Privacy on L1: Stealth, ZK & Coin-set Tricks

12 min read

Privacy L1 blockchains mechanisms showing ring signatures zero knowledge proofs and trusted execution environments

Key Takeaways

  • Privacy-focused L1 blockchains build transaction confidentiality directly into the base layer rather than relying on add-on mixers or Layer 2 solutions
  • Three main approaches dominate: classic privacy coins with shielded transactions, programmable zero-knowledge L1s, and confidential smart contract platforms using Trusted Execution Environments
  • Monero uses mandatory ring signatures with 16 decoys to hide transaction origins, while Zcash offers optional privacy through zk-SNARKs for selective transparency
  • New programmable privacy L1s like Aleo and Mina enable private state transitions and zero-knowledge applications through developer-friendly languages
  • Privacy implementations face ongoing regulatory scrutiny, with multiple exchanges delisting mandatory-privacy coins while selective-privacy options gain institutional interest

Article Summary

Privacy L1 blockchains integrate transaction and smart contract privacy directly into the protocol layer, using cryptographic techniques ranging from ring signatures and stealth addresses to zero-knowledge proofs and Trusted Execution Environments. These base-layer privacy solutions offer stronger confidentiality guarantees than add-on mixers while enabling use cases from private payments to confidential DeFi, though they navigate complex regulatory landscapes and technical trade-offs between privacy strength, performance, and developer experience.

What Are Privacy L1 Blockchains?

Privacy L1 blockchains are base-layer networks that integrate transaction and smart contract privacy directly into the protocol rather than relying on add-on mixers or Layer 2 solutions1. Unlike transparent blockchains where anyone can trace transaction history, these networks use advanced cryptography to keep sensitive information hidden while maintaining verifiability.

The fundamental challenge these blockchains solve is simple: transparent public ledgers expose every financial detail. When you send Bitcoin or Ethereum, anyone can see exactly how much you sent, where it went, and trace your entire transaction history2. For businesses, this creates competitive disadvantages. For individuals, it eliminates financial privacy entirely.

Privacy L1s use different cryptographic approaches to address this problem. Some hide transaction origins through mixing techniques. Others use mathematical proofs that verify correctness without revealing underlying data. A few employ hardware-based secure environments that keep information encrypted even during processing3.

Why Base-Layer Privacy Matters

Building privacy into the base layer provides stronger guarantees than add-on solutions4. When privacy is optional or bolted on afterward, it creates weaker anonymity sets. Fewer users means easier tracking. Protocol-level privacy ensures everyone benefits from the same protection, making individual transactions harder to isolate.

For crypto miners and validators, privacy L1s offer new infrastructure opportunities. These networks often require specialized hardware or proving services, creating revenue streams beyond standard transaction validation. Understanding how different privacy mechanisms work helps you choose which networks to support.

Main Categories of Privacy L1 Blockchains

Privacy-focused L1 blockchains fall into three main categories, each using different cryptographic approaches to achieve confidentiality.

Classic Privacy Coins: Ring Signatures and Stealth Addresses

Projects like Monero and Zcash pioneered privacy at the base layer using UTXO-style architectures with shielded transactions5. Monero mandates privacy for every transaction, using ring signatures that mix your signature with 15 decoys from past transactions6. This creates plausible deniability – observers see 16 possible signers but cannot determine which is real.

Ring signatures work by forming a mathematical “ring” where each member’s signature appears equally valid7. When you spend Monero, the network verifies someone in the ring authorized the transaction without revealing who. Combined with stealth addresses that generate unique one-time addresses for each payment, Monero achieves strong sender and receiver privacy8.

Zcash takes a different approach with optional privacy9. Using zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge), Zcash lets users choose between transparent or shielded transactions. Shielded transactions encrypt sender, receiver, and amount data while proving validity through cryptographic proofs under 1KB in size10.

Programmable Zero-Knowledge L1s

Newer L1s like Aleo and Mina push beyond simple payment privacy to enable private programmable state11. These networks let developers build applications where computation happens off-chain with only succinct zero-knowledge proofs posted on-chain.

Aleo uses the Leo programming language, designed to abstract complex cryptography so developers can build privacy-preserving applications without deep cryptographic knowledge12. Programs execute off-chain through snarkVM, generating proofs that validators verify on-chain through snarkOS13. This architecture enables unlimited compute for applications while keeping costs low and privacy strong.

