Pirate Chain vs Hush vs Beam
What problem does this service solve?
Pirate Chain uses enhanced cryptography and a privacy focused consensus mechanism to allow users to send digital assets anonymously. | Hush uses uses zero-knowledge cryptography to allow users to send anonymous transactions and messages. | BEAM aims to create a blockchain platform that will provide complete transaction confidentiality and can also be audited to ensure regulatory compliance. |
Token Stats
Company Description
Pirate Chain is a privacy focused cryptocurrency that is based on Komodo's dPoW consensus mechanism. Pirate Chain uses ZK-Snark cryptography to secure transactions that are sent on their anonymous, decentralized network. | Hush is a cryptocurrency and messaging protocol that is focused on privacy. It uses a the equihash mining algorithm, which is a Proof-of-Work (PoW) consensus mechanism. It offers a high degree of privacy, and allows users to transact and send messages anonymously. | Beam is developing a confidential cryptocurrency that uses the Mimblewimble protocol. It will have a Proof-of-Work (PoW) consensus mechanism, and will enable private transactions that can be audited for compliance purposes. |