Private – Secure – Untraceable – Resilient – Minable


Zen is a privacy platform built on zero-knowledge Succinct Non-interactive ARguments of Knowledge (zk-SNARKs) technology with a decentralized secure node architecture.


ZenCash is the first cryptocurrency with fully end-to-end encryption at the node and internode level.

In addition to zk-SNARKs, the Zen architecture includes encryption at the node level. Cryptocurrencies rely on nodes to operate, we require our Secure Node operators to have the latest Information Technology and Network Security to qualify for compensation.


Shielded transactions are fully encrypted, yet can be verified as valid under the network's consensus. The sender, recipient, and amount are hidden on the blockchain, making Zen completely untraceable.

Download White Paper

Domain fronting is a versatile censorship circumvention technique that hides the remote endpoint of a communication. It works at the application layer, using HTTPS, to communicate with a forbidden host while appearing to communicate with some other host, permitted by the censor.

The key idea is the use of different domain names at different layers of communication. One domain appears on the “outside” of an HTTPS request–in the 9 DNS request and TLS Server Name Indication, while another domain appears on the “inside”–in the HTTP Host header, invisible to the censor under HTTPS encryption. A censor, unable to distinguish fronted and non-fronted traffic to a domain, must choose between allowing circumvention traffic and blocking the domain entirely, which results in expensive collateral damage.

Domain fronting does not require special cooperation by network intermediaries. We identify a number of hard-to-block web services, such as content delivery networks, that support domain-fronted connections and are useful for censorship circumvention.


Zen has one of the most distributed node systems. Learn more about Secure Nodes!

Check out our Secure Node network

Zen Secure Nodes enable a distributed and reliable cryptocurrency system that encrypts inter-node communications. Zen node communication looks like any other encrypted internet traffic, instead of like Bitcoin traffic. This effectively hides the type of activity taking place, making it less likely that Zen users and nodes are blocked.

The basic requirements of Secure Nodes are:

  • Maintain a minimum of 42 ZenCash in transparent address per node. This sufficiently demonstrates that the operator cares enough about ZenCash and discouraging users with malicious intentions from operating a Secure Node.
  • Create and maintain a valid TLS certificate from a known Certificate Authority. This enables encrypted data transport.
  • Run the node on a server with enough processor power and memory so that it can meet a computational challenge. This protects against DDoS attacks.
  • Maintain a full copy of the Zen blockchain. This makes sure no UTXO’s or commitments are lost.
  • Keep the node up and running at least 92% of the time.

Decentralized Autonomous Organization (DAO) Treasury

ZenCash Treasury Model is an inclusive, provably fair, and transparent economic system with incentives to participate.


Anyone with a modern Graphic Card can mine ZenCash, a proof-of-work, equihash-based cryptocurrency and works well for GPU mining.

Mining Pools

ZenCash is Money

ZenCash allows for easy transfer of value by using regular (T) and private (Z) addresses.

T addresses are regular addresses and transactions similar to bitcoin.

Z addresses are called shielded transactions and leverage the latest privacy technology to obscure sender and recipient addresses, as well as amount sent.

Balances in shielded addresses are private. If spending to one or more shielded addresses, the value stays private but any transparent addresses on the receiving end will deshield the token and reveal the value received on the blockchain.

ZenCash is compatible with Bitcoin- and Z-derived applications, exchanges, and wallets.

Our Philosophy