Pirate Chain vs Haven Protocol vs Hush
What problem does this service solve?
Pirate Chain uses enhanced cryptography and a privacy focused consensus mechanism to allow users to send digital assets anonymously. | Haven aims to develop a decentralized ecosystem that will accommodate multiple private, price-stable currencies. | Hush uses uses zero-knowledge cryptography to allow users to send anonymous transactions and messages. |
Token Stats
Company Description
Pirate Chain is a privacy focused cryptocurrency that is based on Komodo's dPoW consensus mechanism. Pirate Chain uses ZK-Snark cryptography to secure transactions that are sent on their anonymous, decentralized network. | Haven is developing a blockchain-based ecosystem of multiple decentralized coins. The Haven protocol places an emphasis on privacy and price-stability, and like Monero, is based on the CryptoNote protocol. Haven has a Proof-of-Work (PoW) consensus mechanism that is AISC-resistant, and has a dynamic block size. The platform is powered by the XHV coin. | Hush is a cryptocurrency and messaging protocol that is focused on privacy. It uses a the equihash mining algorithm, which is a Proof-of-Work (PoW) consensus mechanism. It offers a high degree of privacy, and allows users to transact and send messages anonymously. |