HoriZen (Zen) Privacy Coin Features and Overview

ZEN is the native cryptocurrency of Horizen. Its optional privacy feature allows you to control your digital footprint.

ZEN offers two different types of addresses:

  • T-Addresses – Regular addresses for making transactions similar to bitcoin. These transactions are public and transparent on the blockchain.
  • Z-Addresses – Also known as shielded addresses, transactions between Z-Addresses are completely private and anonymous. They leverage zero knowledge cryptography to obscure sender and recipient addresses, as well as amount sent.

    Balances in shielded addresses are private, however, any regular addresses on the receiving end will deshield the token and reveal the value received on the blockchain.

What is Zen Coin?

Horizen is building a technology platform with optional privacy features that aims to enable an application-rich and inclusive ecosystem to provide people with freedom and everyday usability.

Launched in May 2017, the leading-edge platform enables real-life uses beyond its cryptocurrency – ZEN, including the ability to deploy sidechains and integrate third party technologies.

Share

We-believe-in-changing-the-world-through-technology-and-economic-incentives-that-provide-a-robust-sustainable-ecosystem.We believe in changing the world through technology and economic incentives that provide a robust, sustainable ecosystem.

  • 60% to miners
  • 20% to one or more DAOs
  • 10% to Secure Node Operators
  • 10% to Super Node Operators

Secure

zen-is-the-first-cryptocurrency-with-fully-end-to-end-encryption-at-the-node-and-internode-level. ZEN is the first cryptocurrency with fully end-to-end encryption at the node and internode level.
In addition to zk-SNARKs, the Horizen architecture includes encryption at the node level. Cryptocurrencies rely on nodes to operate, we require our Secure Node operators to have the latest Information Technology and Network Security to qualify for compensation.

Mine Zen

 

Domain fronting is a versatile censorship circumvention technique that hides the remote endpoint of a communication. It works at the application layer, using HTTPS, to communicate with a forbidden host while appearing to communicate with some other host, permitted by the censor.

The key idea is the use of different domain names at different layers of communication.

Leave a Reply