Cryptoassets Explained: Zcash – ZCash USD (Cryptocurrency:ZEC-USD)

Zcash (ZEC-USD) is a so-called privacy coin. The focus of this cryptocurrency is to protect users being tracked while providing Bitcoin-like (BTC-USD)(COIN)(OTCQX:GBTC) functionality. Zcash was recently added to Coinbase (COINB) through their pro platform, with the expectation of being added to the retail site soon afterwards.

Purpose and Classification

If you have some time, you might check out The Ceremony from Radiolab, which covers the creation of this coin from the inside.

Source: Radiolab

I thought it was a great episode, well worth the listen. Radiolab explains the process in such a way that everyone can understand – the finest sponsored journalism you can find on the topic.

One thing that’s important to note about Zcash is that the privacy part is optional. If you choose to “shield” your transaction, then it will be sent in such a way that’s difficult to trace. However, this mode is not on by default, and for the Coinbase launch there will be some limitations.

Initially, we will support deposits from both transparent and shielded addresses, but only support withdrawals to transparent addresses. In the future, we’ll explore support for withdrawals to shielded addresses in locations where it complies with local laws. For more information on privacy considerations specific to ZEC, visit the official Zcash support page. – Coinbase Blog.

This is similar to what Dash (DASH-USD) does, enabling private transactions upon request. However, Monero (XMR-USD) provides shielding at all times, with no option of turning off this feature.

Taxonomy: Privacy Coin

Age, History, Current Status

Zcash started trading just before Halloween in 2016. There was much fanfare upon its release, and briefly a single Zcash was trading for more than 7 BTC each!


Zcash Close Price data by YCharts

Zcash has a circulating supply of only 5.36 million at the time that I’m writing this (Dec. 1, 2018).

Earlier this year, ASIC machines started to be built to mine Zcash. This caused a stir in the community, because it’s (or was) believed that ASIC machines would centralize the mining power of the network. However, some said that this was inevitable (including Zooko Wilcox, the founder of the project and CEO of the Zcash company). In the end, the decision was that ASIC resistance was not a priority.

Software Development

Because Zcash has a foundation, a company, and a community – I was expecting to see a bit more activity than this.

zcash github activitySource:

However, the Zcash team is responsible for several breakthroughs in cryptography. One of these is the zkSNARK, which will likely be coded into other cryptocurrencies, such as Ethereum (ETH-USD).

The term zkSNARK stands for “zero-knowledge succinct non-interactive arguments of knowledge.” Basically it’s an easy way to verify something without having to reveal anything yourself.

One way to think about this problem is the following: Imagine you walk into a bar. The bartender asks for your ID. Why is he asking? Well, he can’t serve alcohol to anyone under the age of 21. But, what other information do you reveal when you hand someone your driver’s license? Well, there’s your height, weight, street address, eye color, driver’s license number and what else?

The only information the bartender needed was proof that you were at least 21. But he ended up getting a lot more than he needed. If there was a zkSNARK for this situation, the bartender would get the proof he needs to cover his rear, while you don’t have to reveal anything extra. That’s the basic concept. Oh, and it’s way faster.

Market Capitalization

Zcash got a nice bump up in price with the Coinbase listing, moving from the $60 range to the $80 range in the last week. Currently, Zcash is number 19 in market cap.

market capSource:

Exchange Liquidity

There’s something funny about the exchange volume for Zcash. The top three trading pairs all come from an exchange called LBank, which I personally have never heard of. This single exchange makes up 68.61% of the trading volume, and the next exchange up has the exclusion star next to its price. That means something fishy is going on, so the price is excluded from the average.

zcash exchangesSource:

This smells to me of heavy market manipulation. If you would like to trade Zcash, I recommend using Coinbase Pro (and transferring to a cold storage device as soon as possible).

Token Issuance Model

Zcash is a proof of work cryptocurrency, meaning that it’s mined. Mining used to be done with GPUs, but now it’s all about the ASICs. Below you will see a list of the top mining pools.

zcash top mining poolsSource:

Zcash was actually forked from Bitcoin, but several parameters were changed. One of these parameters was the hashing algorithm, which was changed from SHA-256 to Equihash.

