felixando:
Also - this is a bit beyond my knowledge, but for zkSnarks do you need an initial setup?
ZCASH - this is one of the big flaws:
https://z.cash/blog/the-design-of-the-ceremony.htmlIt's kind of "hand-wavy" and very concerning for the currency itself. It doesn't seem like it's concern for privacy, though, but could be used to generate counterfeit currency.
"The problem is, if an attacker were to get a copy of that corresponding private key, they could use it to create counterfeit Zcash. That is the only harm they could do with it they could not violate anyone else's privacy nor steal other people's Zcash."
Thoughts?
EDIT: On a second thought, this probably wouldn't be an issue for DAG due to no-mining scenario?