<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Maxime Desalle</title><link>https://maxdesalle.com/</link><description>Recent content on Maxime Desalle</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><atom:link href="https://maxdesalle.com/index.xml" rel="self" type="application/rss+xml"/><item><title>Mastering Zcash</title><link>https://maxdesalle.com/mastering-zcash/</link><pubDate>Mon, 12 Jan 2026 00:00:00 +0000</pubDate><guid>https://maxdesalle.com/mastering-zcash/</guid><description>&lt;figure>
&lt;img src="https://maxdesalle.com/bernstein.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Leonard Bernstein's "Ode to Freedom" concert on Christmas day in 1989 celebrating the fall of the Berlin Wall. The orchestra consisted of members representing the two German States and the four occupying powers of post-war Berlin. The concert was broadcast live to an estimated audience of 100 million people in more than twenty countries. The victory of freedom, democracy, and capitalism, over oppression, totalitarianism, and communism — pictured.&lt;/figcaption>
&lt;/figure>
&lt;hr>
&lt;p>&lt;em>With deep gratitude to Giulia Mouland for her feedback and editorial review, and to Arjun Khemani for his support.&lt;/em>&lt;/p>
&lt;hr>
&lt;aside id="toc">
&lt;h4>Table of Contents&lt;/h4>
&lt;nav id="TableOfContents">
&lt;ul>
&lt;li>&lt;a href="#1-introduction">&lt;strong>1. Introduction&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#2-origins">&lt;strong>2. Origins&lt;/strong>&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#21-david-chaum-and-the-birth-of-digital-cash">2.1 David Chaum and the Birth of Digital Cash&lt;/a>&lt;/li>
&lt;li>&lt;a href="#22-the-cypherpunks">2.2 The Cypherpunks&lt;/a>&lt;/li>
&lt;li>&lt;a href="#23-bitcoin-the-wrong-tradeoff">2.3 Bitcoin: The Wrong Tradeoff&lt;/a>&lt;/li>
&lt;li>&lt;a href="#24-zerocoin-the-bolt-on-attempt">2.4 Zerocoin: The Bolt-On Attempt&lt;/a>&lt;/li>
&lt;li>&lt;a href="#25-zerocash-the-rebuild">2.5 Zerocash: The Rebuild&lt;/a>&lt;/li>
&lt;li>&lt;a href="#26-the-genesis-block">2.6 The Genesis Block&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#3-what-is-zcash">&lt;strong>3. What is Zcash?&lt;/strong>&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#31-a-bitcoin-primer">3.1 A Bitcoin Primer&lt;/a>&lt;/li>
&lt;li>&lt;a href="#32-bitcoin-but-private">3.2 Bitcoin, But Private&lt;/a>&lt;/li>
&lt;li>&lt;a href="#33-the-fundamental-problem">3.3 The Fundamental Problem&lt;/a>&lt;/li>
&lt;li>&lt;a href="#34-shielded-notes">3.4 Shielded Notes&lt;/a>&lt;/li>
&lt;li>&lt;a href="#35-commitments-and-nullifiers">3.5 Commitments and Nullifiers&lt;/a>&lt;/li>
&lt;li>&lt;a href="#36-keys-and-addresses">3.6 Keys and Addresses&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#4-transaction-lifecycle">4. Transaction Lifecycle&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#41-the-setup">4.1 The Setup&lt;/a>&lt;/li>
&lt;li>&lt;a href="#42-note-selection-and-retrieval">4.2 Note Selection and Retrieval&lt;/a>&lt;/li>
&lt;li>&lt;a href="#43-merkle-paths">4.3 Merkle Paths&lt;/a>&lt;/li>
&lt;li>&lt;a href="#44-computing-nullifiers">4.4 Computing Nullifiers&lt;/a>&lt;/li>
&lt;li>&lt;a href="#45-creating-output-notes">4.5 Creating Output Notes&lt;/a>&lt;/li>
&lt;li>&lt;a href="#46-the-proof">4.6 The Proof&lt;/a>&lt;/li>
&lt;li>&lt;a href="#47-assembling-the-transaction">4.7 Assembling the Transaction&lt;/a>&lt;/li>
&lt;li>&lt;a href="#48-broadcasting-and-mempool">4.8 Broadcasting and Mempool&lt;/a>&lt;/li>
&lt;li>&lt;a href="#49-block-inclusion-and-finality">4.9 Block Inclusion and Finality&lt;/a>&lt;/li>
&lt;li>&lt;a href="#410-recipient-detection">4.10 Recipient Detection&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#5-the-philosophy-of-privacy">5. The Philosophy of Privacy&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#51-privacy-as-a-precondition-for-progress">5.1 Privacy as a Precondition for Progress&lt;/a>&lt;/li>
&lt;li>&lt;a href="#52-the-transparency-trap">5.2 The Transparency Trap&lt;/a>&lt;/li>
&lt;li>&lt;a href="#53-privacy-must-be-absolute">5.3 Privacy Must Be Absolute&lt;/a>&lt;/li>
&lt;li>&lt;a href="#54-the-macro-case">5.4 The Macro Case&lt;/a>&lt;/li>
&lt;li>&lt;a href="#55-the-fork-in-history">5.5 The Fork in History&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#6-evolution--economics">6. Evolution &amp;amp; Economics&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#61-protocol-generations">6.1 Protocol Generations&lt;/a>&lt;/li>
&lt;li>&lt;a href="#62-turnstiles">6.2 Turnstiles&lt;/a>&lt;/li>
&lt;li>&lt;a href="#63-funding-development">6.3 Funding Development&lt;/a>&lt;/li>
&lt;li>&lt;a href="#64-decentralized-governance">6.4 Decentralized Governance&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#7-zcash-vs-">7. Zcash VS &amp;hellip;&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#71-tornado-cash-and-mixers">7.1 Tornado Cash and Mixers&lt;/a>&lt;/li>
&lt;li>&lt;a href="#72-monero">7.2 Monero&lt;/a>&lt;/li>
&lt;li>&lt;a href="#73-privacy-pools">7.3 Privacy Pools&lt;/a>&lt;/li>
&lt;li>&lt;a href="#74-aztec-and-private-l2s">7.4 Aztec and Private L2s&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#8-misconceptions">8. Misconceptions&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#81-zcash-is-not-private-by-default">8.1 &amp;ldquo;Zcash Is Not Private by Default&amp;rdquo;&lt;/a>&lt;/li>
&lt;li>&lt;a href="#82-the-anonymity-set-is-small">8.2 &amp;ldquo;The Anonymity Set Is Small&amp;rdquo;&lt;/a>&lt;/li>
&lt;li>&lt;a href="#83-optional-transparency-weakens-privacy">8.3 &amp;ldquo;Optional Transparency Weakens Privacy&amp;rdquo;&lt;/a>&lt;/li>
&lt;li>&lt;a href="#84-zcash-uses-a-trusted-setup">8.4 &amp;ldquo;Zcash Uses a Trusted Setup&amp;rdquo;&lt;/a>&lt;/li>
&lt;li>&lt;a href="#85-there-was-a-premine">8.5 &amp;ldquo;There Was a Premine&amp;rdquo;&lt;/a>&lt;/li>
&lt;li>&lt;a href="#86-devs-get-20-of-mining-rewards">8.6 &amp;ldquo;Devs Get 20% of Mining Rewards&amp;rdquo;&lt;/a>&lt;/li>
&lt;li>&lt;a href="#87-the-zcash-foundation-controls-zcash">8.7 &amp;ldquo;The Zcash Foundation Controls Zcash&amp;rdquo;&lt;/a>&lt;/li>
&lt;li>&lt;a href="#88-the-mossad-is-behind-zcash">8.8 &amp;ldquo;The Mossad Is Behind Zcash&amp;rdquo;&lt;/a>&lt;/li>
&lt;li>&lt;a href="#89-criminals-use-monero-for-a-reason">8.9 &amp;ldquo;Criminals Use Monero for a Reason&amp;rdquo;&lt;/a>&lt;/li>
&lt;li>&lt;a href="#810-monero-is-more-private-because-all-transactions-are-private">8.10 &amp;ldquo;Monero Is More Private Because All Transactions Are Private&amp;rdquo;&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#9-road-ahead">9. Road Ahead&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#91-project-tachyon">9.1 Project Tachyon&lt;/a>&lt;/li>
&lt;li>&lt;a href="#92-network-sustainability-mechanism-nsm">9.2 Network Sustainability Mechanism (NSM)&lt;/a>&lt;/li>
&lt;li>&lt;a href="#93-quantum-resistance">9.3 Quantum Resistance&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#10-conclusion">10. Conclusion&lt;/a>&lt;/li>
&lt;/ul>
&lt;/nav>
&lt;/aside>
&lt;hr>
&lt;p>Contributions to this article are more than welcome &lt;a href="https://github.com/maxdesalle/website/blob/main/content/posts/mastering-zcash.md">on GitHub&lt;/a> through pull requests.&lt;/p>
&lt;hr>
&lt;h2 id="1-introduction">&lt;strong>1. Introduction&lt;/strong>&lt;/h2>
&lt;p>Unless you&amp;rsquo;re using cash, the information about every purchase that you make is tracked and stored indefinitely. It doesn&amp;rsquo;t matter what it is, or how sensitive it is. The infrastructure that powers commerce, both offline and online, has effectively become an inescapable surveillance apparatus.&lt;/p>
&lt;p>When it was first released, there were hopes that Bitcoin could fix this, but unfortunately, it hasn’t. In fact, contrary to many people’s understanding, Bitcoin is incredibly transparent, as every transaction ever made is permanently stored and visible to everyone. Sure, wallets are pseudonymous, but in order to receive BTC you need to provide your address, thus providing your entire transaction history and balance to the sender. On top of that, services like &lt;a href="https://intel.arkm.com/">Arkham&lt;/a> have made it trivial, for even the general public, to track and identify wallets.&lt;/p>
&lt;p>This is why authorities condone Bitcoin, for to state actors, transparent chains are better than the digital currencies that they themselves control (often called &lt;em>Central Bank Digital Currencies&lt;/em> or &lt;em>CBDCs&lt;/em>) in many ways. Since there is no resistance from the population to using Bitcoin, and no oversight on how chain data is used by authorities, it offers perfect visibility for state actors to track everything, with full impunity.&lt;/p>
&lt;p>In some ways, Bitcoin is actually worse than the banking system it sought to replace. At least bank records are private from the general public; Bitcoin isn&amp;rsquo;t.&lt;/p>
&lt;p>It’s for this reason that Zcash takes a different approach: offering default privacy, rather than default transparency. This means that when you make a &lt;em>shielded&lt;/em> Zcash transaction, the sender, the recipient, and the transaction amount are all encrypted. The network verifies the transaction is valid, verifying that you have the funds and aren&amp;rsquo;t spending more ZEC than you own, but isn’t privy to any information about the transaction itself.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">ZEC is the symbol or ticker for Zcash, like what BTC is for Bitcoin.&lt;/div>
&lt;/div>
&lt;p>Initially, when you think about it, this sounds impossible. How can you prove that something is true without revealing the thing that you&amp;rsquo;re proving? The answer is zero-knowledge proofs, specifically a construction called &lt;em>zk-SNARKs&lt;/em>. The coverage of zk-SNARKs in this article will be kept light and accessible to the general reader, as it requires a substantial background in algebra and commitment schemes—beyond this article&amp;rsquo;s scope.&lt;/p>
&lt;p>We will also cover Zcash&amp;rsquo;s origins in academic cryptography, the philosophy that shaped it, and the protocol as it exists today.&lt;/p>
&lt;p>Some parts of this comprehensive study of Zcash will be more technical. Though I have tried to make things as clear and accessible as possible for everyone, if you have trouble with certain concepts, I recommend asking an LLM for clarification or simply skipping it and revisiting it later. If that doesn’t work, don&amp;rsquo;t hesitate to &lt;a href="https://signal.me/#eu/TST_2FkJznjly3Xkn2NnsNRDw32eoOTHwO0L9REt2N1A2fOQ_vdKEYb-C-KsvEW6">reach out&lt;/a> with any questions.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/chaum.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">David Chaum, cryptography pioneer.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="2-origins">&lt;strong>2. Origins&lt;/strong>&lt;/h2>
&lt;h3 id="21-david-chaum-and-the-birth-of-digital-cash">2.1 David Chaum and the Birth of Digital Cash&lt;/h3>
&lt;p>The idea of private digital money is far from new, in fact, it dates back to 1982. David Chaum, who was then a PhD candidate in computer science, published a paper titled &lt;a href="https://link.springer.com/chapter/10.1007/978-1-4757-0602-4_18">&lt;em>&amp;ldquo;Blind Signatures for Untraceable Payments.&amp;rdquo;&lt;/em>&lt;/a>&lt;/p>
&lt;p>The core insight of this paper was simple and elegant: a bank could sign a digital token without seeing its content, just as you could sign the outside of a sealed envelope. Then, when the token was spent, the bank could verify its validity through its own signature, but wouldn’t be able to link the spending to the withdrawal.&lt;/p>
&lt;p>Later, in 1989, David Chaum founded &lt;a href="https://en.wikipedia.org/wiki/DigiCash">DigiCash&lt;/a>, a company built to commercialize this idea. The product was called &lt;a href="https://en.wikipedia.org/wiki/Ecash">ecash&lt;/a> and it enabled users to withdraw digital tokens from their bank accounts and spend them at merchants without leaving a trail connecting the buyer to the purchase. Several banks piloted the technology, including Deutsche Bank and Credit Suisse.&lt;/p>
&lt;p>Unfortunately, DigiCash didn’t succeed, the timing was wrong. Recall that this was created before widespread internet commerce, and before people understood the importance of online privacy. The company filed for bankruptcy in 1998, but with ecash, Chaum had proven that private digital money was doable.&lt;/p>
