In support of gratitude, we’re excited to announce the Veil Tipbot!
Veil’s new core wallet version 220.127.116.11 includes an exciting new feature, called Autospend. Let’s explore how it works.
Recently the Veil team held a staff conference to consolidate plans for the project and its various aspects.
The Veil Project is excited to present the architecture of the new Veil privacy protocol, and the steps we are taking to ensure the interim privacy of our early adopters.
As we provide technical updates, keep our community informed on milestones achieved, and dive into specifics of our technology, it can be easy to lose sight of the broader vision that we seek to achieve with Veil: electronic cash.
In this article, we will explore the recent Zerocoin exploit and how that affects Veil’s future.
In this article, we will explore the benefits of Veil’s hybrid consensus.
In this article, we are going to discuss the state of the Veil network, including our decision to replace Zerocoin with a new privacy protocol.
In this article, we are going to explore why the Veil team members have made such personal commitments to the long-term success of the project.
In this article, we’ll explore Veil’s coming precompute functionality.
In this article, we will get to know the Chief Architect of the Veil network, Tom Bradshaw (aka @presstab).
In this article, we will detail the process for trading Veil on the Bisq decentralized exchange.
In this article, we will get to know the Veil founder, James Burden
In this article we’re going to take a look at the current state of the Veil network.
In this article, we’re going to take a deep dive into the Veil superblock milestone.
In this article, we’re going to take a practical look into how the fascinating Zerocoin protocol works to provide anonymity.
Veil is a privacy-focused blockchain project with a simple mission - to offer the most private and user-friendly digital currency. With an experienced team of over 25 members, including top developers, we are implementing and improving upon thoroughly vetted privacy protocols, pushing the technical boundaries for privacy and anonymity.