However, the most controversial change was the distribution of the mining reward. You see, with Bitcoin 100% of the mining reward goes to the miners. With Zcash, 80% of the reward goes to the miners and the remaining 20% goes somewhere else.

zcash token distributionSource: Twitter

The Zcash foundation gets 3%, the company gets 2.8%, and Zooko personally receives about 2,033 new tokens per month. In today’s terms, that’s a measly $162k per month, down from the $1.88 Million he used to make back in January of this year. Who says you can’t have golden parachutes in crypto?


Zcash has received the stamp of approval from Edward Snowden. However, hard core security proponents will draw a firm line, placing Zcash and Dash in a different league than Monero. Monero is the current “gold standard” for privacy in the cryptoasset world.

Cold storage

Zcash can be stored in a Ledger Nano S or a Trezor hardware wallet.

Security is a main theme of the white paper, so let’s turn to that section now.

White paper

The white paper is 62 pages long, so going through it line by line would be a great replacement for Ambien or sheep counting. But, if you are so inclined, you can do so here.

Some things I noticed while going through it, were:

  • The documentation and references are very thorough.
  • The paper relies heavily on the Bitcoin white paper, from which the project was forked.
  • There are two types of address, shielded and transparent. This is ostensibly for auditability and control over information which people may want to hide or reveal.
  • Zcash builds on top of the Zerocash scheme, but is separate and distinct from it.
  • Private transactions have an address that starts with a z, while transparent addresses always start with a t.

There’s a good amount of discussion in dealing with certain types of attacks and exploits. Overall I think the paper is well written and does not come off like marketing fluff (which happens all too often in this space).


The Zcash company has 72k followers on Twitter. Dash has 319k followers, but they are a much older organization.

On Reddit, there are 14k subscribers on /r/zec. For comparison, Monero has 147k.

Zcash also has a popular community forum. According to SimilarWeb, they got around 95k hits in the month of October.

zcash community forumSource: SimilarWeb

Google trends tells the story from the point of view of Google search volume.

google trends dataSource: Google Trends

Monero is the elephant in the room, but Zcash seems to be staying ahead of Dash. Interestingly, the gap between the privacy coins (it should be noted that the Zcash company sees the term “privacy coin” as diminutive) seems to be closing during this bear market. It will be interesting to see if there’s a shake up once the market turns a corner.


Zcash has taken criticism for branding itself as being focused on privacy, and then making the privacy portion optional. Additionally, the large founder rewards have drawn criticism as well.

If you did listen to the Radiolab podcast, then you know there’s an additional threat to Zcash. That threat is that the magic “seed” or secret code used to initially spawn the network also acts like a skeleton key. If someone were to obtain this key, they could spend funds from the Zcash blockchain at will. This is a big deal.

Many steps were taken to ensure that this code was never discovered, but strange things did happen during “The Ceremony.” Some have questioned whether or not the measures taken were sufficient. You’ll have to make up your own mind on this front, because the truth is that we don’t know for sure.


Despite the risks, I think Zcash is an interesting proposition. The team has proven their acumen both academically and in the business world. I still believe that Monero is a superior choice for privacy, but getting and storing Monero is still a chore (but, we’ll talk about that in another article).

I may take a small position in Zcash in the near future.



This article was published first in Crypto Blue Chips.

Disclosure: I am/we are long BTC-USD, ETH-USD.

I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it (other than from Seeking Alpha). I have no business relationship with any company whose stock is mentioned in this article.

Be the first to comment

Leave a Reply

Your email address will not be published.


Privacy Policy is committed to safeguarding your privacy. Contact us at if you have any questions or problems regarding the use of your Personal Data and we will gladly assist you.

By using this site or/and our services, you consent to the Processing of your Personal Data as described in this Privacy Policy.