&lt;h3 id="22-the-cypherpunks">2.2 The Cypherpunks&lt;/h3>
&lt;p>Soon after, a different kind of movement started taking shape. In 1992, a group of cryptographers, hackers, and libertarians started meeting in the San Francisco Bay Area and communicating via an electronic mailing list. They called themselves the &lt;a href="https://en.wikipedia.org/wiki/Cypherpunk">&lt;em>cypherpunks&lt;/em>&lt;/a>.&lt;/p>
&lt;p>The cypherpunks were not academics writing papers, they were ideologues writing code. Their founding premise was that in the digital age, privacy would not be granted by governments or corporations, instead, it would have to be built, deployed, and defended by individuals using cryptographic tools. In 1993, group member &lt;a href="https://en.wikipedia.org/wiki/Eric_Hughes_%28cypherpunk%29">Eric Hughes&lt;/a> crystallized this concept in &lt;a href="https://www.activism.net/cypherpunk/manifesto.html">&lt;em>A Cypherpunk&amp;rsquo;s Manifesto&lt;/em>&lt;/a>:&lt;/p>
&lt;p>&lt;em>&amp;ldquo;Privacy is necessary for an open society in the electronic age&amp;hellip; We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence&amp;hellip; We must defend our own privacy if we expect to have any&amp;hellip; Cypherpunks write code.&amp;rdquo;&lt;/em>&lt;/p>
&lt;p>The mailing list became a crucible for the ideas that would shape the next three decades of cryptographic development. Members included &lt;a href="https://en.wikipedia.org/wiki/Julian_Assange">Julian Assange&lt;/a> (before &lt;a href="https://en.wikipedia.org/wiki/WikiLeaks">WikiLeaks&lt;/a>), &lt;a href="https://en.wikipedia.org/wiki/Hal_Finney_(computer_scientist)">Hal Finney&lt;/a> (who would later receive the first Bitcoin transaction), &lt;a href="https://en.wikipedia.org/wiki/Nick_Szabo">Nick Szabo&lt;/a> (who proposed &lt;a href="https://nakamotoinstitute.org/library/bit-gold/">&lt;em>bit gold&lt;/em>&lt;/a>, a conceptual precursor to Bitcoin), and &lt;a href="https://en.wikipedia.org/wiki/Wei_Dai">Wei Dai&lt;/a> (whose &lt;a href="https://nakamotoinstitute.org/library/b-money/">&lt;em>b-money&lt;/em>&lt;/a> proposal was cited by Satoshi Nakamoto). In 1997, another member, &lt;a href="https://en.wikipedia.org/wiki/Adam_Back">Adam Back&lt;/a>, invented &lt;a href="https://en.wikipedia.org/wiki/Hashcash">&lt;em>Hashcash&lt;/em>&lt;/a>, the &lt;em>Proof of Work (PoW)&lt;/em> system later adopted by Bitcoin.&lt;/p>
&lt;p>The cypherpunks didn&amp;rsquo;t build a successful cryptocurrency, or did they? The creation of Bitcoin is attributed to the pseudonymous Satoshi Nakamoto, rumoured to have been a developer or a group of developers tied to the cypherpunks, and who has not been active in over a decade. In any case, what we know for sure, is that the cypherpunks built the culture, the tools, and the intellectual framework that has made private currency possible.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">&lt;p>Shortly after this article was published, Zooko Wilcox, co-founder of Zcash, reached out noting the following:&lt;/p>
&lt;ul>
&lt;li>He &lt;em>was&lt;/em> on the Cypherpunk mailing list! Meaning the cypherpunks &lt;em>did&lt;/em> create a successful cryptocurrency. Mea culpa for that omission.&lt;/li>
&lt;li>Zooko became friends there with the founders, including &lt;a href="https://en.wikipedia.org/wiki/Timothy_C._May">Tim May&lt;/a> who founded the crypto-anarachist movement, Eric Hughes who wrote &lt;em>A Cypherpunk&amp;rsquo;s Manifesto&lt;/em> as previously mentioned, &lt;a href="https://en.wikipedia.org/wiki/Bram_Cohen">Bram Cohen&lt;/a> who created the BitTorrent protocol and with whom he worked on a startup focused on chains of secure hashes, and &lt;a href="https://en.wikipedia.org/wiki/John_Gilmore_(activist)">John Gilmore&lt;/a> who co-founded the &lt;a href="https://en.wikipedia.org/wiki/Electronic_Frontier_Foundation">Electronic Frontier Foundation&lt;/a>.&lt;/li>
&lt;li>The cypherpunk mailing list was instrumental in his development, with John Gilmore, for example, becoming a friend, mentor, and inspiration.&lt;/li>
&lt;/ul>&lt;/div>
&lt;/div>
&lt;h3 id="23-bitcoin-the-wrong-tradeoff">2.3 Bitcoin: The Wrong Tradeoff&lt;/h3>
&lt;p>On October 31, 2008, Satoshi Nakamoto posted a paper to a cryptography mailing list titled &lt;a href="https://bitcoin.org/bitcoin.pdf">&lt;em>&amp;ldquo;Bitcoin: A Peer-to-Peer Electronic Cash System.&amp;rdquo;&lt;/em>&lt;/a> The paper described a solution to a problem that had plagued digital currency designers for decades: how do you prevent double-spending without relying on a central authority?&lt;/p>
&lt;p>Satoshi&amp;rsquo;s proposed answer was the blockchain: a public ledger maintained by a decentralized network of miners, secured by PoW; it was brilliant, and it worked! Bitcoin launched in January of 2009, and for the first time, people could transfer value over the internet without banks, intermediaries, or permission.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">We will cover what miners and Proof of Work (PoW) are and how they work in the context of Zcash later in this article.&lt;/div>
&lt;/div>
&lt;p>However, there was one glaring problem, as mentioned above, Bitcoin isn&amp;rsquo;t private. The blockchain is entirely public by design: every transaction, every address, and every balance are visible to anyone who’s interested. Satoshi acknowledged this problem in the paper, suggesting that users could preserve some of their privacy by using new addresses for each transaction, but this was weak mitigation, as addresses can be clustered, transaction graphs can be analyzed and real-world identities can be linked through exchanges, merchants, and metadata.&lt;/p>
&lt;p>&lt;a href="https://bitcointalk.org/index.php?topic=770.msg8637#msg8637">Nakamoto also later acknowledged&lt;/a> that a privacy-preserving form of Bitcoin would enable a cleaner implementation of the protocol, but at the time, he couldn&amp;rsquo;t envision how to bring it about with zero-knowledge proofs.&lt;/p>
&lt;p>Problematically, the privacy problem remained overlooked for years. Early Bitcoin users assumed pseudonymity was close enough to anonymity, but they were wrong. By the early 2010s, researchers demonstrated that blockchain analysis could de-anonymize users with high accuracy. Companies like &lt;a href="https://en.wikipedia.org/wiki/Chainalysis">Chainalysis&lt;/a>, founded in 2014, turned this into a business by selling blockchain forensics to law enforcement agencies, exchanges, and even governments.&lt;/p>
&lt;p>Bitcoin had solved the double-spend problem, but it had made the privacy problem worse.&lt;/p>
&lt;h3 id="24-zerocoin-the-bolt-on-attempt">2.4 Zerocoin: The Bolt-On Attempt&lt;/h3>
&lt;p>In 2013, &lt;a href="https://en.wikipedia.org/wiki/Matthew_D._Green">Matthew Green&lt;/a>, a cryptographer at Johns Hopkins University, and two graduate students, &lt;a href="https://www.cs.umd.edu/~imiers/">Ian Miers&lt;/a> and &lt;a href="https://www.cs.purdue.edu/homes/clg/">Christina Garman&lt;/a>, published &lt;a href="https://en.wikipedia.org/wiki/Zerocoin_protocol">&lt;em>“Zerocoin,”&lt;/em>&lt;/a> a paper proposing a solution to Bitcoin’s problem.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">Fun fact shared by Zooko Wilcox after the publication of this article: Ian Miers and Christina Garman later became founding scientists at the Zcash Company (see section 2.6), with Christina Garman later joining the Board of Directors as well.&lt;/div>
&lt;/div>
&lt;p>Their idea was to add a privacy layer on top of Bitcoin, such that users could convert their bitcoins into &lt;em>zerocoins&lt;/em>, anonymous tokens with no transaction history. Later, when you wanted to spend it, you could convert it back to Bitcoin. The conversion process relied on cryptographic techniques known as zero-knowledge proofs, which let you prove that you owned a valid zerocoin without revealing its origin.&lt;/p>
&lt;p>Zerocoin worked in theory, but it had problems. First, the proofs were large, two orders of magnitude larger than the few hundred bytes required for a normal Bitcoin transaction. Second, the cryptography was also limited: you could prove ownership, but you couldn&amp;rsquo;t hide transaction amounts. Third, and most critically, it required Bitcoin to adopt it as a protocol change, but Bitcoin&amp;rsquo;s conservative development culture made that unlikely.&lt;/p>
&lt;p>The Bitcoin community debated Zerocoin and ultimately decided to pass on it. The proposal never made it into the protocol.&lt;/p>
&lt;h3 id="25-zerocash-the-rebuild">2.5 Zerocash: The Rebuild&lt;/h3>
&lt;p>In 2014, a new paper was published. The author list had expanded to include Eli Ben-Sasson and Alessandro Chiesa, cryptographers who had been working on a new generation of zero-knowledge proofs, plus Eran Tromer and Madars Virza.&lt;/p>
&lt;p>The paper was titled &lt;a href="https://ieeexplore.ieee.org/document/6956581">&lt;em>&amp;ldquo;Zerocash: Decentralized Anonymous Payments from Bitcoin.&amp;rdquo;&lt;/em>&lt;/a> Despite what its title may lead you to think, it wasn&amp;rsquo;t simply a Bitcoin extension, it was a complete redesign.&lt;/p>
&lt;p>The key innovation was the use of zk-SNARKs, which stands for &lt;em>Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge&lt;/em>. These were zero-knowledge proofs that were small (a few hundred bytes), fast to verify (milliseconds), and expressive enough to prove complex statements about hidden data. With zk-SNARKs you can prove not just that you own a valid coin, but prove that an entire transaction is valid. This isn&amp;rsquo;t trivial, it means that the system verifies that the transaction amounts are correct, there is no double-spending, etc., all without revealing the sender, recipient, or amount.&lt;/p>
&lt;p>However, there was a catch: zk-SNARKs required a trusted setup. Someone had to generate a set of public parameters that the system would use forever, but, if that person kept the secret values used to generate the parameters, it’s so-called &lt;em>toxic waste&lt;/em>, they could undetectably create counterfeit coins. Though this was of serious concern, the researchers believed it could be prevented with careful ceremony design.&lt;/p>
&lt;h3 id="26-the-genesis-block">2.6 The Genesis Block&lt;/h3>
&lt;p>&lt;a href="https://en.wikipedia.org/wiki/Zooko_Wilcox-O%27Hearn">Zooko Wilcox&lt;/a> had been in the privacy and cryptography space for decades. He had worked at DigiCash in the 1990s and been involved with decentralized storage projects with strong privacy properties like &lt;a href="https://www.tahoe-lafs.org/trac/tahoe-lafs">Tahoe-LAFS&lt;/a>. So, when the Zerocash paper was released, it was an immediate fit.&lt;/p>
&lt;p>In 2016, Wilcox founded the &lt;em>Zcash Company&lt;/em>, later renamed &lt;em>Electric Coin Company&lt;/em>, and assembled a team to turn Zerocash into a production cryptocurrency. The academic authors mentioned above joined as advisors and collaborators on the project.&lt;/p>
&lt;p>The trusted setup problem highlighted above required a creative solution. The team designed an elaborate, multi-party computation ceremony: six participants, all in different locations around the world, would contribute randomness to generate the public parameters, and as long as at least one participant destroyed their secret input, the toxic waste would be unrecoverable. The ceremony took place in late 2016, with participants including &lt;a href="https://en.wikipedia.org/wiki/Peter_Todd_%28programmer%29">Peter Todd&lt;/a>, a Bitcoin Core developer, and journalists who documented the process. Extensive work went into making sure that the ceremony wasn&amp;rsquo;t compromised, as outlined &lt;a href="https://spectrum.ieee.org/the-crazy-security-behind-the-birth-of-zcash">here&lt;/a>.&lt;/p>
&lt;p>On October 28, 2016, the &lt;a href="https://www.youtube.com/watch?v=O8QA6Nvg8RI">Zcash genesis block was mined&lt;/a>. For the first time, a production cryptocurrency offered genuine, cryptographic privacy. Thirty-four years after David Chaum&amp;rsquo;s first paper, the dream of untraceable digital money was running on a live network.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/weimar.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Hyperinflation in the Weimar Republic. Banknotes had lost so much value that they were used as wallpaper.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="3-what-is-zcash">&lt;strong>3. What is Zcash?&lt;/strong>&lt;/h2>
