Blog | Panther Protocol
  • Blog Home
  • Core Articles
  • DAO
  • Philosophy
  • News
  • Community
  • Partnerships
  • Panther Academy
Subscribe
Threshold Cryptography, MPC, and MultiSigs: A Complete Overview
Panther Academy

Threshold Cryptography, MPC, and MultiSigs: A Complete Overview

Threshold cryptography is one of the most secure techniques for carrying out cryptographic operations. For context, cryptography is a field of study in computer science that emphasizes securely accessing and transferring information between two or more parties without external influence. The importance of cryptography cannot be overstated, not only in
Oct 6, 2022 — 11 min read
Ethereum's Competitors: Advantages and Disadvantages
Panther Academy

Ethereum's Competitors: Advantages and Disadvantages

In this article, we will look into Ethereum and its different issues. We will also explore how Ethereum's competitors address these challenges.
Sep 30, 2022 — 11 min read
Modular Blockchains vs. Monolithic Blockchains
Panther Academy

Modular Blockchains vs. Monolithic Blockchains

Consensus, execution, data availability, and settlement are said to be the four primary functions of a blockchain network. When a blockchain network executes all four of these functionalities in its base layer, it’s called a monolithic blockchain. Whereas, if a blockchain network handles only a few out of the
Sep 22, 2022 — 10 min read
Oliver Gale @Nasdaq: “ZKPs will save the financial system”
News

Oliver Gale @Nasdaq: “ZKPs will save the financial system”

Panther aims to achieve a delicate balance between privacy and compliance, as Oliver Gale explained in this week's Nasdaq TradeTalks.
Sep 20, 2022 — 2 min read
Bulletproofs In Crypto – An introduction to a Non-Interactive ZKP
Panther Academy

Bulletproofs In Crypto – An introduction to a Non-Interactive ZKP

“Bulletproofs: Short like bullets, yet offering bulletproof security assumptions". With these words, Shashank Agrawal named the technology that played an essential role in stabilizing blockchain privacy solutions. Although Agrawal's epic caption meant that this new technology earned its name, it does not explain why they’re safe,
Sep 16, 2022 — 9 min read
Understanding Trusted Setups: A Guide
Panther Academy

Understanding Trusted Setups: A Guide

If you are familiar with cryptography, computational protocols, and distributed systems, you must surely have encountered the phrase 'trusted setups'. Trusted setups are integral to the optimal performance of several cryptographic protocols like zero-knowledge proof systems. Yet, some users of these systems may have trouble understanding the complexities
Sep 13, 2022 — 12 min read
zk-SNARKs vs zk-STARKs: Comparing Zero-knowledge Proofs
Panther Academy

zk-SNARKs vs zk-STARKs: Comparing Zero-knowledge Proofs

zk-SNARKs and zk-STARKs permeate almost everything zero-knowledge in blockchain. Here's all you need to know to understand how they differ.
Sep 2, 2022 — 8 min read
zkEVMs – Everything you need to know.
Panther Academy

zkEVMs – Everything you need to know.

We’ve come a long way from smart contracts to sidechains and rollups before reaching zkEVM technology as the potential solution to the blockchain scalability problem. This problem has been at the core of most of the blockchain innovation we’ve seen in the past couple of years. Without sacrificing
Aug 30, 2022 — 10 min read
ZK-rollup projects: Inner workings, importance & analysis
Panther Academy

ZK-rollup projects: Inner workings, importance & analysis

It is no secret that the crypto space has witnessed tremendous growth in the past few years. DeFi protocols, NFT collections, ZK-rollup projects and everything in between have made a debut since the ICO era. Meanwhile, the widespread adoption of cryptocurrencies has yielded massive upwards price action and a greater
Aug 26, 2022 — 10 min read
What are hash functions, and how do hashes work in crypto?
Panther Academy

What are hash functions, and how do hashes work in crypto?

Although these terms are usually thrown around the more technical crypto circles, more than one user has wondered what hash functions are. How do hashes work to ensure secure data storage and data integrity? The word 'hash' may evoke memories of meat and potatoes, chopped and mixed. However,
Aug 22, 2022 — 9 min read
What is Cross-chain DeFi? Is it possible?
Core Panther Protocol

What is Cross-chain DeFi? Is it possible?

We’re still in the earliest years of cross-chain DeFi. The siloed nature of blockchain technology and Web3 today is one of the major barriers preventing its widespread adoption. Different blockchains are significantly siloed, which you can tell by just looking at how Centralized Exchanges (CEXs) continue to be the
Aug 17, 2022 — 9 min read
What is a zero-knowledge proof? ZKPs explained in different levels.
Panther Academy

What is a zero-knowledge proof? ZKPs explained in different levels.