Mina Protocol takes a unique approach with a constant 22KB blockchain size maintained through recursive zero-knowledge proofs14. Anyone can verify the entire chain state from a browser, making Mina exceptionally accessible. Using o1js, a TypeScript library for writing zero-knowledge programs, developers build zkApps that keep user data off-chain while proving correctness on-chain15.

Confidential Smart Contract Platforms

Oasis Network represents a third approach using Trusted Execution Environments (TEEs) combined with cryptography16. The Sapphire confidential EVM runs smart contracts inside Intel SGX hardware isolation, encrypting all memory used by the enclave17.

This design provides near-native EVM performance compared to computationally expensive zero-knowledge approaches18. Developers write standard Solidity contracts that execute with full confidentiality – node operators cannot see transaction inputs, outputs, or smart contract state19. The Oasis Privacy Layer extends this to other EVM networks, letting developers add privacy features to existing applications20.

Quick Decision Guide: Choosing Privacy L1 Approaches

Your NeedBest Privacy ApproachRepresentative L1Key Consideration
Mandatory payment privacyRing signatures + stealth addressesMonero (XMR)Faces exchange delistings but strongest payment privacy
Optional privacy for compliancezk-SNARKs with selective transparencyZcash (ZEC)Flexible privacy appeals to institutions
Private programmable applicationsOff-chain ZK compute + on-chain proofsAleo, MinaRequires learning new languages (Leo, o1js)
Confidential EVM compatibilityTEE-based executionOasis SapphireHardware trust assumptions but fastest performance
UTXO privacy with flexibilityCoin-set model with ChialispChia NetworkEnhanced privacy through coin splitting

How Privacy Mechanisms Compare

Each privacy approach involves different trade-offs in security assumptions, performance, and complexity. Understanding these differences helps developers and validators choose which networks to build on or support.

Performance and Cost Considerations

Zero-knowledge proofs provide strong privacy guarantees but require significant computational resources to generate21. Aleo addresses this through dedicated provers who compete to generate SNARK proofs, earning rewards for their work22. This distributed proving model shifts computational costs off end users while incentivizing GPU operators.

TEE-based approaches like Oasis Sapphire offer much lower computational overhead since the EVM runs at near-native speed inside secure enclaves23. However, TEEs introduce hardware trust assumptions – you must trust Intel SGX isolation works correctly despite known vulnerabilities like Spectre and Meltdown24.

Ring signature systems like Monero balance privacy and efficiency through ring size selection25. Current ring size of 16 provides strong anonymity while keeping transaction sizes manageable at under 2KB26. Larger rings would improve privacy but increase blockchain bloat.

Developer Experience and Tooling

Privacy L1s vary dramatically in developer accessibility. Oasis Sapphire offers the easiest onboarding since developers use familiar Solidity and existing EVM tools like Hardhat27. Porting Ethereum dApps requires minimal changes, though taking full advantage of confidentiality needs some modifications.

Aleo’s Leo language and Mina’s o1js represent new paradigms. Leo uses Rust-like syntax to simplify zero-knowledge circuit creation, while o1js leverages TypeScript for broad developer appeal28. Both abstract cryptographic complexity but require learning new mental models around private state management.

According to Aleo co-founder Howard Wu: “By abstracting away the low-level cryptography, developers can focus on the logic of their application and not the extensive cryptography knowledge that used to be needed to build with zero-knowledge”29.

Comparison: Privacy L1 Technical Specifications

ChainPrivacy MechanismProgrammabilityPerformanceMain Trade-off
MoneroRing signatures (16 decoys), stealth addresses, RingCTLimited scripting, no full smart contracts~2-3 minutes confirmation, low feesStrong privacy but no programmability
Zcashzk-SNARKs (Halo 2), optional shielded transactionsLimited, primarily payment focused75-second blocks, sub-1KB proofsOptional privacy reduces anonymity sets
Aleozk-SNARKs (Varuna), off-chain executionFull Turing-complete (Leo language)Heavy proving requirements, fast verificationComplex development, proving costs
MinaRecursive zk-SNARKs, constant 22KB chainFull (o1js/TypeScript)Light verification, circuit complexityDeveloper learning curve for circuits
Oasis SapphireTEE (Intel SGX) + cryptographyFull EVM compatibility (Solidity)Near-native EVM speed, low costsHardware trust assumptions
ChiaCoin-set model, multiple coins per userFull (Chialisp)20-40 TPS, low feesEnhanced privacy through design, not cryptography

Privacy in Different Execution Models

Beyond cryptographic techniques, blockchain execution models themselves impact privacy. Chia’s coin-set model offers natural privacy advantages through its UTXO-like design30.