&lt;h3 id="31-a-bitcoin-primer">3.1 A Bitcoin Primer&lt;/h3>
&lt;div class="box box-tip">
&lt;div class="box-title">Tip&lt;/div>
&lt;div class="box-content">If you already understand how Bitcoin works, feel free to skip ahead, this section is for readers unfamiliar with Bitcoin’s inner workings.&lt;/div>
&lt;/div>
&lt;p>Bitcoin is essentially a payment system with no central operator. There is no bank, no company, and no single server that can be pointed to. Its decentralized mechanism operates through thousands of computers around the world that maintain identical copies of a shared ledger, called the &lt;em>blockchain&lt;/em>, and follow a set of rules to keep it in sync.&lt;/p>
&lt;p>The blockchain is an append-only data structure, and it&amp;rsquo;s literally a chain of blocks, so you can add new entries (blocks), but you can never modify or delete old ones. Each new block consists of transactions made on the network at the time the block was created. Additionally, each block references the one preceding it, leading to the formation of a chain. If you wanted to change a transaction from the past, you&amp;rsquo;d have to rewrite every successive block, which becomes computational impossibility once enough time has passed. We will see why that is the case later.&lt;/p>
&lt;h4 id="keys-and-ownership">Keys and Ownership&lt;/h4>
&lt;p>Bitcoin uses public-key cryptography for wallets. When you &amp;ldquo;create a wallet,&amp;rdquo; what you&amp;rsquo;re really doing is generating a key pair: a private key (a large random number, kept secret) and a corresponding public key (derived mathematically from the private key). A Bitcoin address is derived from a public key through hashing and encoding.&lt;/p>
&lt;div class="box box-example">
&lt;div class="box-title">Example&lt;/div>
&lt;div class="box-content">&lt;p>Here&amp;rsquo;s an example of what these look like in practice (abbreviated using &lt;code>...&lt;/code>):&lt;/p>
&lt;ul>
&lt;li>Private key: &lt;code>1E99423A4ED27608A15...E6E9F3A1C2B4D5F6A7B8C9D0&lt;/code>&lt;/li>
&lt;li>Public key: &lt;code>03F028892BAD7ED57D2F...3A6A6C6E7F8C9D0A1B2C3D4E5F607182&lt;/code>&lt;/li>
&lt;li>Bitcoin address: &lt;code>1BoatSLRHtKNngkdXEeobR76b53LETtpyT&lt;/code>&lt;/li>
&lt;/ul>&lt;/div>
&lt;/div>
&lt;p>The private key lets you sign messages, while the public key lets anyone verify that a signature came from the corresponding private key without revealing the private key itself. This cryptography is what retains the private key’s privacy, as you can sign a message authorizing a transfer using your private key, and the network can verify your signature using your public key, without ever seeing your private key.&lt;/p>
&lt;p>An important conclusion here is that this means wallets don&amp;rsquo;t &amp;ldquo;hold&amp;rdquo; BTC in any meaningful sense. There&amp;rsquo;s no file on your computer containing coins. Rather, the blockchain holds the record of which addresses control which outputs, and your wallet is just a signing tool, it stores your private keys and uses them to authorize transactions. If you lose your private keys, you lose access to your funds; not because the coins disappeared, but because you can no longer prove your ownership.&lt;/p>
&lt;h4 id="transactions-and-utxos">Transactions and UTXOs&lt;/h4>
&lt;p>Transactions are how Bitcoin value moves. When you send BTC, you&amp;rsquo;re publishing a signed message that effectively says: &amp;ldquo;I authorize the transfer of these coins to this address,&amp;rdquo; but what exactly are these coins?&lt;/p>
&lt;p>Bitcoin doesn&amp;rsquo;t track balances, there aren’t database entries somewhere saying &amp;ldquo;Address X has 3.5 BTC.&amp;rdquo; Instead, Bitcoin uses &lt;em>Unspent Transaction Outputs&lt;/em>, often abbreviated as &lt;em>UTXOs&lt;/em>. Every transaction consumes existing outputs and then creates new ones. The outputs you control but haven&amp;rsquo;t yet spent are your UTXOs. This means that your &amp;ldquo;balance&amp;rdquo; is just the sum of all of your unspent outputs. There’s no running tally of coins, just a collection of discrete chunks you control.&lt;/p>
&lt;div class="box box-example">
&lt;div class="box-title">Example&lt;/div>
&lt;div class="box-content">&lt;p>Here&amp;rsquo;s a quick example: Imagine that you have a $20 bill and you want to buy a $12 item. Obviously, you can&amp;rsquo;t tear the bill in half, so you hand over the $20 and receive $8 in change.&lt;/p>
&lt;p>UTXOs work the same way. If you own a 5 BTC output and want to send someone 3 BTC, you need to consume the entire 5 BTC output and create two new ones from it: 3 BTC for the recipient and 2 BTC that return to you as change. Your original 5 BTC output is now ‘spent’ and can never be used again.&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>As a result, a Bitcoin transaction is a data structure containing some metadata as well as:&lt;/p>
&lt;ol>
&lt;li>&lt;strong>Inputs:&lt;/strong> References to UTXOs you&amp;rsquo;re spending, plus signatures proving you control them&lt;/li>
&lt;li>&lt;strong>Outputs:&lt;/strong> New UTXOs being created, each locked to a recipient&amp;rsquo;s public key&lt;/li>
&lt;/ol>
&lt;p>Nodes validate that the inputs exist, haven’t been spent yet, and have valid signatures. If everything checks out, the transaction is relayed across the network and waits to be included in a miner’s block.&lt;/p>
&lt;div class="box box-example">
&lt;div class="box-title">Example&lt;/div>
&lt;div class="box-content">&lt;p>Here&amp;rsquo;s what a transaction looks like in practice (hashes and addresses are abbreviated using &lt;code>...&lt;/code>):&lt;/p>
&lt;pre tabindex="0">&lt;code>{
&amp;#34;txid&amp;#34;: &amp;#34;c1b4e693...cbdc5821e3&amp;#34;,
&amp;#34;inputs&amp;#34;: [
{
&amp;#34;prev_txid&amp;#34;: &amp;#34;7b1eabe...98a14f3f&amp;#34;,
&amp;#34;output_index&amp;#34;: 0,
&amp;#34;signature&amp;#34;: &amp;#34;304402204e4...1a8768d1d09&amp;#34;,
&amp;#34;pubkey&amp;#34;: &amp;#34;0479be66...ffb10d4b8&amp;#34;
}
],
&amp;#34;outputs&amp;#34;: [
{
&amp;#34;amount&amp;#34;: 3.0,
&amp;#34;script&amp;#34;: &amp;#34;OP_DUP OP_HASH160 89...ba OP_EQUALVERIFY OP_CHECKSIG&amp;#34;
},
{
&amp;#34;amount&amp;#34;: 1.99,
&amp;#34;script&amp;#34;: &amp;#34;OP_DUP OP_HASH160 12...78 OP_EQUALVERIFY OP_CHECKSIG&amp;#34;
}
]
}
&lt;/code>&lt;/pre>&lt;p>Each input points to a previous transaction&amp;rsquo;s output by referencing its transaction ID and index, and each output specifies an amount. The signature proves you control the private key. The 0.01 BTC difference between the input of 5 BTC and outputs of 3BTC + 1.99 BTC, is the transaction fee, claimed by the miner.&lt;/p>
&lt;/div>
&lt;/div>
&lt;h4 id="mining-and-proof-of-work-pow">Mining and Proof of Work (PoW)&lt;/h4>
&lt;p>Transactions don&amp;rsquo;t confirm themselves. They sit in a waiting area in a node called the mempool (memory pool) until a miner includes them in a block. Mining is the process by which new blocks get added to the chain, and it&amp;rsquo;s designed to be expensive. That&amp;rsquo;s a feature, not a bug, as we will see in a minute.&lt;/p>
&lt;p>The problem solved by mining is: in a decentralized network with no central authority, who decides which transactions are valid? Who decides their ordering? If two conflicting transactions appear, say, someone tries to spend the same coins twice, who resolves this conflict?&lt;/p>
&lt;p>Bitcoin&amp;rsquo;s solution is: in order to create a valid block, a miner must find a number, called a &lt;em>nonce&lt;/em>, such that when the block header (containing the previous block&amp;rsquo;s hash, a timestamp, etc.) is combined with this nonce and hashed, the resulting hash is below a certain target value. Since cryptographic hashes are effectively random, there&amp;rsquo;s no way to find a valid nonce except by guessing, so miners guess billions of times per second.&lt;/p>
&lt;div class="box box-example">
&lt;div class="box-title">Example&lt;/div>
&lt;div class="box-content">&lt;p>For example, think of a block as a page of fixed information with one adjustable number on it (the nonce). Let&amp;rsquo;s assume we start counting the nonce at &lt;code>0&lt;/code>.&lt;/p>
&lt;p>A computer turns the entire page into a single output number called a hash. A hash can be something like &lt;code>6&lt;/code>, or &lt;code>03a5b20&lt;/code>, ultimately it’s just a number (yes, &lt;code>03a5b20&lt;/code> is a number, because it equals &lt;code>3,824,416&lt;/code> in decimal). Remember that the nonce is the only adjustable number on the page, changing only the nonce produces a completely different hash (number) each time.&lt;/p>
&lt;p>The network requires the hash to be below a fixed threshold value, and if it isn’t, the miner changes the nonce and tries again. Finally, the nonce is accepted when the hash meets the threshold requirement.&lt;/p>
&lt;p>For example, imagine a case where the threshold value is &lt;code>5&lt;/code>. The miner has their page of information and starts with a nonce of &lt;code>0&lt;/code>. If the computer returns a &lt;code>6&lt;/code>, which is above &lt;code>5&lt;/code>, the miner tries again, now &lt;code>1&lt;/code> as a nonce. If this time the computer returns a &lt;code>4&lt;/code>, which is below &lt;code>5&lt;/code>, then &lt;code>1&lt;/code> is accepted as a nonce!&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>The difficulty adjusts every 2,016 blocks (about every two weeks), maintaining an average block time of ten minutes. If blocks are coming too fast, the target decreases, making the puzzle harder, and if blocks are coming too slow, the target increases. The difficulty adjustment is why Bitcoin&amp;rsquo;s block rate stays stable even as total mining power fluctuates.&lt;/p>
&lt;div class="box box-example">
&lt;div class="box-title">Example&lt;/div>
&lt;div class="box-content">&lt;p>Here&amp;rsquo;s what a block looks like:&lt;/p>
&lt;pre tabindex="0">&lt;code>{
&amp;#34;header&amp;#34;: {
&amp;#34;version&amp;#34;: 536870912,
&amp;#34;prev_block_hash&amp;#34;: &amp;#34;0000000...de0e5c842&amp;#34;,
&amp;#34;merkle_root&amp;#34;: &amp;#34;8b30c5ba1...1e0d5f8a2c1&amp;#34;,
&amp;#34;timestamp&amp;#34;: 1701432000,
&amp;#34;target&amp;#34;: &amp;#34;0000004f2c0...0000000&amp;#34;,
&amp;#34;nonce&amp;#34;: 2834917243
},
&amp;#34;transactions&amp;#34;: [
{
&amp;#34;txid&amp;#34;: &amp;#34;3a1b9c7e...7e8f9a0b1c&amp;#34;,
&amp;#34;inputs&amp;#34;: [{ &amp;#34;coinbase&amp;#34;: &amp;#34;03a5b20...706f6f6c&amp;#34; }],
&amp;#34;outputs&amp;#34;: [{ &amp;#34;amount&amp;#34;: 6.25, &amp;#34;script&amp;#34;: &amp;#34;OP_HASH160
f1c3...4c6a8 OP_EQUAL&amp;#34; }]
},
{ &amp;#34;txid&amp;#34;: &amp;#34;c1b4e...5821e3&amp;#34; },
{ &amp;#34;txid&amp;#34;: &amp;#34;7d5e8...b5c6d7e&amp;#34; }
]
}
&lt;/code>&lt;/pre>&lt;p>The header is what gets hashed. Miners increment the nonce repeatedly until &lt;code>SHA256(SHA256(header)) &amp;lt; target&lt;/code>, meaning until applying the SHA256 hash function twice on the header returns a hash below the target value. The first transaction is always the &amp;ldquo;coinbase&amp;rdquo; transaction, which creates new coins and pays the miner.&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>Once a miner finds a valid nonce, they broadcast the block and other nodes verify it, checking that the hash meets the target, that all transactions are valid, and that the miner didn&amp;rsquo;t create more coins than allowed. If valid, nodes append the block to their chain and begin working on the next one. The miner earns a block reward in the form of newly minted bitcoin, plus the transaction fees from the transactions included in the block.&lt;/p>
&lt;p>So, how does this system prevent rewriting the past? Because each block’s hash is part of the next block, meaning that changing a single transaction changes the block’s hash and immediately breaks every block that comes after it.&lt;/p>
&lt;div class="box box-example">
&lt;div class="box-title">Example&lt;/div>
