{"id":4123,"date":"2022-03-05T20:16:55","date_gmt":"2022-03-05T20:16:55","guid":{"rendered":"http:\/\/smart.onlinesarafi.com\/index.php\/2022\/03\/05\/pirate-chain-whitepaper\/"},"modified":"2022-03-05T20:16:55","modified_gmt":"2022-03-05T20:16:55","slug":"pirate-chain-whitepaper","status":"publish","type":"post","link":"https:\/\/smart.onlinesarafi.com\/index.php\/2022\/03\/05\/pirate-chain-whitepaper\/","title":{"rendered":"Pirate Chain Whitepaper"},"content":{"rendered":"<div id=\"post-12634\">\n<div class=\"entry-content\" readability=\"37.216494845361\">\n<p>A fully private cryptocurrency and shielded blockchain originating from the Komodo ecosystem. Pirate solves Zcash\u2019s \u201cfungibility problem\u201d through the elimination of transaction functionality to transparent addresses in its blockchain, making private usage \u201cfool-proof\u201d. This feature results in a fully shielded user coin base in the Pirate chain. By consistently utilizing zk-SNARK technology, Pirate coin leaves no usable metadata of user\u2019s transactions on its blockchain. All outgoing transactions other than mining block rewards and notary transactions are sent into shielded Sapling addresses maximizing the efficiency and speed of its chain. Pirate utilizes the consensus algorithm Equihash proof-of-work originating from Zcash, with an added security layer of delayed proof-of-work from Komodo which provides a higher than BTC- grade level of security to the Pirate blockchain. The future of private decentralized payments is here.<\/p>\n<p> <a href=\"https:\/\/www.allcryptowhitepapers.com\/wp-content\/uploads\/2019\/05\/The_Pirate_Code_V1.0.pdf\" class=\"pdfemb-viewer\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"on\">The_Pirate_Code_V1.0<br \/><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A fully private cryptocurrency and shielded blockchain originating from the Komodo ecosystem. Pirate solves Zcash\u2019s \u201cfungibility problem\u201d through the elimination of transaction functionality to transparent addresses in its blockchain, making private usage \u201cfool-proof\u201d. This feature results in a fully shielded user coin base in the Pirate chain. By consistently utilizing zk-SNARK technology, Pirate coin leaves [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4123","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/posts\/4123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/comments?post=4123"}],"version-history":[{"count":1,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/posts\/4123\/revisions"}],"predecessor-version":[{"id":4124,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/posts\/4123\/revisions\/4124"}],"wp:attachment":[{"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/media?parent=4123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/categories?post=4123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/tags?post=4123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}