Category: Zcash (ZEC)

Deterministic Builds in Zcash

As Mike Perry of Tor Project wrote back in 2013, while the Snowden revelations were ongoing, one of the most dreaded of scenarios is the so-called “watering hole” attack, where an adversary or malware “attacks the software development and build processes themselves to distribute copies of itself to tens or …

This article was originally published on: Zcash blog on