Table of Contents

  1. Definitions used in this Policy
  2. Data protection principles we follow
  3. What rights do you have regarding your Personal Data
  4. What Personal Data we gather about you
  5. How we use your Personal Data
  6. Who else has access to your Personal Data
  7. How we secure your data
  8. Information about cookies
  9. Contact information


Personal Data – any information relating to an identified or identifiable natural person.
Processing – any operation or set of operations which is performed on Personal Data or on sets of Personal Data.
Data subject – a natural person whose Personal Data is being Processed.
Child – a natural person under 16 years of age.
We/us (either capitalized or not)

Data Protection Principles

We promise to follow the following data protection principles:

  • Processing is lawful, fair, transparent. Our Processing activities have lawful grounds. We always consider your rights before Processing Personal Data. We will provide you information regarding Processing upon request.
  • Processing is limited to the purpose. Our Processing activities fit the purpose for which Personal Data was gathered.
  • Processing is done with minimal data. We only gather and Process the minimal amount of Personal Data required for any purpose.
  • Processing is limited with a time period. We will not store your personal data for longer than needed.
  • We will do our best to ensure the accuracy of data.
  • We will do our best to ensure the integrity and confidentiality of data.

Data Subject’s rights

The Data Subject has the following rights:

  1. Right to information – meaning you have to right to know whether your Personal Data is being processed; what data is gathered, from where it is obtained and why and by whom it is processed.
  2. Right to access – meaning you have the right to access the data collected from/about you. This includes your right to request and obtain a copy of your Personal Data gathered.
  3. Right to rectification – meaning you have the right to request rectification or erasure of your Personal Data that is inaccurate or incomplete.
  4. Right to erasure – meaning in certain circumstances you can request for your Personal Data to be erased from our records.
  5. Right to restrict processing – meaning where certain conditions apply, you have the right to restrict the Processing of your Personal Data.
  6. Right to object to processing – meaning in certain cases you have the right to object to Processing of your Personal Data, for example in the case of direct marketing.
  7. Right to object to automated Processing – meaning you have the right to object to automated Processing, including profiling; and not to be subject to a decision based solely on automated Processing. This right you can exercise whenever there is an outcome of the profiling that produces legal effects concerning or significantly affecting you.
  8. Right to data portability – you have the right to obtain your Personal Data in a machine-readable format or if it is feasible, as a direct transfer from one Processor to another.
  9. Right to lodge a complaint – in the event that we refuse your request under the Rights of Access, we will provide you with a reason as to why. If you are not satisfied with the way your request has been handled please contact us.
  10. Right for the help of supervisory authority – meaning you have the right for the help of a supervisory authority and the right for other legal remedies such as claiming damages.
  11. Right to withdraw consent – you have the right withdraw any given consent for Processing of your Personal Data.

Data we gather

Information you have provided us with
This might be your e-mail address, name, billing address, home address etc – mainly information that is necessary for delivering you a product/service or to enhance your customer experience with us. We save the information you provide us with in order for you to comment or perform other activities on the website. This information includes, for example, your name and e-mail address.

Information automatically collected about you
This includes information that is automatically stored by cookies and other session tools. For example, your shopping cart information, your IP address, your shopping history (if there is any) etc. This information is used to improve your customer experience. When you use our services or look at the contents of our website, your activities may be logged.

Information from our partners
We gather information from our trusted partners with confirmation that they have legal grounds to share that information with us. This is either information you have provided them directly with or that they have gathered about you on other legal grounds. See the list of our partners here.

Publicly available information
We might gather information about you that is publicly available.

How we use your Personal Data

We use your Personal Data in order to:

  • provide our service to you. This includes for example registering your account; providing you with other products and services that you have requested; providing you with promotional items at your request and communicating with you in relation to those products and services; communicating and interacting with you; and notifying you of changes to any services.
  • enhance your customer experience;
  • fulfil an obligation under law or contract;

We use your Personal Data on legitimate grounds and/or with your Consent.

On the grounds of entering into a contract or fulfilling contractual obligations, we Process your Personal Data for the following purposes:

  • to identify you;
  • to provide you a service or to send/offer you a product;
  • to communicate either for sales or invoicing;

On the ground of legitimate interest, we Process your Personal Data for the following purposes:

  • to send you personalized offers* (from us and/or our carefully selected partners);
  • to administer and analyse our client base (purchasing behaviour and history) in order to improve the quality, variety, and availability of products/ services offered/provided;
  • to conduct questionnaires concerning client satisfaction;

As long as you have not informed us otherwise, we consider offering you products/services that are similar or same to your purchasing history/browsing behaviour to be our legitimate interest.