Coin-Set Privacy Advantages

In Chia’s coin-set model, wealth splits across multiple independent coins rather than consolidated in a single account balance31. Each coin is a first-class object with its own puzzle (smart contract) and amount. This architecture provides several privacy benefits:

First, coin splitting makes transaction tracking harder compared to account models32. Your total balance distributes across many coins of different values, each with independent spending conditions. Observers cannot easily link these coins to calculate your total wealth.

Second, coins are sandboxed – one coin’s puzzle cannot access or affect another coin’s state33. This isolation prevents information leakage between different parts of your holdings. In contrast, account-based models concentrate all value and logic in one location.

Third, deterministic spend rules mean every coin spend is predictable and verifiable without revealing additional context34. The blockchain validates each spend independently without needing to check account history or balances.

Privacy and Regulatory Challenges

Privacy-focused blockchains navigate complex regulatory environments. Mandatory-privacy coins face the most scrutiny.

Exchange Delistings and Market Access

Monero has faced significant regulatory pressure, with Binance delisting XMR in 2024 due to its mandatory anonymity35. Multiple major exchanges have followed, restricting market access for users. Despite this, Monero’s community has embraced decentralization through tools like Haveno DEX for peer-to-peer fiat-to-XMR trading36.

Zcash’s optional privacy model positions it more favorably with regulators37. Users can choose transparent transactions for compliance while maintaining the option for shielded transactions when privacy is needed. This flexibility has attracted institutional interest, with Zcash seeing significant price appreciation in late 202538.

Emerging regulations like the EU’s MiCA framework and the FATF Travel Rule require exchanges to share sender and recipient information39. Privacy coins that cannot comply face ongoing delisting risks, though demand for financial confidentiality continues growing despite regulatory headwinds.

Balancing Privacy and Compliance

Selective disclosure mechanisms offer a middle ground. Zcash users can share view keys for audits without exposing spending capability40. Aleo and Mina enable programmable privacy where applications define exactly what information is public versus confidential41.

This configurable approach appeals to enterprises needing compliance features. Oasis Sapphire’s confidential EVM lets developers build smart contracts that are “100% confidential, 100% public, or anywhere in between”42. Applications can prove compliance without revealing sensitive business data.

Real-World Use Cases Beyond Payments

Privacy L1s enable applications impossible on transparent blockchains.

Private DeFi and Trading

Confidential smart contracts allow building DeFi applications without exposing trading strategies or portfolio positions43. On Oasis, projects like illumineX create confidential DEXs where order books and trade details remain hidden44.

Zero-knowledge applications on Aleo and Mina enable private token swaps and lending protocols. Users can prove creditworthiness through ZK proofs without revealing actual holdings or transaction history45.

Identity and Credentials

Privacy-preserving identity solutions let users prove attributes without revealing underlying data46. You can demonstrate your credit score exceeds a threshold without exposing the actual number or your financial history.

Mina’s zkApps enable verifiable credentials where holders control what information they disclose47. Organizations can verify user claims without accessing sensitive personal data, enabling compliant identity systems that respect privacy.

Confidential Governance

Secret voting protects DAO member expression and enables unbiased governance48. When votes are public, early voters influence later participants and expose minority positions to retaliation. Privacy-preserving voting systems address these issues while maintaining verifiable results.

Expert Insights on Privacy Technology

Privacy technology represents a fundamental shift in blockchain architecture. As the industry matures, experts emphasize the importance of programmable privacy over binary public-private distinctions.

Zooko Wilcox-O’Hearn, founder of the Electric Coin Company and Zcash, has long championed selective disclosure: “Privacy in money is like encryption in messaging. Nobody bans private messages just because criminals might use them”49. This philosophy underlies Zcash’s optional privacy model, designed to balance regulatory concerns with user rights.

The approach resonates beyond ideological arguments. As governments worldwide refine blockchain legal frameworks, optional-privacy solutions face less resistance than mandatory-privacy alternatives. Zcash’s 410% price surge in late 2025 reflects renewed institutional interest in privacy coins that can demonstrate compliance50.

Future Developments in Privacy L1s

Privacy blockchain technology continues evolving rapidly with several major upgrades planned for 2025-2026.

Monero Seraphis Upgrade

Expected in late 2025 or early 2026, Seraphis represents a massive overhaul of Monero’s privacy technology51. The upgrade aims to enable “one-of-all” ring signatures that make tracing nearly impossible while improving wallet syncing and reducing storage requirements. This could be Monero’s biggest protocol upgrade since introducing RingCT.

