Tezos launches post-quantum privacy prototype using zk-stark proofs

Tezos developers have launched a prototype for private payments that resists quantum computing attacks. The system employs zk-stark proofs to safeguard encrypted blockchain data against future threats.

Tezos developers launched the post-quantum private payments prototype as networks prepare for potential quantum computing risks. The effort focuses on protecting encrypted data on the blockchain from advanced attacks that could emerge in coming years.

Relaterte artikler

U.S. Treasury report illustration showing holographic tech pillars for crypto compliance: AI monitoring, digital ID, blockchain analytics, and data APIs, with privacy mixer endorsement.
Bilde generert av AI

U.S. Treasury report proposes AI, digital ID pillars for crypto compliance; endorses lawful mixer privacy

Rapportert av AI Bilde generert av AI

The U.S. Treasury Department submitted a report to Congress on March 9, 2026—commissioned under the GENIUS Act—outlining four technological pillars to enhance transparency in cryptocurrency transactions: artificial intelligence for monitoring, digital identity for onboarding, blockchain analytics for tracing, and interoperable data-sharing APIs. It describes digital assets as key to U.S. innovation leadership while acknowledging lawful users' need for privacy tools like mixers on public blockchains, amid risks from illicit exploitation.

Zcash announced plans to introduce quantum-recoverable wallets within a month and achieve full post-quantum security by 2027. The privacy-focused cryptocurrency also outlined scaling upgrades during an event in Miami.

Rapportert av AI

Crypto companies are updating their wallets to guard against potential quantum computing risks to major networks like Bitcoin and Ethereum.

Building on 2026 qubit reductions like Iceberg Quantum's qLDPC breakthrough, recent studies project quantum computers cracking RSA-2048 and ECDLP-256 by 2029. Google and cybersecurity experts warn of imminent Q-Day, pushing post-quantum cryptography to avert a crisis worse than Y2K, with businesses ramping up quantum-safe migrations.

Rapportert av AI

Ethereum co-founder Vitalik Buterin has proposed a layered approach to cryptocurrency security that emphasizes redundancy and multi-angle verification to align systems with user intentions. Published on February 22, 2026, his framework acknowledges the impossibility of perfect security due to the complexity of human intent. The strategy aims to protect users from hacks and exploits while preserving usability.

Proton VPN has announced its spring and summer 2026 roadmap, promising faster speeds, enhanced security, and more servers amid rising online censorship. The updates include an improved WireGuard protocol, a redesigned Linux app with Stealth support, and over 20,000 servers across 145 countries. Product lead Antonio Cesarano emphasized making privacy easier in a challenging digital world.

Rapportert av AI

Researchers have developed algorithms called phantom codes to make quantum computers less error-prone, potentially allowing them to run complex simulations more efficiently. These codes enable entanglement of logical qubits without physical manipulations, cutting down on error risks. The approach shows promise for tasks requiring extensive entanglement, though it is not a complete solution to quantum computing challenges.

 

 

 

Dette nettstedet bruker informasjonskapsler

Vi bruker informasjonskapsler for analyse for å forbedre nettstedet vårt. Les vår personvernerklæring for mer informasjon.
Avvis