Technical explainer: Halo on Zcash

The Halo 2 zero-knowledge proving system, invented and developed at Electric Coin Co. (ECC), eliminates the trusted setup, reducing the attack surface of the Zcash protocol and improving assurance about ZEC supply integrity.

Technical explainer: Halo on Zcash

Fuzzing Zcash with Kubernetes

Security is paramount to the success of Zcash and ECC, and as such, we invest significant resources into security.

Fuzzing Zcash with Kubernetes

New Release: 4.1.0

Migration to Clang and static libc++ zcashd now builds its C++ (and C) dependencies entirely with a pinned version of […]

New Release: 4.1.0

Canopy security assessment complete

Electric Coin Co. once again engaged the cryptography group at NCC, this time to review our upcoming Canopy (NU4) network […]

Canopy security assessment complete

New Release: 4.0.0

Network Upgrade 4: Canopy The 4.0.0 release supports the Canopy activation on mainnet, which will occur at a block height […]

New Release: 4.0.0

Explaining Halo 2

Last year, our team announced a collection of discoveries and research milestones as part of our Scalability 2021 mission for […]

Explaining Halo 2

ECC releases code for Halo 2

Electric Coin Co. (ECC) today opened the source code we are developing for Halo 2, an updated, more efficient version […]

ECC releases code for Halo 2

Luxor mines the first shielded coinbase

Luxor Mining Pool has mined the first Zcash block to a shielded coinbase at height #949496. Shielded coinbase was enabled […]

Luxor mines the first shielded coinbase

New Release 3.1.0

Network Upgrade 4: Canopy The code preparations for the Canopy network upgrade are finished and included in this release. The […]

New Release 3.1.0

Protect Privacy hackathon winners and recap

Gitcoin’s Protect Privacy Hackathon wrapped up last week, and the ECC team is so grateful to have been involved. The […]

Protect Privacy hackathon winners and recap

Kubernetes and blockchains at ECC

Kubernetes is an open-source project designed to manage containerized workloads. Containerization is a software development approach that allows applications to […]

Kubernetes and blockchains at ECC

ECC Wallet threat model and security assessment results

ECC open-sourced our work-in-progress iOS and Android Zcash wallets last week, so it makes sense for the ECC security team […]

ECC Wallet threat model and security assessment results