&lt;div class="box-content">Imagine that you have two successive blocks, A and B. A&amp;rsquo;s hash is &lt;code>5&lt;/code> and B&amp;rsquo;s hash is &lt;code>6&lt;/code>. If you change a transaction in A, now A&amp;rsquo;s hash has changed, and requires B&amp;rsquo;s hash to change as well. B’s hash takes into account A&amp;rsquo;s hash given that B comes after A and A&amp;rsquo;s hash is in B. So, B&amp;rsquo;s hash will no longer be &lt;code>6&lt;/code> if a transaction is changed in A.&lt;/div>
&lt;/div>
&lt;p>In order to make the chain valid again, an attacker would have to redo the Proof of Work (the process of finding a nonce below a certain target value etc.) for not only that block, but for every subsequent block as well. Meanwhile, honest miners are mining and extending the &amp;ldquo;real&amp;rdquo; chain with new blocks. Additionally, Bitcoin follows the chain with the most cumulative Proof of Work, making it strongly inhibitive for attackers.&lt;/p>
&lt;p>Therefore, a successful attack would require an attacker to have 51% of the mining power in order to eventually catch up with and become the ‘real’ chain. Mining power can also be referred to as &lt;em>hash power&lt;/em>, as miners effectively just hash information countless times every second of every day.&lt;/p>
&lt;h4 id="the-transparency-tradeoff">The Transparency Tradeoff&lt;/h4>
&lt;p>Importantly, for this system to function without a central authority, everyone must be able to verify everything. Every node checks every transaction against the full history of the chain, every UTXO is tracked, and every signature is validated.&lt;/p>
&lt;p>This comes at the cost of privacy, as every transaction and address balance is public. The entire flow of funds, from the 2009 genesis block to the most recently mined block, is visible to anyone who downloads the blockchain.&lt;/p>
&lt;p>So, Bitcoin solved the problem of trustless digital money, but it didn&amp;rsquo;t solve the problem of trustless private digital money. That&amp;rsquo;s where Zcash comes in.&lt;/p>
&lt;h3 id="32-bitcoin-but-private">3.2 Bitcoin, But Private&lt;/h3>
&lt;p>Zcash is effectively like Bitcoin, but with the addition of encryption. In fact, many refer to it as &lt;em>encrypted Bitcoin&lt;/em>, even though it&amp;rsquo;s a completely different cryptocurrency.&lt;/p>
&lt;p>The economics of Zcash are nearly identical to Bitcoin&amp;rsquo;s, so if you understand Bitcoin&amp;rsquo;s monetary policy, you understand Zcash&amp;rsquo;s as well. Zcash has a hard cap of 21 million ZEC, just like Bitcoin has a 21 million BTC hard cap. New coins enter circulation through mining rewards, which halve approximately every four years, as with Bitcoin.&lt;/p>
&lt;p>The consensus mechanism is also Proof of Work, though Zcash uses Equihash rather than Bitcoin&amp;rsquo;s SHA256-based system for mining. Something interesting about Equihash is that it was built with the explicit aim of resisting the specialized ASICs that dominate Bitcoin mining, therefore keeping mining accessible to people with consumer GPUs. The choice reflects Zcash&amp;rsquo;s early emphasis on decentralization, though it no longer works as Equihash ASICs now exist.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">&lt;p>ASIC stands for &lt;em>Application-Specific Integrated Circuit&lt;/em>, you can think of them as computers specifically designed to mine cryptocurrencies. There exist ASICs specialized in SHA256 mining, Equihash mining, etc.&lt;/p>
&lt;p>ASICs hash information (blocks of transactions) all day long in hopes of finding a hash below the network&amp;rsquo;s target value.&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>Under the hood, Zcash uses the same UTXO transaction model as Bitcoin.&lt;/p>
&lt;p>However, Zcash differs from Bitcoin in what you can do with the UTXOs. Bitcoin has one pool of funds: the public chain, whereas Zcash has several, split into the transparent pool and the shielded pools, but both pools use ZEC as currency, and you can move funds between them. The transparent pool works exactly like Bitcoin: addresses start with t, transactions are fully visible, and anyone can trace the flow of funds.&lt;/p>
&lt;p>The shielded pools are completely different and are unique to Zcash. There are three pools , &lt;em>Sprout&lt;/em>, &lt;em>Sapling&lt;/em>, and &lt;em>Orchard&lt;/em>, with Orchard being the newest and most advanced. Sprout and Sapling are now practically unused, since they date back to previous network upgrades and rely on &lt;em>trusted setups&lt;/em>, which Orchard doesn&amp;rsquo;t; we will cover this further later on in the article. Shielded addresses start with z, and transactions reveal nothing about the sender, the recipient, or the amount.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">Henceforth, we will refer to Zcash pools as the transparent pool and the shielded pool, as though there are several shielded pools, in practice they are considered as a unified whole and Orchard one primarily used today.&lt;/div>
&lt;/div>
&lt;p>The transparent pool exists for compatibility and optionality. Some users want auditability, some applications even require it, and exchanges often use transparent addresses for regulatory compliance. In this case, transparency is a feature, not a bug, and Zcash&amp;rsquo;s reliance on encryption for privacy in the shielded pool is unaffected by the usage of the transparent pools.&lt;/p>
&lt;p>We should think of the transparent pool and the shielded pool as two entirely independent systems that do not affect each other. People often mistakenly criticize Zcash&amp;rsquo;s transparency feature as somehow decreasing its privacy, but that is false. The Zcash anonymity set is mathematically independent from how much ZEC sits in transparent addresses. So, even if 99% of ZEC were transparent, the privacy of the shielded 1% would only be determined by the shielded pool itself.&lt;/p>
&lt;h3 id="33-the-fundamental-problem">3.3 The Fundamental Problem&lt;/h3>
&lt;p>In Bitcoin, validating a transaction is straightforward. You check that the inputs exist and haven&amp;rsquo;t been spent before, that the signatures are valid, and that the outputs don&amp;rsquo;t exceed the inputs. Every piece of information needed to verify these conditions is right there on the blockchain, visible to everyone.&lt;/p>
&lt;p>Such transparency is what makes Bitcoin trustless. You don&amp;rsquo;t need to trust anyone because you can verify everything yourself. If you wanted to, you could even run a node for maximal trustlessness. However, this is also what makes Bitcoin a surveillance tool, as the very data that enables verification is the same data that enables tracking.&lt;/p>
&lt;p>Zcash wants both: trustless verification and privacy, but these seem to contradict each other. How can the network verify that a transaction is valid if it can&amp;rsquo;t see the transaction?&lt;/p>
&lt;p>Think about what validation actually requires:&lt;/p>
&lt;ol>
&lt;li>The inputs exist, as you can&amp;rsquo;t spend coins that don&amp;rsquo;t exist.&lt;/li>
&lt;li>The inputs haven&amp;rsquo;t been spent before, so that there’s no double-spending.&lt;/li>
&lt;li>The authorization to spend, since you control the private key.&lt;/li>
&lt;li>The math works out, and outputs don&amp;rsquo;t exceed inputs.&lt;/li>
&lt;/ol>
&lt;p>In Bitcoin, nodes and miners check these four criteria by looking at the data. In Zcash, the sender, recipient, and amount are encrypted, and the data isn&amp;rsquo;t visible. How then can anyone check these criteria?&lt;/p>
&lt;p>The answer is that Zcash doesn&amp;rsquo;t ask nodes and miners to check the data. Instead, the sender provides a zk-SNARK, a cryptographic proof, that demonstrates that the transaction is valid without revealing any of the underlying information. Miners and nodes don&amp;rsquo;t learn what the inputs are, who the recipient is, or how much is being transferred, they only learn one thing: the proof is valid, and therefore the transaction is valid.&lt;/p>
&lt;p>It sounds insane, we can verify a financial transaction is valid, without seeing it!&lt;/p>
&lt;p>The following sections explain why this is possible, including how Zcash represents value and tracks what is spent, as well as how zero-knowledge proofs tie everything together.&lt;/p>
&lt;h3 id="34-shielded-notes">3.4 Shielded Notes&lt;/h3>
&lt;p>As mentioned above, Bitcoin uses UTXOs. Zcash&amp;rsquo;s shielded pool uses something conceptually similar called notes; you can think of notes as encrypted UTXOs.&lt;/p>
&lt;p>So what is a note? A note is an encrypted object representing a specific amount of ZEC. It’s a discrete chunk of value, just like UTXOs, but unlike UTXOs, its contents are hidden. When you receive shielded ZEC, a note is created. When you spend the shielded Zec, that note is consumed and new notes are created for the recipient and your change if applicable, exactly as with UTXOs.&lt;/p>
&lt;div class="box box-example">
&lt;div class="box-title">Example&lt;/div>
&lt;div class="box-content">&lt;p>This is what an Orchard note looks like after decryption:&lt;/p>
&lt;pre tabindex="0">&lt;code>{
&amp;#34;addr&amp;#34;: &amp;#34;u1pg2aaph7jp8rpf6...sz7nt28qjmxgmwxa&amp;#34;,
&amp;#34;v&amp;#34;: 150000000,
&amp;#34;rho&amp;#34;: &amp;#34;0x9f8e7d6c5b4a...f8e7d6c5b4a39281706f5e4d3c2b1a0&amp;#34;,
&amp;#34;psi&amp;#34;: &amp;#34;0x1a2b3c4d5e6f70...c4d5e6f708192a3b4c5d6e7f809&amp;#34;,
&amp;#34;rcm&amp;#34;: &amp;#34;0x7a3b4c5d6e7b...d8e9f0a1b3d4e5f6a7b8c9d0e1f2a3b&amp;#34;
}
&lt;/code>&lt;/pre>&lt;p>In this example, the value field v field shows 1.5 ZEC (150,000,000 zatoshis). The other fields, &lt;code>rho&lt;/code>, &lt;code>psi&lt;/code> and &lt;code>rcm&lt;/code> will be covered later, for now, just understand that they are what makes the cryptography backing Zcash notes possible.&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>Notes are never modified, there is no updating of a balance. Rather, they&amp;rsquo;re created, they exist, and they&amp;rsquo;re destroyed when spent. If you have 10 ZEC and spend 3 ZEC, the original 10 ZEC note is consumed entirely, and two new notes are created: 3 ZEC given to the recipient and 7 ZEC returned to you, just like UTXOs.&lt;/p>
&lt;p>The critical difference between Zcash’s notes and Bitcoin&amp;rsquo;s UTXOs is their visibility. A Bitcoin UTXO is public: everyone can see its value, when it gets spent, etc. A Zcash note is encrypted: only the owner, and anyone they share their viewing key with can see its contents. The blockchain stores a cryptographic commitment to the note, it does not store the note itself.&lt;/p>
&lt;div class="box box-example">
&lt;div class="box-title">Example&lt;/div>
&lt;div class="box-content">&lt;p>The blockchain never sees the decrypted note. In Orchard, each ‘action’ bundles together a spend and an output. Here&amp;rsquo;s what&amp;rsquo;s actually recorded:&lt;/p>
&lt;pre tabindex="0">&lt;code>{
&amp;#34;cv&amp;#34;: &amp;#34;0x9a8b7c6d5...8d7e6f5a4b3c2d1e0f9a8b&amp;#34;,
&amp;#34;nullifier&amp;#34;: &amp;#34;0x2c3d4e5f6a7b...d2e3f48e9f0a1b2c3d&amp;#34;,
&amp;#34;rk&amp;#34;: &amp;#34;0x5e6f7a8b...5a6b7c8d9e0f1a2b3c4d5e6f&amp;#34;,
&amp;#34;cmx&amp;#34;: &amp;#34;0x1a2b3c4d5e6f7...d3e4f5a6b7c8d9e0f1a2b&amp;#34;,
&amp;#34;ephemeralKey&amp;#34;: &amp;#34;0x4d5e6f7a8b9...4f5a6b7c8d9e0f1a2b3c4d5e&amp;#34;,
&amp;#34;encCiphertext&amp;#34;: &amp;#34;0x8f7e6d5c4b3...a29180f7e6d5c&amp;#34;,
&amp;#34;outCiphertext&amp;#34;: &amp;#34;0x3c4d5e6f7a8...b9c0d1e2f3a4b5c&amp;#34;
}
&lt;/code>&lt;/pre>&lt;p>As you can see, it&amp;rsquo;s all encrypted, we will go over the specifics of each field later.&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>You may be thinking, if notes are hidden, how does the network know they exist? Or how does it know when they&amp;rsquo;ve been spent? Here’s where commitments and nullifiers come in.&lt;/p>
&lt;h3 id="35-commitments-and-nullifiers">3.5 Commitments and Nullifiers&lt;/h3>
&lt;p>Zcash&amp;rsquo;s shielded pool faces two problems that Bitcoin solves trivially through transparency:&lt;/p>
&lt;ol>
&lt;li>&lt;strong>Proving notes exist:&lt;/strong> When someone sends you shielded ZEC, how does the network know the note is real?&lt;/li>
&lt;li>&lt;strong>Preventing double-spending:&lt;/strong> When you spend a note, how does the network know you haven&amp;rsquo;t spent it before?&lt;/li>
&lt;/ol>
&lt;p>The solution for Zcash is a combination of two cryptographic mechanisms: commitments and nullifiers.&lt;/p>
&lt;h4 id="commitments">Commitments&lt;/h4>
