ZipherPunk.com - Privacy is Not a Crime
ZipherPunk Logo

⌘ ZIPHERPUNK ⌘

"Privacy is necessary for an open society in the electronic age."

— Cypherpunk Manifesto, 1993

🔒

PRIVACY

Your transactions. Your business.

FREEDOM

No permission needed. No borders.

🌐

DECENTRALIZATION

No single point of failure.

▸ Zclassic Network Stats

Block Height
loading
ZCL Price
loading
Version
v2.1.62
Circulating
loading

▸ ZIPHERX - macOS Full Node Wallet

◈ Desktop Sovereignty

Embedded full node. Local proof verification. Zero trusted servers.

  • Embedded Full Node: Bundled zclassicd - complete blockchain verification
  • Shielded Only: z-address transactions only - maximum privacy
  • Sapling Proofs: zk-SNARK generation on-device (~30 seconds)
  • Multi-Peer Consensus: 8+ peers, 5/8 Byzantine fault tolerance
  • Tor Privacy: Embedded Arti router with hidden service support
  • Equihash Verification: Full proof-of-work block validation
  • 512-byte Memos: Encrypted messages in every transaction
  • BIP-39 Recovery: 24-word seed phrase backup
  • Open Source: MIT License - audit the code yourself

"Privacy is not about something to hide. Privacy is about something to protect." — Your keys, your coins, your rules.

▸ ZIPHERX - iOS Wallet (Experimental)

◈ Privacy On The Go

WARNING: Experimental software. Educational purposes only.

Your keys in Secure Enclave. Your proofs generated locally. Zero trust.

  • Shielded Only: z-address transactions only - no transparent leaks
  • Secure Enclave: Hardware-backed key protection (iPhone 8+)
  • Local Proof Generation: Sapling zk-SNARKs on-device (~30s)
  • Multi-Peer Consensus: 8+ peers with 5/8 Byzantine tolerance
  • Embedded Tor: Arti router with .onion hidden service
  • Parallel Decryption: 6.7x faster note scanning via Rayon
  • Biometric Auth: Face ID/Touch ID with auto-lock timeout
  • Pre-indexed Tree: ~1M commitment tree for instant balance
  • BIP-39 Recovery: 24-word seed phrase backup
  • Cypherpunk Chat: P2P encrypted messaging over Tor with in-chat payments
  • Retro UI: System 7 theme meets modern crypto

"Don't trust, verify." - Local proofs. Multi-peer consensus. Zero trusted servers.

▸ Research & Analysis

◈ Cryptographic Research

In-depth technical analysis of Zclassic's cryptographic primitives, threat models, and upgrade paths.

  • Quantum Threat Analysis: Full audit of every cryptographic primitive across all protocol layers — transparent, Sapling, Sprout, PoW, and network — against Shor's and Grover's algorithms. Includes severity ranking, post-quantum replacement map, and strategic migration roadmap.

▸ Why Zclassic?

No Founder's Reward. 100% of block rewards go to miners. No dev tax. No corporate interests.

True Privacy. zk-SNARKs zero-knowledge proofs. Shielded transactions hide sender, receiver, and amount.

Decentralized. No company. No foundation. Community-driven development.

Battle-tested. Based on Zcash protocol. Years of cryptographic research.

Censorship Resistant. No one can stop your transaction. No one can freeze your funds.

DISCLAIMER

All content on this site is provided strictly for educational and informational purposes only. Nothing constitutes financial, investment, or security advice. Technical analyses are AI-assisted, may contain errors, inaccuracies, or outdated information, and have not been formally peer-reviewed or audited. This is not a professional security audit. The authors accept no responsibility or liability for any loss or damage arising from the use of this information. Cryptocurrency is inherently risky and may lose all value. Always do your own research (DYOR). Licensed under MIT License.