We’re excited to present our Roadmap features. More items will be added soon.
Although our goal is to meet any projected timelines, launch times on the Roadmap are subject to change, as needed, to make sure the product is 100% tested and ready for the public.
Deterministic zPIV Wallet
Users no longer need to keep new backups after each zPIV minting. By backing up a zPIV seed (similar to private key), users have full backup of any zPIV minted in the future, and are able to easily import the zPIV seed to a new wallet and restore any zPIV minted with the seed. Learn more about PIVX Core Wallet v188.8.131.52 features.
zPIV Staking (zPoS)
Users are now able to stake zPIV just like normal PIV, but also earn higher rewards and maximize privacy and ease of use. With the new block reward system, zPIV staking block reward is 50% larger than PIV staking rewards. Although PIVX already has orders of magnitude higher anonymity set sizes than most privacy coins, and maturation time to prevent timing attacks, zPIV staking further optimizes privacy by ensuring zPIV minting and spending occur more frequently. Learn more about PIVX Core Wallet v184.108.40.206 features.
New QT Wallet Design
The PIVX Qt wallet’s graphic user interface has been streamlined and gives easy access to options such as zPIV auto-minting, automatic backup on external storage, and auto-split threshold for staking.
Automatic backup on external storage devices
The PIVX wallet now allows users to choose automatic backup locations, such as external storage devices.
Ledger Hardware Wallet Masternode Collateral Support
Storing private keys in a hardware wallet in an offline environment, or cold storage, affords the highest level of security. This feature will allow masternode collateral PIVs to be secured in a Ledger device, while simultaneously running masternodes, earning rewards, zDEX transaction fees, and voting.
iOS Mobile Wallet
The long-awaited iOS PIVX Mobile Wallet is now available on the APPLE App Store!
PIVX has already pioneered privacy in Proof of Stake (PoS), and the continued development of efficiency, security, decentralization, and ease of use. Bootle’s work with bulletproofs will mean that individual’s privacy within cryptocurrency will be greatly enhanced. (something more natural)
What does this mean for PIVX?
PIVX’s Zerocoin proofs, or transaction size, will become a fraction of their current size.
PIVX will be able to achieve a trustless Zerocoin setup.
zPIV for Mobile
– zPIV everywhere.
– PIV + zPIV backup from one single mnemonic code (deterministic key generation – BIP44 & BIP39).
– Light nodes zPIV sync.
– First world wide zerocoin protocol for light nodes.
In Wallet Proposal Tab
Users will be able to easily perform all PIVX governance functions from within the QT wallet’s graphic user interface. There will be no need to access websites or vote from the debug console.
In Wallet Voting Tab
Users will be able to easily vote for all PIVX proposals from within the QT wallet’s graphic user interface. There will be no need to access websites or vote from the debug console.
New PIVX.org Website
The website will undergo a complete redesign with a clean and modern interface update. There will be a major brand update of the wallet and website, using similar typography to unify the new designs.
Elastic Block Sizes
Block size adjusts on demand to ensure the fastest transactions possible, even during peak periods and network attacks. PIVX will be able to scale alongside mass consumer adoption.
Community Designed Governance
In 2017, masternode owners unanimously voted to redistribute voting power. Currently, only masternode owners can vote. Several CDG proposals have been submitted, and will be voted on, and the winning proposal will be implemented as PIVX’s system of governance.
I2P Network Integration
I2P is an anonymizing network that uses a fully decentralized peer-to-peer model. It has many key technical advantages over other models such as TOR, and is much faster, secure, and robust.
Dandelion Protocol Integration
Dandelion Protocol makes senders’ IP addresses virtually untraceable. Transactions relayed to nodes go through a random number of hops in the “stem” phase, and are symmetrically broadcast to more nodes in the “fluff” phase. Even if an attacker identifies the location of the fluff phase, it is much more difficult to discover the original source IP of the stem phase.