TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The Crazy Security Behind the Birth of Zcash, the Inside Story

3 pointsby sangfroidover 8 years ago

1 comment

nickparkerover 8 years ago
Zcash&#x27;s more technical blogpost on the process can be found here:<p><a href="https:&#x2F;&#x2F;z.cash&#x2F;blog&#x2F;snark-parameters.html" rel="nofollow">https:&#x2F;&#x2F;z.cash&#x2F;blog&#x2F;snark-parameters.html</a><p>Personally, I found it a bit odd that they went through the effort of a multi-party computation set up, but then allowed cell phones in the room with the computers and communicated about the computation via Google Hangouts.<p>The articles both claim side-channel attacks can&#x27;t be performed on the processors used with the recording equipment present, but my qualm is we don&#x27;t know how capable nation-state actors are in that arena. The creators of Zcash conversing over Hangouts seems like a surefire way to get the kind of attention they didn&#x27;t want. I mean either NSA has already beaten Zcash soundly, or they&#x27;ll be surveilling the creators with extreme prejudice and all but guaranteed to catch a <i>Google Hangout.</i>