Mina’s Mesa Upgrade

Mina’s community voted on the Mesa upgrade in December 2025, which reduces block times, increases zkApp flexibility, and expands on-chain state limits52. These improvements aim to boost throughput and developer experience, critical for scaling privacy-focused decentralized applications.

Cross-Chain Privacy Solutions

Emerging zkBridge technology enables privacy features from one chain to benefit applications on others53. Mina’s zkBridge will let Ethereum dApps leverage Mina’s privacy properties without migration. Similarly, Oasis Privacy Layer extends confidential computing to any EVM network through message-passing bridges54.

Mining and Validator Opportunities

Privacy L1s create distinct infrastructure opportunities for miners and validators.

Proof Systems and Hardware Requirements

Aleo’s Proof-of-Succinct-Work requires generating zk-SNARK proofs, creating demand for GPU proving services55. Over 100,000 GPUs participated at Aleo’s mainnet launch, demonstrating the scale of proving infrastructure needed.

Monero’s RandomX algorithm remains ASIC-resistant, favoring CPUs and GPUs owned by individual miners56. This maintains decentralization with current hashrate around 2.5 GH/s and tail emission ensuring long-term mining viability.

Oasis requires SGX-enabled nodes for confidential ParaTimes, restricting validator participation to trusted operator partners with appropriate hardware57. This creates a more selective validator set but enables efficient confidential execution.

Choosing the Right Privacy L1

Selecting a privacy L1 depends on your specific requirements and technical capabilities.

For simple payment privacy without programming complexity, Monero offers the strongest confidentiality guarantees through mandatory privacy for all transactions. The trade-off is limited smart contract functionality and potential exchange access issues.

Developers building privacy-focused applications should evaluate the programming model carefully. If EVM compatibility matters, Oasis Sapphire provides the easiest migration path with familiar Solidity tooling. For cutting-edge zero-knowledge applications, Aleo and Mina offer more powerful privacy primitives but steeper learning curves.

Validators and infrastructure providers can monetize specialized hardware. GPU proving services for Aleo or TEE-enabled nodes for Oasis create new revenue streams beyond traditional block validation. Understanding hardware requirements and operational costs is essential for profitability.

Regulatory considerations matter for long-term viability. Optional-privacy models like Zcash face less delisting risk than mandatory-privacy alternatives, though this comes at the cost of smaller anonymity sets. Organizations needing both privacy and compliance should prioritize selective disclosure capabilities.

Conclusion

Privacy L1 blockchains represent a fundamental evolution in blockchain architecture, moving confidentiality from add-on solutions to protocol-level guarantees. Whether through ring signatures, zero-knowledge proofs, or trusted execution environments, these networks prove that public verification and private data can coexist. As regulatory frameworks mature and technical innovation continues, privacy-focused L1s offer crypto miners, developers, and validators new opportunities to build infrastructure for applications where confidentiality matters. The future of blockchain includes privacy not as an afterthought but as a first-class citizen, enabling use cases from confidential finance to private identity that transparent chains cannot support.

Privacy L1 Blockchains FAQs

What are privacy L1 blockchains and how do they differ from transparent blockchains?

Privacy L1 blockchains integrate transaction and smart contract confidentiality directly into the base protocol layer rather than relying on add-on mixers or Layer 2 solutions. Unlike transparent blockchains where anyone can trace transaction history and wallet balances, privacy L1s use cryptographic techniques like ring signatures, zero-knowledge proofs, or trusted execution environments to keep sensitive information hidden while maintaining transaction validity.

Which privacy L1 blockchain offers the strongest transaction privacy?

Monero provides the strongest payment privacy through mandatory ring signatures with 16 decoys, stealth addresses, and Ring Confidential Transactions (RingCT) that hide sender, receiver, and amount for every transaction. Unlike optional-privacy systems, Monero’s default-privacy approach ensures all users benefit from large anonymity sets, though this mandatory approach has led to exchange delistings.

How do zero-knowledge proofs enable privacy on blockchains like Aleo and Mina?

Zero-knowledge proofs allow one party to prove they know information without revealing the information itself. On blockchains like Aleo and Mina, applications execute computation off-chain with private inputs, generate succinct proofs of correct execution, then post only these proofs on-chain for verification. This enables private programmable applications while keeping the blockchain lightweight and validation efficient.

What are the trade-offs between TEE-based privacy and zero-knowledge approaches?