&lt;p>A commitment is a value computed by hashing the note&amp;rsquo;s fields together. Here’s what it looks like In Orchard:&lt;/p>
&lt;pre tabindex="0">&lt;code>cmx = Hash(addr, v, rho, psi, rcm) = 0x1a2b3c4d...9ca6b7c8d9e0f1a2b
&lt;/code>&lt;/pre>&lt;p>‘Hash’ denotes the hashing function used. We take the fields of the shielded note, feed them to the hash function, and it returns a hash (in this case &lt;code>0x1a2b3c4d...9ca6b7c8d9e0f1a2b&lt;/code>).&lt;/p>
&lt;p>There are two properties that make this useful:&lt;/p>
&lt;ol>
&lt;li>&lt;strong>One-way:&lt;/strong> given the returned hash, &lt;code>0x1a2b3c4d...9ca6b7c8d9e0f1a2b&lt;/code>, you cannot recover the fields &lt;code>addr&lt;/code>, &lt;code>v&lt;/code>, &lt;code>rho&lt;/code>, &lt;code>psi&lt;/code>, or &lt;code>rcm&lt;/code>, and the content of the note is hidden.&lt;/li>
&lt;li>&lt;strong>Collision-resistant:&lt;/strong> you cannot find two different notes that produce the same commitment, each note maps to exactly one commitment.&lt;/li>
&lt;/ol>
&lt;p>Each time that a note is created, its commitment is added to the commitment tree — a Merkle tree — containing every note commitment ever created on the network.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">&lt;p>A Merkle tree is a data structure that lets you prove that an item is in a large set without revealing the item or downloading the entire set.&lt;/p>
&lt;p>Here&amp;rsquo;s how it works. Start with a list of values (in our case, note commitments): &lt;code>cm0&lt;/code> &lt;code>cm1&lt;/code> &lt;code>cm2&lt;/code> &lt;code>cm3&lt;/code>&lt;/p>
&lt;p>Pair them up and hash each pair together:&lt;/p>
&lt;ul>
&lt;li>&lt;code>H0 = Hash(cm0, cm1)&lt;/code>&lt;/li>
&lt;li>&lt;code>H1 = Hash(cm2, cm3)&lt;/code>&lt;/li>
&lt;/ul>
&lt;p>Now you have two hashes. Pair and hash again:&lt;/p>
&lt;p>&lt;code>root = Hash(H0, H1)&lt;/code>&lt;/p>
&lt;p>So far, we have taken pairs of items from the original set and combined each pair using a hash function. We then group the resulting hashes into pairs and hash them again, repeating this process layer by layer until we reach a single final hash. This final value is called the root hash, or Merkle root.&lt;/p>
&lt;p>This root hash effectively summarizes the entire set:&lt;/p>
&lt;pre>&lt;code> root
/ \
/ \
H0 H1
/ \ / \
/ \ / \
cm0 cm1 cm2 cm3
&lt;/code>&lt;/pre>
&lt;p>The key property of Merkle trees is that if you change any leaf (commitment), meaning the values &lt;code>cm0&lt;/code>, &lt;code>cm1&lt;/code>, etc., every single hash above it changes too, all the way back to the root. The root acts as the fingerprint of the entire tree, if you have the same root, then you must have the same tree.&lt;/p>
&lt;p>Additionally, Merkle proofs provide an efficient way to check for an item in the tree without having to check the whole tree.&lt;/p>
&lt;p>For example, to prove that cm1 is in the tree doesn’t require revealing all of the commitments. To do so, just provide a Merkle path, that is, the sibling hashes along the way to the root. For &lt;code>cm1&lt;/code>, the Merkle path is &lt;code>[cm0, H1]&lt;/code>.&lt;/p>
&lt;p>Here&amp;rsquo;s how a verifier could check that:&lt;/p>
&lt;ol>
&lt;li>Take the first element in &lt;code>[cm0, H1]&lt;/code>, meaning &lt;code>cm0&lt;/code>, and hash it with &lt;code>cm1&lt;/code>, the item we want to check, this gives us &lt;code>H0: Hash(cm0, cm1) = H0&lt;/code>&lt;/li>
&lt;li>Hash the output of the first step (&lt;code>H0&lt;/code>) with the following item in &lt;code>[cm0, H1]&lt;/code>, meaning &lt;code>H1&lt;/code>. This gives us the &lt;code>root&lt;/code> hash: &lt;code>Hash(H0, H1) = root&lt;/code>.&lt;/li>
&lt;/ol>
&lt;p>If the result matches the known root, then we can conclude that &lt;code>cm1&lt;/code> is in the tree, importantly, the verifier never sees &lt;code>cm2&lt;/code> or &lt;code>cm3&lt;/code>, it&amp;rsquo;s not necessary for the verification.&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>The commitment tree contains every shielded note commitment ever created, equalling millions of leaves (commitments). So, when you spend a note, you prove (inside the zk-SNARK) that you know a commitment and the valid Merkle path to the current root, without revealing which commitment is yours.&lt;/p>
&lt;p>The commitment tree is stored by nodes, as part of the chain state they maintain. Each block introduces new note commitments which nodes append to their local copy of the tree, updating the root accordingly.. The current root, known as the anchor, is what transactions reference when proving membership.&lt;/p>
&lt;h4 id="nullifiers">Nullifiers&lt;/h4>
&lt;p>Commitments may solve the existence problem, but they also create a new one: how do you prevent spending the same note twice?&lt;/p>
&lt;p>In Bitcoin, this is trivial, because when you spend a UTXO, you directly reference its transaction identification and output index, such that everyone can see the UTXO has been spent. If you try to spend it again, nodes will reject the transactions because the UTXO has been marked as consumed.&lt;/p>
&lt;p>The same is not possible for Zcash. If spending a note required pointing to its commitment, it would reveal which commitment you&amp;rsquo;re spending and link that note to all future transactions, thus breaching privacy.&lt;/p>
&lt;p>In Zcash, the solution to prevent spending the same note twice is &lt;em>nullifiers&lt;/em>. Nullifiers are values derived from a note, and can only be computed by the note&amp;rsquo;s owner.&lt;/p>
&lt;div class="box box-example">
&lt;div class="box-title">Example&lt;/div>
&lt;div class="box-content">&lt;p>Let&amp;rsquo;s say that the commitment tree has 1 million notes, and one of these notes is yours, specifically &amp;lsquo;commitment &lt;code>0x1a2b...&lt;/code>&amp;rsquo;&lt;/p>
&lt;p>If spending the note required you to say &amp;ldquo;I&amp;rsquo;m spending &lt;code>0x1a2b...&lt;/code>&amp;rdquo; then:&lt;/p>
&lt;p>Everyone knows that &lt;code>0x1a2b...&lt;/code> is yours, and it’s no longer just one of a million anonymous commitments. It&amp;rsquo;s tagged as belonging to whoever made this transaction, and though they don’t know what&amp;rsquo;s in that commitment, it’s still problematic that they know it&amp;rsquo;s yours.&lt;/p>
&lt;p>Senders can now track you, as whoever created that note by sending you the ZEC knows the commitment they created. So, when you spend and point to it, they are able to observe that the payment has been spent, and learn when you moved your funds.&lt;/p>
&lt;p>Over time, the spending may become linkable. An observer might be able to correlate transactions based on spending patterns, timing, and destination, such that your commitments get clustered together as &amp;ldquo;probably the same person.&amp;rdquo;&lt;/p>
&lt;p>Nullifiers resolve these issues. If you publish the nullifier &lt;code>0x2c3d...&lt;/code>, which corresponds to the commitment &lt;code>0x1a2b...&lt;/code>, it’s impossible to compute the mapping of commitments to nullifiers without knowing your private key. The commitment remains anonymous in the Merkle tree, your spends cannot be linked, and the sender can&amp;rsquo;t tell if their payment was spent.&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>Here’s an example of a nullifier In Orchard:&lt;/p>
&lt;pre tabindex="0">&lt;code>nullifier = Hash(nk, rho, psi) = 0x2c3d4e5f6a7b...d2e3f48e9f0a1b2c3d
&lt;/code>&lt;/pre>&lt;p>nk is the nullifier deriving key, a secret key only you possess. &lt;code>rho&lt;/code> and &lt;code>psi&lt;/code> are values from the note itself, as seen previously. No one else can compute this nullifier because no one else has your &lt;code>nk&lt;/code>. &lt;code>Hash&lt;/code>, as in previous examples, is the hashing function being used (we will cover this later).&lt;/p>
&lt;p>Anytime that you spend a note, you also publish its nullifier. The network maintains a nullifier set, that is, a collection of every nullifier ever published. So, if a nullifier is already in the set, the transaction gets rejected, thus preventing double-spending.&lt;/p>
&lt;div class="box box-example">
&lt;div class="box-title">Example&lt;/div>
&lt;div class="box-content">&lt;p>Here&amp;rsquo;s how the nullifier set grows over time:&lt;/p>
&lt;ul>
&lt;li>Block 1000000: &lt;code>nullifier set = { }&lt;/code>&lt;/li>
&lt;li>Block 1000001: &lt;code>nullifier set = { 0x2c3d...3d }&lt;/code>&lt;/li>
&lt;li>Block 1000002: &lt;code>nullifier set = { 0x2c3d...3d, 0x8f7a...2b }&lt;/code>&lt;/li>
&lt;li>Block 1000003: &lt;code>nullifier set = { 0x2c3d...3d, 0x8f7a...2b, 0x1e4c...9a }&lt;/code>&lt;/li>
&lt;/ul>
&lt;p>Each spend adds exactly one nullifier. The set cannot shrink, it only ever grows.&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>At the risk of being repetitive, let us cover once more why unlinkability is the critical property. The nullifier reveals nothing about which commitment it corresponds to. An observer sees a nullifier appear and knows that some note was spent, but can&amp;rsquo;t tell which one. The commitment tree could contain millions of notes and the nullifier could correspond to any of them.&lt;/p>
&lt;h4 id="putting-it-all-together">Putting it all together&lt;/h4>
&lt;p>Given that commitments are never deleted, as the commitment tree is append-only and grows indefinitely, commitments remain in the tree even after a note is spent.&lt;/p>
&lt;p>This is precisely what makes Zcash&amp;rsquo;s anonymity set so strong. Spending requires proving &amp;ldquo;I know one of the N million commitments in this tree&amp;rdquo; without revealing which one. The spent note&amp;rsquo;s commitment is mixed among the others, so that even if an observer sees a nullifier appear they could not narrow down which of the millions of commitments it corresponds to.&lt;/p>
&lt;p>Your privacy set includes every shielded note ever created on the network.&lt;/p>
&lt;p>To summarize, every shielded transaction involves:&lt;/p>
&lt;ol>
&lt;li>Creating notes, which adds new note commitments to the commitment tree.&lt;/li>
&lt;li>Spending notes, which publishes and adds a nullifier to the nullifier set.&lt;/li>
&lt;/ol>
&lt;p>In order to construct a transaction, you must provide a zk-SNARK that proves:&lt;/p>
&lt;ul>
&lt;li>You know a note with a commitment in the tree, via a valid Merkle path.&lt;/li>
&lt;li>You know the secret key needed to compute that note&amp;rsquo;s nullifier.&lt;/li>
&lt;li>The nullifier you&amp;rsquo;re publishing corresponds to that note.&lt;/li>
&lt;li>The amounts balance of the entire transaction; inputs equal outputs plus fee.&lt;/li>
&lt;/ul>
&lt;p>The network verifies the proof, checks whether or not the nullifier is in the set, and accepts the transaction. Importantly, it never learns which commitment was spent, who sent funds to whom, or how much was transferred.&lt;/p>
&lt;h3 id="36-keys-and-addresses">3.6 Keys and Addresses&lt;/h3>
&lt;p>Bitcoin has a simple key model: one private key, one public key, and one or more addresses. Zcash&amp;rsquo;s shielded system is more complex, as different operations require different levels of access. Zcash leverages a hierarchy of keys to address this complexity.&lt;/p>
&lt;h4 id="the-spending-key">The Spending Key&lt;/h4>
&lt;p>The spending key (&lt;code>sk&lt;/code>) is your master secret, it’s a very long and random number of 256 bits. Whoever has this can spend your funds, as everything else is derived from the spending key.&lt;/p>
&lt;h4 id="the-full-viewing-key">The Full Viewing Key&lt;/h4>
&lt;p>The full viewing key (&lt;code>fvk&lt;/code>), derived from the spending key, lets you see everything about your wallet&amp;rsquo;s activity: incoming payments, outgoing payments, amounts, and memo fields, but it cannot handle spending.&lt;/p>
&lt;p>The full viewing key is useful for cases where you want to grant someone audit access without giving them control. Through the viewing key an accountant could verify your transaction history, a business could let compliance review its books, or a tax authority could confirm reported income; all without risking that the auditor walks away with the funds.&lt;/p>
&lt;h4 id="incoming-and-outgoing-viewing-keys">Incoming and Outgoing Viewing Keys&lt;/h4>
&lt;p>The full viewing key can also be split into its constituent elements:&lt;/p>
&lt;p>Incoming viewing key (&lt;code>ivk&lt;/code>), which lets you detect and decrypt notes sent to you, but not notes that you’ve sent to others.
