Bringing Halo 2 to Zcash
As the first implementation of Halo within Zcash, this would serve as a catalyst for Zcash user confidence and scalability, while making the protocol more attractive, faster and less expensive for others to build on.
Technical explainer: Halo on Zcash
The Halo 2 zero-knowledge proving system, invented and developed at Electric Coin Co. (ECC), eliminates the trusted setup, reducing the attack surface of the Zcash protocol and improving assurance about ZEC supply integrity.
New Release 4.2.0
New release 4.2.0 removes the zcashd dependency upon libsodium for ed25519 signature checks and instead uses the Rust implementation in ed25519-zebra, which has been active for signature verification since the Canopy upgrade.
New Release 4.1.1
This is a hotfix release that addresses a performance regression in v4.1.0. It is recommended that either v4.0.0 or this […]
New Release: 4.1.0
Migration to Clang and static libc++ zcashd now builds its C++ (and C) dependencies entirely with a pinned version of […]
New Release: 4.0.0
Network Upgrade 4: Canopy The 4.0.0 release supports the Canopy activation on mainnet, which will occur at a block height […]
New Release: 3.0.0
Heartwood activation on mainnet This release supports the Heartwood activation on mainnet, which will occur at a block height of […]
New Release: 2.1.2-3
Electric Coin Co. has released zcashd 2.1.2-3, a hotfix that addresses issues identified in the Heartwood activation on testnet. This […]
New Release: 2.1.2
Heartwood testnet activation This release supports the activation of Heartwood on testnet, with an activation height of 903800, slated to […]
New Releases: 2.1.1 and hotfix 2.1.1-1
New soft fork On December 31, 2019, Michael Davidson disclosed to us a vulnerability that could be used to cause […]
New Release: 2.1.0
Blossom network upgrade The mainnet activation of the Blossom network upgrade is supported by this release, with an activation height […]
New Release: 2.0.7-3
On Tuesday September 24th we released version 2.0.7-3 of Zcashd to address two security issues. Both were discovered and reported […]