If it sounds too good, it probably is.* This applies to all things, especially crypto. This section contains a few basic steps you can take to mitigate the risks of being hacked/scammed. Shielded Wallet Support Nameīecause of the anonymity and expected value with Zcash, hackers and scammers may attempt to scam or steal your coins. It's also worth noting that while you can store your coins on an exchange, and in some cases earn interest, the saying 'not your keys, not your coins' should be considered before doing so. Hardware wallets do not currently support shielded addresses, but support is in the works. For maximum security we recommend using a hardware wallet such as Ledger or Trezor. Privacy vs Securityįor maximum privacy we recommend using a wallet that supports shielded addresses. There are a variety of wallet options available to store your Zcash, many of which can be found on the z.cash website here. The attributes that are anonymized depend on the type of address sending and receiving the transaction and the transaction type. Zcash enables privacy by leveraging shielded pools of value and cutting edge math known as zero-knowledge cryptography to anonymize attributes of a transaction. Zcash development is funded via 20% of the mining reward which is split between the 3 major orgs: the Zcash Major Grants Fund (8%), The Electric Coin Company (7%), and the Zcash Foundation (5%). Grants from the Zcash Major Grants Fund are distributed by the Zcash Community Grants community elected committee. ![]() Zcash Development is conducted by the non-proft Electric Coin Company (ECC), The Zcash Foundation (ZF), and through grants provided to the community via the ZF and the Zcash Major Grants Fund.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |