Privacy is practically essential to people and thus deserving of protection — it is, in addition, important for autonomy. Liberalism is one of the core characteristics of the metacosm.

Liberalism as a political philosophy aims to protect the rights of the autonomous individual. Insofar as individual autonomy and privacy are…


Zecrey Chameleon Avatar NFT Fair Mint Event now is alive!

In order to grant early supporters of Zecrey Protocol, we are launching a limited edition NFT fair mint event for the first time on 23rd, October. Zecrey Protocol aims to bring privacy protection and secure cross-chain bridge in the crypto world and a better DeFi product experience to users, and…


In October 2021, Zecrey won the grant from Polygon foundation, the full-stack solution for Ethereum scaling and infrastructure development.

This fund will be used for further research and development of Zecrey, a novel privacy protocol that brings privacy to digital assets. The speed at which the Zecrey protocol progress on…


In the last article, we attempted to identify three kinds of privacy threats in the metaverse, from which we find that metaverse privacy protection is undoubtedly a critical and profound research hotspot. Then, we will naturally think which are the best strategies available that will allow us to deal with…


In the last article, we distinguished three different kinds of privacy in metaverse, named informational privacy, physical privacy, and associational privacy. Based on this distinction, we attempt to identify three kinds of threats to privacy in metaverse.

There are several threats to informational privacy. As we know, VRSNs (Virtual Reality…


In the last article, we gave a detailed introduction to Metaverse and analyzed the potential privacy issues from the following three perspectives: data security, intellectual property, and the globality and interoperability of Metaverse. As we put forward, although it will experience a long history of development before Metaverse has a…


The famous American science fiction novelist Neal Stephenson (Snow Crash) described a network world parallel to the real world called Metaverse in 1992 [1]. All people in the real world have an Avatar in the metaverse. Stephenson’s metaverse is a new form of the Internet in the next stage after…


In the last medium, we have conducted a detailed demonstration of the definition and common implementation schemes of cross-chain technologies among the current blockchain systems. The current cross-chain solutions are mainly based on the bridge, which is customized to realize the transfer of mainstream cryptocurrency for personal accounts. The complicated…


There were more than 10,000 cryptocurrencies currently in circulation, according to CoinMarketCap. While most of these will be built upon the Ethereum blockchain, many are not. Besides, according to statistics from DeFi Llama, the amount of DeFi locked up on Ethereum has exceeded 100 billion dollars [1]. …


In the last article, we introduced three types of security and privacy techniques of blockchain, including mixing, anonymous signatures, and homomorphic encryption. In this section, we provide a detailed discussion on the rest of security techniques that can be leveraged to enhance security and privacy of existing and future blockchain…

Zecrey Protocol

BRING PRIVACY VALUE FOR ASSETS.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store