With your consent we Process your Personal Data for the following purposes:

  • to send you newsletters and campaign offers (from us and/or our carefully selected partners);
  • for other purposes we have asked your consent for;

We Process your Personal Data in order to fulfil obligation rising from law and/or use your Personal Data for options provided by law. We reserve the right to anonymise Personal Data gathered and to use any such data. We will use data outside the scope of this Policy only when it is anonymised. We save your billing information and other information gathered about you for as long as needed for accounting purposes or other obligations deriving from law, but not longer than 1 year.

We might process your Personal Data for additional purposes that are not mentioned here, but are compatible with the original purpose for which the data was gathered. To do this, we will ensure that:

  • the link between purposes, context and nature of Personal Data is suitable for further Processing;
  • the further Processing would not harm your interests and
  • there would be appropriate safeguard for Processing.

We will inform you of any further Processing and purposes.

Who else can access your Personal Data

We do not share your Personal Data with strangers. Personal Data about you is in some cases provided to our trusted partners in order to either make providing the service to you possible or to enhance your customer experience. We share your data with:

Our processing partners:


Our business partners:


Connected third parties:


We only work with Processing partners who are able to ensure adequate level of protection to your Personal Data. We disclose your Personal Data to third parties or public officials when we are legally obliged to do so. We might disclose your Personal Data to third parties if you have consented to it or if there are other legal grounds for it.

How we secure your data

We do our best to keep your Personal Data safe. We use safe protocols for communication and transferring data (such as HTTPS). We use anonymising and pseudonymising where suitable. We monitor our systems for possible vulnerabilities and attacks.

Even though we try our best we can not guarantee the security of information. However, we promise to notify suitable authorities of data breaches. We will also notify you if there is a threat to your rights or interests. We will do everything we reasonably can to prevent security breaches and to assist authorities should any breaches occur.

If you have an account with us, note that you have to keep your username and password secret.


We do not intend to collect or knowingly collect information from children. We do not target children with our services.

Cookies and other technologies we use

We use cookies and/or similar technologies to analyse customer behaviour, administer the website, track users’ movements, and to collect information about users. This is done in order to personalize and enhance your experience with us.

A cookie is a tiny text file stored on your computer. Cookies store information that is used to help make sites work. Only we can access the cookies created by our website. You can control your cookies at the browser level. Choosing to disable cookies may hinder your use of certain functions.

We use cookies for the following purposes:

  • Necessary cookies – these cookies are required for you to be able to use some important features on our website, such as logging in. These cookies don’t collect any personal information.
  • Functionality cookies – these cookies provide functionality that makes using our service more convenient and makes providing more personalised features possible. For example, they might remember your name and e-mail in comment forms so you don’t have to re-enter this information next time when commenting.
  • Analytics cookies – these cookies are used to track the use and performance of our website and services
  • Advertising cookies – these cookies are used to deliver advertisements that are relevant to you and to your interests. In addition, they are used to limit the number of times you see an advertisement. They are usually placed to the website by advertising networks with the website operator’s permission. These cookies remember that you have visited a website and this information is shared with other organisations such as advertisers. Often targeting or advertising cookies will be linked to site functionality provided by the other organisation.

You can remove cookies stored in your computer via your browser settings. Alternatively, you can control some 3rd party cookies by using a privacy enhancement platform such as or For more information about cookies, visit

We use Google Analytics to measure traffic on our website. Google has their own Privacy Policy which you can review here. If you’d like to opt out of tracking by Google Analytics, visit the Google Analytics opt-out page.

Read more about cookies on our Cookie Policy

Contact Information

email: [email protected]

Changes to this Privacy Policy

We reserve the right to make change to this Privacy Policy.

You can configure your Internet browser, by changing its options, to stop accepting cookies completely or to prompt you before accepting a cookie from the website you visit. If you do not accept cookies, however, you may not be able to use all portions of the WideBitcoin Websites or all functionality of the Services.

Please note that disabling these technologies may interfere with the performance and features of the Services.

You may also disable cookies on the WideBitcoin Sites by modifying your settings here:

Visitor comments may be checked through an automated spam detection service.

Last Update: May 25, 2018