As I understand, here you demonstrate how to break connection between sender and receiver in the network logs. This is what Darkoin is about. However, Dark Wallet does not work in vacuum. The anonymizing network makes sense only as long as you use secure, anonymous environment. If NSA can watch...
You say that Dash is totally trustable because it is provided in the form of publically-reviewable open source form. Yet, I see that all dash guidelines recommend downloading binary installers and you can substitute the sources with anything after compilation. In which way the binaries are open...