Outgoing viewing key (&lt;code>ovk&lt;/code>), which lets you decrypt the outgoing ciphertexts, so that you can see what you&amp;rsquo;ve sent and to whom.&lt;/p>
&lt;p>This granularity exists because users may want to share only limited information. For example, if you want to provide a service with your incoming viewing key so the service can notify you of received payments, without revealing any information about your spending patterns.&lt;/p>
&lt;p>A wallet can also choose to make sent note details unrecoverable, even to holders of the full viewing key. It does this by using a random OVK at the time of sending and immediately zeroing it from memory. The &lt;code>outCiphertext&lt;/code> is then encrypted to a key that no one possesses, making it impossible to determine the recipient address from the FVK alone. The value can still be inferred by subtracting the change from the input total, but the destination is lost.&lt;/p>
&lt;h4 id="the-nullifier-deriving-key">The Nullifier Deriving Key&lt;/h4>
&lt;p>The nullifier deriving key (&lt;code>nk&lt;/code>), also derived from the spending key, is used to compute nullifiers when spending. This is required in order to mark notes as spent, which is why viewing keys alone can&amp;rsquo;t authorize transactions—they don&amp;rsquo;t have access to &lt;code>nk&lt;/code>.&lt;/p>
&lt;h4 id="addresses">Addresses&lt;/h4>
&lt;p>At the bottom of the hierarchy are the addresses: what you give to people so they can pay you. In Orchard, addresses are derived from the incoming viewing key using a diversifier, which is just a small piece of random data. This means that even an IVK-only merchant terminal can derive new diversified addresses without needing the full viewing key or spending authority.&lt;/p>
&lt;p>The diversifier enables diversified addresses, meaning you can generate billions of unlinkable addresses from a single wallet. Though each address is completely different, they all funnel to the same set of keys. Additionally, you can give a unique address to every person or service you interact with.&lt;/p>
&lt;div class="box box-example">
&lt;div class="box-title">Example&lt;/div>
&lt;div class="box-content">&lt;p>Say you receive payments from an employer, a client, and an exchange. You give each a different diversified address:&lt;/p>
&lt;ul>
&lt;li>Employer pays to: &lt;code>u1employer8jp8rpf6...qjmxgmwxa&lt;/code>&lt;/li>
&lt;li>Client pays to: &lt;code>u1clientaph7jp8rpf...sz7nt28qj&lt;/code>&lt;/li>
&lt;li>Exchange pays to: &lt;code>u1exchng2aaph7jp8...gmwxasz7n&lt;/code>&lt;/li>
&lt;/ul>
&lt;p>The three addresses belong to you and your wallet receives each sender’s incoming payments, but the employer, client, and exchange cannot deduce that they’re paying the same user by comparing their addresses.&lt;/p>
&lt;/div>
&lt;/div>
&lt;h4 id="the-key-hierarchy">The Key Hierarchy&lt;/h4>
&lt;p>Here&amp;rsquo;s the hierarchy:&lt;/p>
&lt;pre tabindex="0">&lt;code>spending key (sk)
|
+---&amp;gt; full viewing key (fvk)
| |
| +---&amp;gt; incoming viewing key (ivk)
| |
| +---&amp;gt; outgoing viewing key (ovk)
| |
| +---&amp;gt; addresses (via diversifiers)
|
+---&amp;gt; nullifier deriving key (nk)
&lt;/code>&lt;/pre>&lt;p>As you move down the hierarchy, each level reveals less information. The spending key can do everything, the full viewing key sees everything, but can&amp;rsquo;t spend, and the incoming viewing key only sees incoming funds. Lastly, addresses reveal nothing, they&amp;rsquo;re just destinations.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/eli-ben-sasson.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Eli Ben-Sasson, co-founder of Zcash and now leading StarkWare.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="4-transaction-lifecycle">4. Transaction Lifecycle&lt;/h2>
&lt;p>This chapter will cover exactly what happens when you send shielded ZEC, from the moment you hit ‘send’ to the moment the recipient sees their balance update. To exemplify this, we&amp;rsquo;ll follow every stage of a single transaction, examining what your wallet computes, what the network sees, and what ends up on the blockchain.&lt;/p>
&lt;h3 id="41-the-setup">4.1 The Setup&lt;/h3>
&lt;p>Alice wants to send 5 ZEC to Bob. She opens her wallet, enters Bob&amp;rsquo;s shielded address, specifies the amount, and confirms the send. What happens next involves each of the mechanisms we&amp;rsquo;ve covered thus far: notes, commitments, nullifiers, keys, Merkle proofs, and zk-SNARKs.&lt;/p>
&lt;p>Alice&amp;rsquo;s wallet holds two unspent notes:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Note A:&lt;/strong> 3 ZEC&lt;/li>
&lt;li>&lt;strong>Note B:&lt;/strong> 4 ZEC&lt;/li>
&lt;/ul>
&lt;p>She&amp;rsquo;ll spend both (7 ZEC total) to send Bob 5 ZEC, pay a 0.001 ZEC fee, and receive 1.999 ZEC in change.&lt;/p>
&lt;h3 id="42-note-selection-and-retrieval">4.2 Note Selection and Retrieval&lt;/h3>
&lt;p>Remember, Alice&amp;rsquo;s wallet doesn&amp;rsquo;t actually store ZEC, it stores the information needed to spend notes: the decrypted note data and the keys that control them. When Alice synced her wallet, it scanned the blockchain, attempted to decrypt every shielded output using her incoming viewing key, and stored the ones that succeeded.&lt;/p>
&lt;p>Here&amp;rsquo;s an example of note A:&lt;/p>
&lt;pre tabindex="0">&lt;code> {
&amp;#34;addr&amp;#34;: &amp;#34;u1alice...&amp;#34;,
&amp;#34;v&amp;#34;: 300000000, // 3 ZEC in zatoshis
&amp;#34;rho&amp;#34;: &amp;#34;0x7a8b9c...&amp;#34;,
&amp;#34;psi&amp;#34;: &amp;#34;0x1d2e3f...&amp;#34;,
&amp;#34;rcm&amp;#34;: &amp;#34;0x4a5b6c...&amp;#34;,
&amp;#34;position&amp;#34;: 847291, // Position in commitment tree
&amp;#34;cmx&amp;#34;: &amp;#34;0x9f8e7d...&amp;#34; // The commitment
}
&lt;/code>&lt;/pre>&lt;p>The position field is crucial because it tells the wallet where in the commitment tree this note is situated, information necessary to construct the Merkle proof.&lt;/p>
&lt;h3 id="43-merkle-paths">4.3 Merkle Paths&lt;/h3>
&lt;p>In order to spend a note, Alice must prove that its commitment exists in the tree, without revealing which commitment it is. This requires proving a Merkle path from the commitment to the root.&lt;/p>
&lt;p>Alice&amp;rsquo;s wallet maintains Merkle witnesses locally as it syncs the blockchain, updating them as new commitments are appended to the tree. This is critical: querying a full node for a Merkle path at a specific position would reveal which note is being spent, which would be a serious privacy leak. Full nodes don&amp;rsquo;t even maintain the entire note commitment tree—only recent frontiers and the set of valid anchors.&lt;/p>
&lt;p>For Note A, at position 847,291 in a tree with depth 32, the path consists of 32 sibling hashes:&lt;/p>
&lt;pre tabindex="0">&lt;code> merkle_path_A = [
&amp;#34;0x1a2b3c...&amp;#34;, // Sibling at level 0
&amp;#34;0x4d5e6f...&amp;#34;, // Sibling at level 1
... // 30 more siblings
&amp;#34;0x7g8h9i...&amp;#34; // Sibling at level 31
]
&lt;/code>&lt;/pre>&lt;p>Anyone with access to this path can verify that &lt;code>cmx_A&lt;/code> is in the tree by hashing back to the root. but, inside the zk-SNARK, Alice can prove this without revealing &lt;code>cmx_A&lt;/code> or the path itself.&lt;/p>
&lt;p>The wallet also records the anchor—the Merkle root at the time the witness was captured. The transaction will reference this anchor and nodes can use it to verify that it&amp;rsquo;s a valid root.&lt;/p>
&lt;h3 id="44-computing-nullifiers">4.4 Computing Nullifiers&lt;/h3>
&lt;p>Alice has her notes and their Merkle paths, now she needs to mark them as spent.&lt;/p>
&lt;p>Recall from section 3.5 that nullifiers solve the fundamental problem of preventing double-spending without revealing the note being spent? With Bitcoin, you have to point to a UTXO directly and everyone can see it&amp;rsquo;s now consumed, but with Zcash, pointing to a commitment would destroy privacy by linking you to that specific note.&lt;/p>
&lt;p>Alice computes a nullifier for each note she&amp;rsquo;s spending, the nullifier is derived from the note&amp;rsquo;s data and her secret nullifier deriving key (&lt;code>nk&lt;/code>):&lt;/p>
&lt;pre tabindex="0">&lt;code>nullifier_A = Hash(nk, rho_A, psi_A) = 0x2c3d4e5f...
nullifier_B = Hash(nk, rho_B, psi_B) = 0x8f7a9b2c...
