'Secret' bridge turns ERC-20 tokens into privacy coins

Published at: Dec. 16, 2020

An open-source blockchain protocol called the Secret Network is now offering privacy features for the Ethereum blockchain and 14 ERC-20 tokens.

According to a Secret Network blog post, the protocol launched its Secret Ethereum Bridge on the mainnet today, which is designed to allow Ether (ETH) and all ERC-20 token holders to create programmable versions of their assets with privacy features. The Secret Network compared these “secret” tokens to privacy coins like Monero (XMR):

"Secret Tokens combine the programmability of ERC-20s with the privacy of coins like Zcash or Monero. Interactions with Secret Token contracts are encrypted, viewable only to address owners or holders of their viewing key."

Secret Network said that it would initially offer these privacy features to 14 ERC-20 tokens, including ETH, Yearn.Finance (YFI), Uniswap (UNI), Band (BAND), Compound (COMP), Chainlink (LINK), Aave (AAVE), Kyber (KNC), Synthetix (SNX), Ocean (OCEAN), Maker (MKR), Dai (DAI), Tether (USDT), True USD (TUSD), and wrapped Bitcoin (WBTC).

The latest Ethereum announcement is part of a broader plan from the Secret Network to bring privacy features to public blockchains. Developers can build and deploy the protocol’s “secret” smart contracts that use encrypted inputs, outputs, and states. These contracts reportedly allow a blockchain to utilize private data in decentralized apps without compromising users’ personal data.

The protocol said it was also planning on launching bridge mining rewards starting in January. Crypto users can earn Secret’s SCRT tokens for keeping their assets locked on the Secret Ethereum Bridge.

Tags
Related Posts
Blockchain explores private stablecoin that could deliver instant, untraceable payments
A network that’s home to tools and applications championing anonymity has announced that it is exploring the development of oxUSD, a privacy preserving stablecoin. Oxen’s network is already used to power the anonymous messaging app Session — as well as Lokinet, a router that offers an alternative to Tor. However, the project’s team say their infrastructure is capable of handling so much more. They believe a private stablecoin would be a powerful complement to the products that are already on offer, delivering instant and untraceable digital payments. When it comes to the rationale behind launching such a digital asset, Oxen …
Technology / July 28, 2021
Ledger users threaten legal action after hacker dumps personal data
The hacker that breached hardware wallet provider Ledger’s marketing database earlier this year has released personal data for thousands of users, prompting many to threaten the firm with a class-action lawsuit. According to a tweet from network security firm Hudson Rock's Alon Gal, a hacker allegedly behind the breach of personal data from hardware wallet Ledger in June has made all the information they obtained available online. This reportedly includes 1,075,382 email addresses from users subscribed to the Ledger newsletter, and 272,853 hardware wallet orders with information including email addresses, physical addresses, and phone numbers. ALERT: Threat actor just dumped …
Technology / Dec. 20, 2020
yEarn Creator Says Recent Audits Don't Necessarily Mean the Project Is 100% Safe
Andre Cronje, the creator of Yearn.Finance, has recently made security audits of his project publicly available. He explained to Cointelegraph that he had been previously withholding these audits, which were completed months ago, so as to not give users a false sense of security: I always refused to publish the audits because I don't want people to get a false sense of security because of them. Yesterday, Cronje published five audits on the project's GitHub repository. The audits were performed between February and July by leading auditors, such as Certik and Quantstamp. Some of the vulnerabilities that were discovered are …
Technology / Aug. 20, 2020
Noncustodial Technology and Security Is the Inevitable Future
In an increasingly digital world, security is a high-stakes game. The identities of customers along with their privacy and financial information are all in the hands of centralized security systems. We are reliant on these systems, and even though security plays a critical role in our lives, we rarely stop to think about the consequences of these systems failing us. Yet those who trade financial assets like cryptocurrencies think about these consequences all the time. Why? The risk of violations of our financial sovereignty coupled with the potential of theft without an option to recover are two big reasons why …
Decentralization / July 31, 2020
Baseline Developers Propose DTL-Based Coronavirus Contact Tracing
Developers working on Baseline, an enterprise smart contract and tokenization platform developed by Microsoft, Ernst & Young, and ConsenSys, are working to solve several flaws identified with Apple and Google’s proposal for coronavirus tracking initiatives. Google and Apple propose a contact tracing solution that would add cross-platform APIs that allow health authorities to monitor users. Both brands have discussed rolling out related software updates next month. The plan suggests using a phone’s Bluetooth Low Energy to detect other devices within 30 feet of each other. This would allow infected individuals to be identified through proximity detection. For people who come …
Technology / April 17, 2020