PIVX Roadmap 2018

We’re excited to present our Roadmap features for 2018. ┬áThis is only the top 15! More items will be added soon.

Deterministic zPIV Wallet

Users will no longer need to keep new backups after each zPIV minting. By backing up a zPIV seed (similar to private key), users will have full backup of any zPIV minted in the future, and be able to easily import the zPIV seed to a new wallet and restore any zPIV minted with the seed.

zPIV Staking (zPoS)

Users will be able to stake zPIV just like normal PIV, but also earn higher rewards and maximize privacy and ease of use. With the proposed new block reward scheme, zPIV staking block reward will be 50% larger than PIV staking rewards. Although PIVX already has orders of magnitude higher anonymity set sizes than most privacy coins, and maturation time to prevent timing attacks, zPIV staking will further optimize privacy by ensuring zPIV minting and spending occur more frequently.

iOS Mobile Wallet

After months of rigorous testing, the long-awaited iOS PIVX Mobile Wallet is ready and now undergoing final approval by the Apple Store.

New QT Wallet Design

The PIVX Qt wallet’s graphic user interface will be streamlined and give easy access to options such as zPIV auto-minting, automatic backup on external storage, and auto-split threshold for staking.

In Wallet Proposal Tab

Users will be able to easily perform all PIVX governance functions from within the QT wallet’s graphic user interface. There will be no need to access websites or vote from the debug console.

In Wallet Voting Tab

Users will be able to easily vote for all PIVX proposals from within the QT wallet’s graphic user interface. There will be no need to access websites or vote from the debug console.

Automatic backup on external storage devices

Currently, the wallet can only make automatic backups in the original PIVX directory. Once implemented, the PIVX wallet will allow users to choose automatic backup locations, such as external storage devices.

Ledger Hardware Wallet Masternode Collateral Support

Storing private keys in a hardware wallet in an offline environment, or cold storage, affords the highest level of security. This feature will allow masternode collateral PIVs to be secured in a Ledger device, while simultaneously running masternodes, earning rewards, zDEX trading fees, and voting

New PIVX.org Website

The website will undergo a complete redesign with a clean and modern interface update. There will be a major brand update of the wallet and website, using similar typography to unify the new designs.

zPIV Decentralized Exchange (zDEX)

The PIVX Core wallet will provide a fully decentralized and anonymous exchange for zPIV and Bitcoin. This will act as a direct entry to and from PIVX from Bitcoin without intermediaries. Trading fees from zDEX will be rewarded to zDEXNodes (masternodes that also help secure zDEX), incentivizing buying and long-term holding of PIV for passive income. No registration, and no entrusting coins to the security of servers.

Community Designed Governance

In 2017, masternode owners unanimously voted to redistribute voting power. Currently, only masternode owners can vote. Several CDG proposals have been submitted, and will be voted on, and the winning proposal will be implemented as PIVX’s system of governance.

Elastic Block Sizes

Block size adjusts on demand to ensure the fastest transactions possible, even during peak periods and network attacks. PIVX will be able to scale alongside mass consumer adoption.

I2P Network Integration

I2P is an anonymizing network that uses a fully decentralized peer-to-peer model. It has many key technical advantages over other models such as TOR, and is much faster, secure, and robust.

U2F Integration

Access to your PIVX wallet can be protected by both password and FIDO U2F security key, effectively protecting against hackers and keyloggers. The wallet will display setup instructions for the most popular U2F devices, such as YubiCo YubiKey.

Dandelion Protocol Integration

Dandelion Protocol makes senders’ IP addresses virtually untraceable. Transactions relayed to nodes go through a random number of hops in the “stem” phase, and are symmetrically broadcast to more nodes in the “fluff” phase. Even if an attacker identifies the location of the fluff phase, it is much more difficult to discover the original source IP of the stem phase.