Zcash Reports Starkware Partnership

The Zcash (ZEC) project continues to struggle for height. The latest news concerns a partnership with an applied cryptography company, StarkWare industries.

The company was founded by former Zcash developers and scientist’s professor Eli Ben-Sasson and professor Alessandro Chiesa. Now, the early developers come back as advisors and partners to the Zcash project, attempting to unroll the STARKs technology for anonymization.

Zero-knowledge (ZK) proof systems are already used on Zcash, in the form of ZK-SNARKs, and the StarkWare Company plans to formalize an alternative workup.

ZEC has forever been a niche coin and somehow sidestepped a more dramatic appreciation. The digital asset has acquired both accolades and criticisms, the latter coming from the Monero community.

Because of its low supply, ZEC has always commanded a high price, but the asset currently continues to slide below $300. In the past week, ZEC sank more than 16% to $259.43.

It isn’t uncommon whether the Consensus 2018 event would alter the tides for the price for the price. Recently, the event was passed off by Vitalik Buterin for being connected to a potential exposure of users to an airdrop scam.

The biggest demerit for the ZEC asset is the inactive trading. Because of the high price, few investors jump in, as they would into cheaper coins. The coins marketing is also directed to large-scale investors and ZEC has fluttered within a range not accomplishing rapid growth that would introduce panic-buying.

Lately, a team of British scientists tested the Zcash system and found out that users were compromising their privacy through address usage. Using a mix of clear and shielded address makes ZEC transactions easier to trace, or at least reveal patterns of usage.

The Zcash team faces research and decision on the Antminer Z9 ASIC. Part of the community backs an ASIC-disabling fork and threatens to leave the project in case large-scale ASIC mining is granted the continuance.

 

Reply

Time limit is exhausted. Please reload CAPTCHA.