possible I remember wrong though.
They never PM'ed me as I requested. I don't spend my time monitoring that DK thread that has several pages per day of new posts.
Did they attempt to do anything to deal with DOS-attacks? The problem is that if you blacklist the input address, someone can just go create another input address (even passing through another instance of the mixer). If they are sharing a single blacklist coin-wide, then it is not a decentralized coin (i.e. some pools could lie and cause addresses to become unspendable). Etc, etc, etc.
Nothing in their whitepaper about DOS protection:
http://darkcoin.io/downloads/DarkcoinWhitepaper.pdf