Read

Edit

History

Notify

Share

Pirate Chain

Pirate Chain is a comprehensive privacy-centered cryptocurrency. It uses a privacy protocol that cannot be compromised by other users on the network. Pirate Chain uses ZK-Snarks to shield 100% of the peer-to-peer transactions on the blockchain making for highly anonymous and private transactions.[1] 

Overview

On 29 August 2018, several developers from the Komodo community piloted an independent asset chain with the technology offered by Komodo Platform. Pirate Chain harnesses Delayed Proof-of-work (dPoW) from Komodo, zero-knowledge proof (zk-SNARKs) transactions from Zcash, and the rule of enforced private-only transactions by Monero.[2]

Pirate (ARRR) projects itself as a 100% private send cryptocurrency, as well as the first 'z transaction-only' chain. ZK-Snarks technology (zero-knowledge cryptography) is utilized to shield peer to peer transactions.[3]

Pirate is protected from 51% attacks by utilizing Komodo’s dPoW, this reveals that its blocks are notarized onto both Komodo and Bitcoin blockchains.[1]

Attempts to mount a Sybil attack against Pirate would have to overcome the combined hashrates of Bitcoin, Komodo (Cryptocurrency), and Pirate. This is an astronomical cost that would deter malicious actors. Pirate started with a fair launch - no ICO, premine, and 0 dev fees.[2] 

Features

Pirate Chain is feature complete and ready for further community development . Some of its unique features include:

  • Independent technology

  • Ready to use

  • private transactions

  • total anonymity ( TOR (anonymity network) supported)

  • Future proof

The developers who created zcash, which Pirate Chain is based on, are of the opinion that:

the best use of the protocol is a chain that requires private sends only. Delayed Proof of Work (dPoW) protects Pirate’s blockchain from damage against double spends and 51% attacks by attaching a backup of the ARRR chain to the Bitcoin Blockchain.

In order have a 51% attack on Pirate, you would have to first 51% attack Bitcoin. This makes security against double spends and hostile takeovers nearly impossible if not impossible altogether.[3] 

See something wrong? Report to us.

Pirate Chain

Feedback

Did you find this article interesting?

Twitter Timeline

Loading...

Loading

REFERENCES

Join the IQ Brainlist

Sign up for the IQ Brainlist to get early access to editing on the IQ.wiki beta site!

Join Now

Subscribe to our newsletter

Never miss any of the most popular and trending articles on IQ.wiki when you sign up to our email newsletter.

Subscribe

IQ.wiki

IQ.wiki's vision is to bring blockchain knowledge to the world and knowledge onto the blockchain. A part of Brainfund Group.

https://twitter.com/IQWIKIhttps://www.reddit.com/r/Everipedia/https://t.me/everipediahttps://www.instagram.com/iqwiki_/https://github.com/EveripediaNetworkhttps://discord.gg/x9EWvTcPXthttps://web.facebook.com/everipedia?_rdc=1&_rdr

IQ

What's IQ?StakingBonds

Company

About usCareersBrandingIQ GPTIQ Dashboard

© 2023 IQ.wiki Powered By BrainDAO& IQ