Haven Protocol

by Haven

(0)
View Profile

ZCash

by Zerocoin Electric Coin Company

(0)
View Profile

TokenPay

by TokenPay

(0)
View Profile

Haven Protocol

by Haven

(0)
View Profile

ZCash

by Zerocoin Electric Coin Company

(0)
View Profile

TokenPay

by TokenPay

(0)
View Profile

What problem does this service solve?

Haven aims to develop a decentralized ecosystem that will accommodate multiple private, price-stable currencies.ZCash allows users to make transactions anonymously.TokenPay wants to encourage wider adoption of cryptocurrency by emphasizing stronger privacy and more merchant services.

Token Stats

Company Description

Haven is developing a blockchain-based ecosystem of multiple decentralized coins. The Haven protocol places an emphasis on privacy and price-stability, and like Monero, is based on the CryptoNote protocol. Haven has a Proof-of-Work (PoW) consensus mechanism that is AISC-resistant, and has a dynamic block size. The platform is powered by the XHV coin.

ZCash is a privacy focused cryptocurrency protocol that enables users to make transactions anonymously. Users to hide the sender, receiver, and amount of every transaction. ZCash has several high profile advisers and investors, including: Roger Ver, Gavin Andresen, and Vitalik Buterin.
ZCash has a fixed supply of 21 million coins; 20% of which will be allocated as a founders reward that is split between investors and developers. This founders reward has been the subject of controversy and has led to a fork of the ZCash protocol.

TokenPay is a Proof-of-Stake (PoS) blockchain powered by the native TPAY coin. TokenPay hopes to encourage wider adoption of its cryptocurrency by focusing on privacy and merchant services that will make it easier for crypto to be widely used as a medium of exchange. TokenPay also places a strong emphasis on security and anonymity. The network's architecture uses zero-knowledge proofs, ring signatures, and other features to increase privacy. They are also developing an encrypted messaging system that allows users to communicate securely within their network secure communication interface

Ratings

(0)

(0)

(0)