&lt;/code>&lt;/pre>&lt;p>The &lt;code>rho&lt;/code> and &lt;code>psi&lt;/code> values are unique to each note, meaning they were set when the note was created. The &lt;code>nk&lt;/code> is derived from Alice&amp;rsquo;s spending key, but only she possesses it.&lt;/p>
&lt;p>The construction has two critical properties:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>&lt;strong>It’s deterministic:&lt;/strong> Each note produces exactly one nullifier. If Alice tried to spend Note A twice, she&amp;rsquo;d have to publish &lt;code>0x2c3d4e5f...&lt;/code> twice. The network maintains a nullifier set of every nullifier ever published, so the second attempt would be rejected because that nullifier already exists.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>It’s unlinkable:&lt;/strong> No one else can compute the nullifier for Alice&amp;rsquo;s notes because no one else has her nk, and crucially, no one can work backwards from a nullifier to determine its corresponding commitment. So, when &lt;code>0x2c3d4e5f...&lt;/code> appears on the blockchain, observers will see that some note was spent, but won’t be able to tell which of the millions of commitments in the tree it came from.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>The nullifiers will be included in Alice&amp;rsquo;s transaction and published on-chain, but are the only public trace of her spending. Just two opaque 32-byte values that reveal nothing about the notes themselves, their amounts, or who controlled them.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">The nullifier set only grows. Unlike the commitment tree (which is append-only but tracks all notes ever created), the nullifier set tracks spent notes. A note&amp;rsquo;s commitment stays in the tree forever, even after it’s spent. The nullifier&amp;rsquo;s presence in the nullifier set is what marks it as consumed.&lt;/div>
&lt;/div>
&lt;h3 id="45-creating-output-notes">4.5 Creating Output Notes&lt;/h3>
&lt;p>Alice is spending 7 ZEC (3 ZEC + 4 ZEC) and needs to create two new notes: 5 ZEC for Bob and 1.999 ZEC for her change; there’s a 0.001 ZEC transaction fee.&lt;/p>
&lt;p>Each note requires novel randomness, so Alice&amp;rsquo;s wallet generates the cryptographic components that make each note unique and spendable only by its intended recipient.&lt;/p>
&lt;h4 id="generating-note-components">Generating Note Components&lt;/h4>
&lt;p>For Bob&amp;rsquo;s 5 ZEC note:&lt;/p>
&lt;pre tabindex="0">&lt;code>{
&amp;#34;addr&amp;#34;: &amp;#34;u1bob...&amp;#34;, // Bob&amp;#39;s shielded address
&amp;#34;v&amp;#34;: 500000000, // 5 ZEC in zatoshis
&amp;#34;rho&amp;#34;: &amp;#34;0x3e4f5a6b...&amp;#34;, // Derived deterministically
&amp;#34;psi&amp;#34;: &amp;#34;0x7c8d9e0f...&amp;#34;, // Random
&amp;#34;rcm&amp;#34;: &amp;#34;0x1a2b3c4d...&amp;#34; // Random (commitment randomness)
}
&lt;/code>&lt;/pre>&lt;p>For Alice&amp;rsquo;s 1.999 ZEC change note:&lt;/p>
&lt;pre tabindex="0">&lt;code>{
&amp;#34;addr&amp;#34;: &amp;#34;u1alice...&amp;#34;, // Alice&amp;#39;s own address
&amp;#34;v&amp;#34;: 199900000, // 1.999 ZEC in zatoshis
&amp;#34;rho&amp;#34;: &amp;#34;0x5f6a7b8c...&amp;#34;,
&amp;#34;psi&amp;#34;: &amp;#34;0x9d0e1f2a...&amp;#34;,
&amp;#34;rcm&amp;#34;: &amp;#34;0x4e5f6a7b...&amp;#34;
}
&lt;/code>&lt;/pre>&lt;p>The &lt;code>rho&lt;/code> value in Orchard is derived deterministically from the transaction, which prevents against certain types of cryptographic attacks. The &lt;code>psi&lt;/code> and &lt;code>rcm&lt;/code> values are freshly sampled random numbers. Together, these values ensure that even if Alice sends Bob 5 ZEC a thousand times, the note’s commitment would be different every time.&lt;/p>
&lt;h4 id="computing-commitments">Computing Commitments&lt;/h4>
&lt;p>Once the note components are ready, Alice computes the commitment for each output:&lt;/p>
&lt;pre tabindex="0">&lt;code>cmx_bob = Hash(addr_bob, 500000000, rho_bob, psi_bob, rcm_bob)
= 0x8a9b0c1d...
&lt;/code>&lt;/pre>&lt;pre tabindex="0">&lt;code>cmx_alice = Hash(addr_alice, 199900000, rho_alice, psi_alice, rcm_alice)
= 0x2d3e4f5a...
&lt;/code>&lt;/pre>&lt;p>These commitments are what will be published on-chain and added to the commitment tree. They reveal nothing about the notes themselves, they are opaque 32-byte hashes, but anyone who knows the underlying values (the recipient, specifically), can verify that a commitment corresponds to a specific note.&lt;/p>
&lt;h4 id="encrypting-the-notes">Encrypting the Notes&lt;/h4>
&lt;p>The commitments go on-chain, but Bob needs the actual note data in order to later spend his 5 ZEC. He needs to know the value, &lt;code>rho&lt;/code>, &lt;code>psi&lt;/code>, and &lt;code>rcm&lt;/code>, as without these, the commitment is useless as he can&amp;rsquo;t construct a valid nullifier or prove ownership.&lt;/p>
&lt;p>Alice encrypts each note so that only the intended recipient can read it:&lt;/p>
&lt;p>&lt;strong>For Bob:&lt;/strong> Alice uses Bob&amp;rsquo;s address (which contains his public key material) to encrypt the note. The result is the &lt;code>encCiphertext&lt;/code> ciphertext: a blob of encrypted data that can only be decrypted using Bob’s incoming viewing key. When Bob&amp;rsquo;s wallet scans the blockchain and successfully decrypts this ciphertext, he learns he received 5 ZEC and stores all the data needed to spend it.&lt;/p>
&lt;p>&lt;strong>For Alice&amp;rsquo;s records:&lt;/strong> There&amp;rsquo;s a second ciphertext called &lt;code>outCiphertext&lt;/code>: this one is encrypted to Alice&amp;rsquo;s outgoing viewing key, allowing her wallet to remember what she sent. Without this, Alice wouldn&amp;rsquo;t have a record of where her funds went. It&amp;rsquo;s encrypted, rather than being stored in plaintext, so that node operators and observers can&amp;rsquo;t read it.&lt;/p>
&lt;pre tabindex="0">&lt;code>{
&amp;#34;cmx&amp;#34;: &amp;#34;0x8a9b0c1d...&amp;#34;,
&amp;#34;ephemeralKey&amp;#34;: &amp;#34;0x6b7c8d9e...&amp;#34;,
&amp;#34;encCiphertext&amp;#34;: &amp;#34;0x9f8e7d6c5b4a...[512 bytes]...&amp;#34;,
&amp;#34;outCiphertext&amp;#34;: &amp;#34;0x3c4d5e6f7a8b...[80 bytes]...&amp;#34;
}
&lt;/code>&lt;/pre>&lt;p>The &lt;code>ephemeralKey&lt;/code> is a one-time public key generated for this specific encryption, and Bob can use it alongside his private key in order to decrypt &lt;code>encCiphertext&lt;/code>. This is standard for public-key encryption, but the twist is that it&amp;rsquo;s happening inside a system which never linked Bob&amp;rsquo;s address to an identity, and where the ciphertext doesn’t reveal anything to outside observers.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">The encryption is not part of what the zk-SNARK proves. The encryption is a separate layer that ensures only recipients can access their funds, whereas the proof verifies that notes are correctly formed and that the transaction amounts balance. If Alice encrypted incorrectly (or maliciously used the wrong key), the transaction would still be valid on-chain—but Bob would never be able to find or spend his note. In practice, wallets handle this correctly, and the recipient&amp;rsquo;s inability to decrypt would be a wallet bug, not a protocol violation.&lt;/div>
&lt;/div>
&lt;p>At this point, Alice has everything required for the outputs: two commitments to publish and encrypted payloads so that each recipient can claim their note. Now comes the hard part: proving it&amp;rsquo;s valid without revealing any of it.&lt;/p>
&lt;h3 id="46-the-proof">4.6 The Proof&lt;/h3>
&lt;p>Alice has assembled all of the pieces: the two notes to spend, their Merkle paths, the nullifiers that will mark them as consumed, and two fresh output notes with their commitments and encrypted payloads. Now, how to convince the network that everything is valid without revealing the details?&lt;/p>
&lt;p>Here’s where zk-SNARK comes in.&lt;/p>
&lt;h4 id="what-the-proof-demonstrates">What the Proof Demonstrates&lt;/h4>
&lt;p>The proof is a cryptographic object that demonstrates all of the following are true:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>&lt;strong>The input notes exist.&lt;/strong> Alice knows two of the commitments that are in the commitment tree. She proves this when outlining the valid Merkle paths from those commitments to the anchor (the tree root). The proof doesn&amp;rsquo;t reveal which commitments Alice is referencing, just that they&amp;rsquo;re in there somewhere among the millions.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Alice controls the inputs.&lt;/strong> Alice knows the spending keys for both notes, specifically, she knows the secret values needed to derive the nullifiers and authorize the spend. Without this, anyone could try to spend anyone else&amp;rsquo;s notes.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>The nullifiers are correct.&lt;/strong> The nullifiers that she’s publishing actually correspond to the notes she&amp;rsquo;s spending. Alice can&amp;rsquo;t publish arbitrary nullifiers, they must be derived from real notes she controls using the proper formula.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>The transaction amounts balance.&lt;/strong> The sum of the input values (3 + 4 = 7 ZEC) equals the sum of the output values (5 + 1.999 = 6.999 ZEC) plus the fee (0.001 ZEC). No ZEC is created or destroyed. This is the fundamental conservation law of the system.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>The output commitments are well-formed.&lt;/strong> The commitments she&amp;rsquo;s publishing for Bob&amp;rsquo;s note and her change note are correctly computed from valid note data. She can&amp;rsquo;t publish garbage commitments—they must follow the proper structure.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>The network doesn&amp;rsquo;t learn which notes were spent, who the recipient is, or the amount that moved from one party to another. It only learns that someone made a valid transaction: real inputs, real outputs, correct math, and proper authorization. That&amp;rsquo;s enough to update the global state, meaning adding commitments and recording nullifiers, without knowing anything about the transaction itself.&lt;/p>
&lt;h4 id="what-the-proof-actually-is">What the Proof Actually Is&lt;/h4>
&lt;p>After all of this complexity, the proof itself is almost anticlimactic: roughly one to two kilobytes of data - that’s it! It’s just a small blob of bytes that encodes a mathematical argument.&lt;/p>
&lt;p>Verification is fast, just a few milliseconds on modest hardware. A node receives the proof, runs the verification algorithm, and returns a binary answer: valid or invalid. No judgment calls, no heuristics, no probabilistic guesses; the math either checks out or it doesn&amp;rsquo;t.&lt;/p>
&lt;p>This asymmetry is zk-SNARKs’ magic. Creating the proof is computationally expensive, Alice&amp;rsquo;s wallet does real work, crunching through elliptic curve operations and polynomial math. However, verifying the proof is cheap. The asymmetry makes the system practical: every node on the network can verify every shielded transaction without re-doing the heavy computation.&lt;/p>
&lt;h4 id="the-circuit">The Circuit&lt;/h4>
&lt;p>How does Alice actually produce this proof? By running her transaction data through something called a circuit—a formal specification of exactly what conditions must hold for a valid Orchard spend.&lt;/p>
&lt;p>Think of the circuit as a massive checklist encoded in mathematical constraints. The step to prove &amp;ldquo;the Merkle path must be valid&amp;rdquo; becomes a series of hash computations that must produce the right output, the step &amp;ldquo;the nullifier must be correctly derived&amp;rdquo; becomes constraints on how certain values relate to each other, finally &amp;ldquo;the amounts must balance&amp;rdquo; becomes an equation that must hold.&lt;/p>
&lt;p>Alice&amp;rsquo;s wallet takes her private inputs (notes, keys, paths, randomness) and grinds through this circuit to find values that satisfy every constraint. The zk-SNARK machinery then compresses this entire satisfying assignment into a tiny proof that anyone can check.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">The circuit is fixed at the protocol level, and every Orchard transaction uses the same circuit, as defined in the Zcash specification. Alice can&amp;rsquo;t modify the rules, she can only prove that she followed them. This is what makes the system trustless: nodes don&amp;rsquo;t need to trust Alice, they just need to verify that her proof passes the universal circuit agreed to.&lt;/div>
