information about bitcoin, new altcoin and token

Breaking

Zerolink



Zerolink claims to develop a method to facilitate the payment of anonymous bitcoin completely. Zerolink consists of collaborations between developers of the privacy-centric service of Samouraiwallet and Hiddenwallet.


Zerolink Claims That Its “Wallet Privacy Framework” And “Chaumian Coinjoin” Mixing Techniques Are Able to Ensure Anonymous Bitcoin Payments

Zerolink has claimed to successfully have developed a method for facilitating fully anonymous bitcoin payments. Zerolink says that its “Wallet Privacy Framework” and “Chaumian Coinjoin” mixing techniques are able to ensure the privacy of transactions and remain impervious to network analysis.
The mixing technique employed by Zerolink to ensure anonymous bitcoin transactions expands on the work of Gregory Maxwell, who in 2013 conceived “Coinjoin”. “Using chaum blind signatures: The users connect and provide inputs (and change addresses) and a cryptographically-blinded version of the address they want their private coins to go to; the server signs the tokens and returns them. The users anonymously reconnect, unblind their output addresses, and return them to the server. The server can see that all the outputs were signed by it and so all the outputs had to come from valid participants. Later people reconnect and sign.”

Zerolink Claim That Their Anonymizing Process Can Be Conducted in Seconds, Whilst Incurring Minimal Fees


By using the 'Chaumian Coinjoin' process, Zerolink claims that they are capable of "mixing in seconds," and the process is "cheap enough". The company also stated that the high transaction costs currently associated with bitcoin transactions have enabled them to develop "an elegant way to make it uneconomical for criminals to interfere with the merging of rounds."

Samouraiwallet and Hiddenwallet have announced that they are "fully committed to implementing the" Wallet Privacy Template "into their services. Despite the theory underlying Zerolink's mixing technique that has existed for many years, the company claims to be the first to successfully implement it because of the challenges needed to develop ddos protection.