TEE-based systems like Oasis Sapphire offer near-native performance and easy EVM compatibility but require trusting hardware security, while zero-knowledge approaches provide stronger cryptographic guarantees but demand significant computational resources for proof generation. TEEs enable faster development cycles using familiar Solidity tools, whereas zero-knowledge systems require learning specialized languages like Leo or o1js but offer provable privacy without hardware trust assumptions.

Can privacy L1 blockchains comply with financial regulations?

Privacy L1 blockchains with selective disclosure capabilities can comply with regulations through mechanisms like view keys that enable audits without compromising spending authority or programmable privacy that lets developers define exactly what information is public versus confidential. Zcash’s optional shielded transactions and platforms like Aleo that support configurable privacy appeal to institutions needing both confidentiality and regulatory compliance, while mandatory-privacy coins like Monero face ongoing exchange delisting pressure.

Privacy L1 Blockchains Citations

  1. Perplexity AI, “Privacy-focused L1 blockchains explained,” //www.perplexity.ai
  2. CoinDesk, “Understanding Blockchain Privacy,” //www.coindesk.com
  3. Aleo, “Zero-knowledge by design,” //aleo.org/
  4. Monero, “Ring Signatures,” //www.getmonero.org/resources/moneropedia/ringsignatures.html
  5. Google AI Overview, “Leading Privacy L1 Blockchains,” 2025
  6. Baltex Exchange, “What Is Monero (XMR) in 2025,” //baltex.io/blog/ecosystem/what-is-monero-xmr-2025-ultimate-privacy-coin-explained
  7. Unchained Crypto, “What Are Ring Signatures?,” //unchainedcrypto.com/ring-signatures/
  8. OurCryptoTalk, “Monero and Ring Signatures: The Privacy Engine,” //ourcryptotalk.com/blog/monero-and-ring-signatures-the-privacy-engine/
  9. Gemini, “Zcash’s Zero Knowledge Proofs,” //www.gemini.com/cryptopedia/zcash-zero-knowledge-proof-zk-snarks-mining
  10. Z.Cash, “What are zk-SNARKs?,” //z.cash/learn/what-are-zk-snarks/
  11. Aleo, “What is Aleo and How Does It Work?,” //www.leo.app/blog/what-is-aleo-and-how-does-it-work
  12. Aleo, “Zero-Knowledge by Design,” Medium, //rufat31947337.medium.com/zero-knowledge-by-design-how-aleo-brings-privacy-and-scalability-together-c2395be95d69
  13. DAIC Capital, “Aleo Technical Architecture,” //daic.capital/blog/aleo-blockchain-technical-architecture
  14. Mina Protocol, “zkApps – Smart Contracts,” //minaprotocol.com/zkapps-2
  15. Mina Protocol, “zkApps Overview,” //minaprotocol.com//zkapps
  16. Oasis Network, “Sapphire EVM,” //oasis.net/sapphire
  17. Medium, “Sapphire EVM Explained,” //medium.com/@caerlower/sapphire-evm-explained-a-deep-dive-into-confidential-smart-contract-execution-on-oasis-7fcca7cf9e5c
  18. Oasis Network, “Smart Privacy,” //oasis.net/smart-privacy
  19. Oasis Network, “Confidential EVM ParaTime Sapphire,” //oasis.net/blog/confidential-evm-paratime-sapphire-is-now-on-testnet
  20. Oasis Network, “Oasis Privacy Layer,” //oasis.net/opl
  21. Asic Marketplace, “Aleo Coin Explained,” //asicmarketplace.com/blog/what-is-aleo/
  22. DF3NDR, “Aleo: A Privacy-Focused Blockchain Project,” //www.df3ndr.com/aleo-privacy-focused-blockchain-project
  23. Oasis Network, “How Oasis Protects Privacy Despite TEE Vulnerabilities,” //oasis.net/blog/how-oasis-protects-privacy-despite-tee-vulnerabilities
  24. Medium, “Unveiling Oasis Protocol’s Sapphire,” //medium.com/@caerlower/unveiling-oasis-protocols-sapphire-confidential-smart-contracts-for-the-modern-blockchain-era-41a30b20bff1