While it looks like rocket science when you first come across it, the concept of a zero-knowledge proof is not as confusing as it seems. In fact, it can be summarized as digital accountability.
Aug 10, 2022 — 9 min read
Privacy crypto projects: real Bitcoin competitors or not?
Panther Academy

Privacy crypto projects: real Bitcoin competitors or not?

There are no clear Bitcoin competitors when it comes to value-oriented blockchains. Bitcoin has over 180 million users, and the network averages hundreds of thousands of daily transactions, facilitating cross-border payments. However, as more people regard Bitcoin as a full-fledged digital asset akin to gold or real estate, the question
Aug 5, 2022 — 11 min read
How to get involved in Panther's community: You can help DeFi privacy!
Community Featured

How to get involved in Panther's community: You can help DeFi privacy!

You can be an active part of the Panther community in more ways than you think. Let's look at Panther's DAO participation and other strategies.
Jul 29, 2022 — 9 min read
KYC/AML: How crypto will change a TradFi standard forever
Panther Academy

KYC/AML: How crypto will change a TradFi standard forever

There is much debate around KYC&AML practices in crypto. However, few know how technological developments might change KYC/AML forever.
Jul 27, 2022 — 8 min read
Economic study of private DeFi: Dr. Anish Mohammed, Panther's CTO
Core Panther Protocol

Economic study of private DeFi: Dr. Anish Mohammed, Panther's CTO

This article rendition of Anish Mohammed's EthCC talk tackles the economic implications of achieving privacy & different strategies to enable it.
Jul 26, 2022 — 8 min read
Ring Signatures vs. zkSNARKs: A comparison
Panther Academy

Ring Signatures vs. zkSNARKs: A comparison

Nowadays, ring signatures and zero-knowledge proofs (as well as their close cousin, zkSNARKs) are two of the most used and known privacy enhancing technologies applied to cryptocurrency. And, as cryptography is the heart and soul of the crypto scene (and the only reason scarce digital goods are possible), this is
Jul 21, 2022 — 10 min read
Crypto staking: misconceptions, benefits, risks & taxation
Panther Academy

Crypto staking: misconceptions, benefits, risks & taxation

If you are acquainted with the everyday actuality of the crypto space, you surely have heard of staking. You likely also hold some staking misconceptions that need to change ASAP. Besides being one out of several ways to earn passive income in crypto, staking is a vital piece of the
Jul 15, 2022 — 9 min read
What is MEV in crypto?
Panther Academy

What is MEV in crypto?

MEV (Miner Extractable Value) is deemed both a problem and a feature of blockchains. Here’s our guide to understanding and dealing with it.
Jul 7, 2022 — 13 min read
Is Bitcoin traceable? Coin security & privacy
Panther Academy

Is Bitcoin traceable? Coin security & privacy

Is Bitcoin traceable? Short, answer: yes. Long answer: It’s complicated. Here’s how to access privacy in crypto.
Jun 30, 2022 — 10 min read
Privacy coins, coin tumblers & PriFi: Private crypto
Panther Academy Featured

Privacy coins, coin tumblers & PriFi: Private crypto

Before the PriFi boom, Bitcoin tumblers and privacy coins were the only way to transact privately on-chain. Are they still valid options?
Jun 24, 2022 — 10 min read
From CBDCs to crypto privacy: Oliver Gale, Panther’s Co-Founder
Core Panther Protocol Featured

From CBDCs to crypto privacy: Oliver Gale, Panther’s Co-Founder

CBDCs are far from how they were initially conceptualized, as revealed by Oliver Gale, founder of the first digital dollar project.
Jun 21, 2022 — 5 min read
Is privacy a human right? Philosophy, economics & legality
Philosophy

Is privacy a human right? Philosophy, economics & legality

Have you ever thought deeply about privacy, where it comes from, and its implications? Whether you realize it or not, privacy is involved in almost every aspect of our lives!
Jun 14, 2022 — 13 min read
Panther joins ZPrize to support zero-knowledge development
News

Panther joins ZPrize to support zero-knowledge development

Leading Web3 organizations like Ethereum, Polygon, Mina Protocol, and Panther have partnered to support ZPrize in advancing ZK technologies.
May 27, 2022 — 3 min read
The Ultimate Irony: thoughts on the state of our markets
Philosophy

The Ultimate Irony: thoughts on the state of our markets

by Dr. Anish Mohammed The crypto ecosystem has seemingly found consensus, and it has the word “bear” written all over it. Everyone pleads to have predicted Terra’s implosion, while few can actually prove their claims. And yet, although no one can deny the systemic ripples of $UST’s demise,
May 20, 2022 — 6 min read
Blog | Panther Protocol © 2025
  • Sign up
Our Website