Oh yes, important little detail...
When a transaction is done it uses anonymity centric networks like TOR (the dark web). So that the addresses, the IPs are obfuscated and that makes it of course untraceable.
So their trick is to run parallel on the Dark Web network... I think they also use I2P as well.
However, some claim that's not good enough, hence why the wraith protocol was to be the "big difference" however... as I've said they under delivered.