New Release 4.4.0
zcashd can now be configured to optionally expose an HTTP server that acts as a Prometheus scrape endpoint. The server will respond to GET requests on any request path.
New Release 4.3.0
The latest release includes traffic improvements, a reworked library and other updates.
Bringing Halo 2 to Zcash
As the first implementation of Halo within Zcash, this would serve as a catalyst for Zcash user confidence and scalability, while making the protocol more attractive, faster and less expensive for others to build on.
Technical explainer: Halo on Zcash
The Halo 2 zero-knowledge proving system, invented and developed at Electric Coin Co. (ECC), eliminates the trusted setup, reducing the attack surface of the Zcash protocol and improving assurance about ZEC supply integrity.
New Release 4.2.0
New release 4.2.0 removes the zcashd dependency upon libsodium for ed25519 signature checks and instead uses the Rust implementation in ed25519-zebra, which has been active for signature verification since the Canopy upgrade.
New Release 4.1.1
This is a hotfix release that addresses a performance regression in v4.1.0. It is recommended that either v4.0.0 or this […]
New Release: 4.1.0
Migration to Clang and static libc++ zcashd now builds its C++ (and C) dependencies entirely with a pinned version of […]
New Release: 4.0.0
Network Upgrade 4: Canopy The 4.0.0 release supports the Canopy activation on mainnet, which will occur at a block height […]
New Release: 3.0.0
Heartwood activation on mainnet This release supports the Heartwood activation on mainnet, which will occur at a block height of […]
New Release: 2.1.2-3
Electric Coin Co. has released zcashd 2.1.2-3, a hotfix that addresses issues identified in the Heartwood activation on testnet. This […]
New Release: 2.1.2
Heartwood testnet activation This release supports the activation of Heartwood on testnet, with an activation height of 903800, slated to […]
New Releases: 2.1.1 and hotfix 2.1.1-1
New soft fork On December 31, 2019, Michael Davidson disclosed to us a vulnerability that could be used to cause […]