Do you have a TlDR; version for this ?
Doesn't seem like a technical issue,move the thread to service discussion maybe.
Provide links for reference - Your main transaction -Mixers Address.
Link of the website you used for mixing.IIRC a fake version of bitblender has already scammer their customers.You could another victim.
It's highly improbable that I could have been compromised. I run a very, very tight ship that starts at the core, eliminating/disabling anything that isn't absolutey necessary to eliminate attack surface. To make it so that I could be safe without any need for any 3'rd party support or even a router. Using whitelisting approach for basically everything, and then of course adding things, like of course really using a router, properly configured, and hardwired into it (WiFi disabled). My LAN range consists of only 1 IP address, the machine I'm using now. Then adding an outbound firewall and HIPS, allowing only protocols, IP addresses/ranges, ports, and functionality that's absolutely necessary for proper functionality of everything, from my apps to websites working properly. Hosts and block lists. For every website I frequent or consider important (like this one), when I go to it I look at every IP address on the list and then adding them to my block list to see if it still works properly. If it doesn't I remove IP add's 1 at a time until only the ones that are necessary for sites to function properly left. All the IP add's left are likely trackers, or worse. Adding block rules beneath the rules for apps in my FW, which is one of several methods I use to prevent DNS leaks. If my VPN (double hop) were to disconnect for example my entire internet connection would drop. I also use an app (DNS Leak Fix) created by the very VPN I use (iVPN), IMO it and Mullvad are the best two. Many claim not to keep logs but these two have proven it over time by refusing to turn over info. despite being pressured to by 3 letter agencies, claiming as they do on their sites, that there's nothing to turn over because they don't keep logs. Their servers have been seized and it's been confirmed that it's indeed the truth. I also use Sandboxie with VERY restricted sandboxes, usually allowing only the app I've created it for, save perhaps an OS file needed for it to work properly, or in the case of Pidgin Messenger OTR. Any new downloads are sent to a dedicated partition in which they are scanned by VT Hash Check to confirm they're safe before sending them where they belong. And a sandbox named "Realtime" for anything plugged into a USB port, my CD/DVD drive, and floppy drive (A:). Which brings me to another huge part of my approach - isolation. I create partitions for different things, many apps have their own, like my browser. And my OS. This helps keep malware from spreading to my OS, stuck in an isolated sandbox/partition, not a threat, then flushed when I empty said sandbox. Always on Hardware DEP, and Malwarebytes Anti-Exploit with many methods to prevent exploits. On top of DNS Leak Fix I manually flush my DNS cache using "cmd" before opening my browser/TOR. Hardcode the DNS add. of the 2'nd hop of my VPN into my router. etc... Utilize addons on my version of Firefox from before Austrailis (sp?) screwed everything up like NoScript, HTTPS-Everywhere, RequestPolicy, CS Lite Mod, Private Tab, uBlock, Calomel SSL Validation. Many things that would alert me to the fact that I'd be on a rogue/imposter site. Not to mention my search engine (Ixquick) does an excellent job of identifying and removing such sites. I'd be able to tell if I were on such a site by simply looking at the color of my Calomel logo, or URL bar. Plus I favorited the site the first time I went to it, using Ixquick to search for it, not by clicking on some random link. That first time when it worked just fine.
To make a long story short (too late, I know)... I'm very anal about security/privacy/anonymity, and I know that if I was somehow compromised it was an inside job. Either that or I overlooked something.
I notice on the blockchain it says "Request Payment" there. But I'm not sure what that's all about. Can I use that to move my Bitcoins where they're supposed to be? What do I put into the boxes? I don't know if I'm supposed to put all the Bitcoins I was trying to move into the box, or if I'm supposed to offer some nominal fee for somebody to do the job for me and move my BTC here? Can somebody tell me if this is the case?... if there's anything I can do in that regard? I didn't have to do it any other time I moved bitcoins, but there's a first time for everything too. So perhaps that's the thing I'm overlooking here?... If so, or if there's another way I can resolve this by offering someone a nominal fee then I'll take back every negative thing I've said about this place, delete this thread, and give this place a positive review in the end.