  25. Monero, “OSPEAD Research,” //www.getmonero.org/2025/04/05/ospead-optimal-ring-signature-research.html
  26. LocalMonero, “How Ring Signatures Obscure Outputs,” //localmonero.co/knowledge/ring-signatures?language=en
  27. Oasis Network, “Sapphire Overview,” //oasis.net/blog/get-to-know-sapphire-the-industry-first-confidential-evm-paratime
  28. CryptoPotatoo, “Redefining Privacy: Howard Wu on Aleo,” //cryptopotato.com/redefining-privacy-howard-wu-on-aleo-zero-knowledge-and-the-future-of-blockchain-confidentiality/
  29. CryptoPotatoo, “Howard Wu Interview on Aleo,” //cryptopotato.com/redefining-privacy-howard-wu-on-aleo-zero-knowledge-and-the-future-of-blockchain-confidentiality/
  30. Chia Documentation, “Coin Set Intro,” //docs.chia.net/chia-blockchain/coin-set-model/intro/
  31. XCH Arcane, “The Coinset Model,” //xcharcane.com/articles/coinset-model-intro
  32. Chia Documentation, “Coin Set vs Account Model,” //docs.chia.net/coin-set-vs-account/
  33. Chia Documentation, “Security,” //docs.chia.net/chia-blockchain/coin-set-model/security/
  34. Chia Network, “Introduction,” //docs.chia.net/chia-blockchain/introduction/
  35. BingX, “What Is Zcash (ZEC) Privacy Coin,” //bingx.com/en/learn/article/what-is-zcash-zec-privacy-coin-how-does-it-work
  36. OurCryptoTalk, “Monero and Ring Signatures,” //ourcryptotalk.com/blog/monero-and-ring-signatures-the-privacy-engine/
  37. Motley Fool, “Is Zcash a Harbinger of the Next Big Narrative,” //www.fool.com/investing/2025/12/11/is-zcash-a-harbinger-of-the-next-big-new-narrative/
  38. Bitget, “What Is Zcash (ZEC),” //web3.bitget.com/en/academy/what-is-zcash-zec-the-zk-snarks-privacy-coin-behind-a-410-surge-in-one-month
  39. CoinMarketCap, “Mina Latest Updates,” //coinmarketcap.com/cmc-ai/mina/latest-updates/
  40. Zcash Documentation, “Zcash Basics,” //zcash.readthedocs.io/en/latest/rtd_pages/basics.html
  41. Mina Protocol, “Digital Identity with Zero Knowledge Proofs,” //minaprotocol.com/blog/digital-identity-in-web3-with-zero-knowledge-proofs-zk
  42. Oasis Protocol, “Oasis Network Overview,” //oasisprotocol.org/
  43. Oasis Network, “Smart Privacy for Better dApps,” //oasis.net/smart-privacy
  44. Oasis Network, “Oasis Ecosystem Partners,” //oasis.net/smart-privacy
  45. Mina Protocol, “Securely Issuing Tokenized Assets,” //minaprotocol.com/blog/securely-issuing-tokenized-assets-using-zero-knowledge-proofs
  46. Mina Protocol, “Digital Identity Solutions,” //minaprotocol.com/blog/digital-identity-in-web3-with-zero-knowledge-proofs-zk
  47. Mina Protocol, “zkApps Overview,” //minaprotocol.com//zkapps
  48. Oasis Network, “Privacy Layer Overview,” //oasis.net/opl
  49. Motley Fool, “Zcash Analysis,” //www.fool.com/investing/2025/12/11/is-zcash-a-harbinger-of-the-next-big-new-narrative/
  50. Bitget, “Zcash Price Analysis,” //web3.bitget.com/en/academy/what-is-zcash-zec-the-zk-snarks-privacy-coin-behind-a-410-surge-in-one-month
  51. OurCryptoTalk, “Monero Seraphis Upgrade,” //ourcryptotalk.com/blog/monero-and-ring-signatures-the-privacy-engine/
  52. CoinMarketCap, “Mina Mesa Upgrade,” //coinmarketcap.com/cmc-ai/mina/latest-updates/
  53. Mina Protocol, “Bringing the Mina Stack to Life,” //minaprotocol.com/blog/bringing-the-mina-stack-to-life-with-zeko
  54. Oasis Network, “Oasis Privacy Layer,” //oasis.net/opl
  55. DF3NDR, “Aleo Mining and Consensus,” //www.df3ndr.com/aleo-privacy-focused-blockchain-project
  56. Baltex Exchange, “Monero Mining in 2025,” //baltex.io/blog/ecosystem/what-is-monero-xmr-2025-ultimate-privacy-coin-explained
  57. Oasis Network, “TEE Vulnerabilities,” //oasis.net/blog/how-oasis-protects-privacy-despite-tee-vulnerabilities