&lt;/div>
&lt;p>Alice&amp;rsquo;s wallet has now produced a proof: a ~1.5 KB object asserting that a valid transaction exists, without saying what it is. Now it’s time to package everything up and send it to the network.&lt;/p>
&lt;h3 id="47-assembling-the-transaction">4.7 Assembling the Transaction&lt;/h3>
&lt;p>Alice has her nullifiers, her output notes, her encrypted payloads, and her proof - now she needs to package everything into a transaction that the network can process.&lt;/p>
&lt;h4 id="the-action-structure">The Action Structure&lt;/h4>
&lt;p>Orchard uses a structure called an action. Each action bundles exactly one spend and one output together, this is a deliberate design choice. Earlier Zcash protocols (Sprout and Sapling), separated spends and outputs, but this leaked information about transaction structure. If you saw a transaction with three spends and one output, you would be learning something. Orchard eliminates this problem by forcing a 1:1 pairing.&lt;/p>
&lt;p>Alice is spending two notes and creating two outputs, so her transaction contains two actions:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Action 0:&lt;/strong> Spends Note A (3 ZEC), creates Bob&amp;rsquo;s note (5 ZEC)&lt;/li>
&lt;li>&lt;strong>Action 1:&lt;/strong> Spends Note B (4 ZEC), creates Alice&amp;rsquo;s change note (1.999 ZEC)&lt;/li>
&lt;/ul>
&lt;p>The pairing within each action is arbitrary. Action 0 doesn&amp;rsquo;t mean Note A &amp;ldquo;became&amp;rdquo; Bob&amp;rsquo;s 5 ZEC. The values don&amp;rsquo;t match, and that&amp;rsquo;s fine. What matters is the global constraint: total inputs equal total outputs plus fee. The action structure just ensures tat observers can&amp;rsquo;t infer transaction shape.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">What if Alice wanted to spend two notes, but only create one output? In order to do this, she would still need two actions, so she would have to create a dummy output in the second action. A dummy is a zero-value note that exists only to balance the structure. The same applies in reverse: if she had one input but needed two outputs, she would include a dummy spend. Observers can&amp;rsquo;t distinguish real actions from dummies.&lt;/div>
&lt;/div>
&lt;h4 id="what-goes-onchain">What Goes Onchain&lt;/h4>
&lt;p>Here&amp;rsquo;s what Alice&amp;rsquo;s transaction actually contains:&lt;/p>
&lt;pre tabindex="0">&lt;code>{
&amp;#34;anchor&amp;#34;: &amp;#34;0x7f8e9d0c...&amp;#34;,
&amp;#34;actions&amp;#34;: [
{
&amp;#34;cv&amp;#34;: &amp;#34;0x9a8b7c6d...&amp;#34;,
&amp;#34;nullifier&amp;#34;: &amp;#34;0x2c3d4e5f...&amp;#34;,
&amp;#34;rk&amp;#34;: &amp;#34;0x5e6f7a8b...&amp;#34;,
&amp;#34;cmx&amp;#34;: &amp;#34;0x8a9b0c1d...&amp;#34;,
&amp;#34;ephemeralKey&amp;#34;: &amp;#34;0x6b7c8d9e...&amp;#34;,
&amp;#34;encCiphertext&amp;#34;: &amp;#34;0x9f8e7d6c...[580 bytes]&amp;#34;,
&amp;#34;outCiphertext&amp;#34;: &amp;#34;0x3c4d5e6f...[80 bytes]&amp;#34;
},
{
&amp;#34;cv&amp;#34;: &amp;#34;0x1b2c3d4e...&amp;#34;,
&amp;#34;nullifier&amp;#34;: &amp;#34;0x8f7a9b2c...&amp;#34;,
&amp;#34;rk&amp;#34;: &amp;#34;0x4d5e6f7a...&amp;#34;,
&amp;#34;cmx&amp;#34;: &amp;#34;0x2d3e4f5a...&amp;#34;,
&amp;#34;ephemeralKey&amp;#34;: &amp;#34;0x8c9d0e1f...&amp;#34;,
&amp;#34;encCiphertext&amp;#34;: &amp;#34;0x7e8f9a0b...[580 bytes]&amp;#34;,
&amp;#34;outCiphertext&amp;#34;: &amp;#34;0x5a6b7c8d...[80 bytes]&amp;#34;
}
],
&amp;#34;proof&amp;#34;: &amp;#34;0x1a2b3c4d...[~1.5 KB]&amp;#34;,
&amp;#34;bindingSig&amp;#34;: &amp;#34;0x4e5f6a7b...[64 bytes]&amp;#34;
}
&lt;/code>&lt;/pre>&lt;p>Let&amp;rsquo;s break this down:&lt;/p>
&lt;p>anchor: The Merkle root that Alice&amp;rsquo;s proof references. This commits her transaction to a specific state of the commitment tree. Nodes will verify this is a valid root that existed at some point in the tree&amp;rsquo;s history. While old anchors are technically valid, wallets typically use recent anchors to maximize the anonymity set.&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>cv (value commitment):&lt;/strong> A cryptographic commitment to the value being spent or created in each action. These don&amp;rsquo;t reveal the actual amounts. Instead, they&amp;rsquo;re constructed so that the sum of all cv values across the transaction encodes the net flow. If the transaction is balanced (inputs = outputs + fee), the math works out. If not, verification fails.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>nullifier:&lt;/strong> The nullifiers for Note A and Note B. These get added to the nullifier set, marking those notes as spent forever.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>rk (randomized verification key):&lt;/strong> This is used to verify the spend authorization signature. This proves Alice authorized this specific transaction without revealing her actual spending key.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>cmx:&lt;/strong> The commitments for Bob&amp;rsquo;s note and Alice&amp;rsquo;s change note. These get added to the commitment tree.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>ephemeralKey + encCiphertext + outCiphertext:&lt;/strong> The encrypted note data, as covered in section 4.5. These don&amp;rsquo;t affect consensus, but without them, recipients couldn&amp;rsquo;t claim their funds.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>proof:&lt;/strong> The zk-SNARK proving everything is valid. One proof covers the entire transaction (both actions).&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>bindingSig:&lt;/strong> A signature that ties all the pieces together. It proves that the cv values across all actions sum correctly (guaranteeing value conservation) and that the transaction hasn&amp;rsquo;t been tampered with. This is the final check that the amounts actually balance.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h4 id="the-fee">The Fee&lt;/h4>
&lt;p>You&amp;rsquo;ll notice the fee isn&amp;rsquo;t explicitly stated anywhere, that’s because it&amp;rsquo;s implicit. Alice’s input total is 7 ZEC and her output total is 6.999 ZEC. The difference, 0.001 ZEC, is the transaction fee, which is claimed by miners.&lt;/p>
&lt;p>The value commitments encode net flow, so when a miner verifies the binding signature, they&amp;rsquo;re confirming that inputs minus outputs equals the claimed fee. If Alice tried to claim her outputs totaled 7 ZEC, leaving no fee, the binding signature would fail. If she tried to create extra ZEC out of thin air and claimed 8 ZEC of outputs from the 7 ZEC of inputs, the proof itself would be invalid.&lt;/p>
&lt;p>The fee is public. Observers can see how much was paid to process the transaction, but that&amp;rsquo;s the only visible value. The input amounts, output amounts, and transfer of value between parties remain hidden.&lt;/p>
&lt;p>Importantly, &lt;a href="https://zips.z.cash/zip-0317">ZIP 317&lt;/a> standardizes fee calculations so that compliant wallets do not permit discretionary fee amounts. This matters for privacy: if wallets allowed arbitrary fees, the choice of fee would leak information that could help fingerprint transactions or distinguish between wallet implementations.&lt;/p>
&lt;h3 id="48-broadcasting-and-mempool">4.8 Broadcasting and Mempool&lt;/h3>
&lt;p>Alice&amp;rsquo;s wallet has assembled the complete transaction, now it needs to reach the network.&lt;/p>
&lt;h4 id="sending-to-the-network">Sending to the Network&lt;/h4>
&lt;p>The sending process proceeds as follows. Alice&amp;rsquo;s wallet connects to one or more Zcash nodes and broadcasts the transaction. The message propagates through the peer-to-peer network, hopping from node to node until it reaches the miners and the broader network. The sending process works exactly as in Bitcoin, the transaction is just data gossiped from nodes to peers.&lt;/p>
&lt;p>From Alice&amp;rsquo;s perspective, this takes one or two seconds. She sees &amp;ldquo;transaction broadcast&amp;rdquo; in her wallet and just waits for the confirmation.&lt;/p>
&lt;h4 id="initial-validation">Initial Validation&lt;/h4>
&lt;p>When a node receives Alice&amp;rsquo;s transaction, it doesn&amp;rsquo;t blindly accept it. Before relaying it further or adding it to the mempool, the node runs a series of checks:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>&lt;strong>Proof verification:&lt;/strong> The node runs the zk-SNARK verifier on Alice&amp;rsquo;s proof. This takes a few milliseconds. If the proof is invalid, the transaction is rejected immediately. No further checks needed.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Anchor check:&lt;/strong> The node verifies that the anchor Alice used (the Merkle root her proof references) is a valid root from the commitment tree&amp;rsquo;s history. The consensus protocol does not prohibit old anchors—any anchor that was ever a valid tree root is accepted. However, using a recent anchor is strongly advisable because it maximizes the anonymity set: the more notes in the tree at the time of the anchor, the larger the crowd Alice&amp;rsquo;s note hides in. Some wallets, like YWallet, allow selection of older anchors to enable spending old notes without requiring the wallet to have scanned all subsequent blocks.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Nullifier check:&lt;/strong> The node checks both nullifiers against its local nullifier set. If either &lt;code>0x2c3d4e5f...&lt;/code> or &lt;code>0x8f7a9b2c...&lt;/code> already exists in the set, Alice is attempting to double-spend. The transaction is rejected.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Structural validity:&lt;/strong> The node confirms the transaction is well-formed: correct field lengths, valid encodings, binding signature verifies, and so on. Malformed transactions are dropped.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>If all of the checks pass, the node considers the transaction valid. Then, it adds the transaction to its mempool (memory pool), a holding area for unconfirmed transactions, and relays it to other nodes.&lt;/p>
&lt;h4 id="waiting-in-the-mempool">Waiting in the Mempool&lt;/h4>
&lt;p>The mempool is purgatory for transactions. Alice&amp;rsquo;s transaction sits there alongside hundreds or thousands of others, all waiting for a miner to pick them up and include them in a block.&lt;/p>
&lt;p>Miners select transactions from the mempool based on fees. Higher fee transactions generally get picked first. Alice paid 0.001 ZEC, which is typical for Zcash, and under normal network conditions, this is enough to get included in the next block or two.&lt;/p>
&lt;p>During the waiting period, Alice&amp;rsquo;s transaction is unconfirmed. The network has validated it, but it hasn&amp;rsquo;t been written into the blockchain yet. Bob&amp;rsquo;s wallet might detect the pending transaction - some wallets show incoming unconfirmed transactions - but he can&amp;rsquo;t spend those funds until the transaction is mined.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">The mempool is not global, nor synchronized, each node maintains its own mempool. Due to network propagation delays, different nodes might have slightly different sets of pending transactions at any given moment. This doesn&amp;rsquo;t matter for consensus, what does matter is which transactions make it into blocks.&lt;/div>
&lt;/div>
&lt;p>The transaction is broadcast. Nodes have validated it. Now, Alice waits for a miner to do the final work.&lt;/p>
&lt;h3 id="49-block-inclusion-and-finality">4.9 Block Inclusion and Finality&lt;/h3>
&lt;p>A miner selects Alice&amp;rsquo;s transaction from their mempool, bundles it with other transactions, and begins the work of mining a new block.&lt;/p>
&lt;h4 id="mining-the-block">Mining the Block&lt;/h4>
&lt;p>Zcash uses Proof of Work, just like Bitcoin. The miner constructs a block header containing the previous block&amp;rsquo;s hash, a timestamp, a Merkle root of the included transactions, and a nonce. Then, they grind through nonces until finding one that produces a hash below the target difficulty.&lt;/p>
&lt;p>This process is identical to what we covered in the Bitcoin primer (section 3.1), with one exception: Zcash uses the Equihash algorithm instead of SHA256. The security properties are the same - finding a valid block requires significant computational work and verifying that work is trivial.&lt;/p>
&lt;p>When a miner finds a valid nonce, they broadcast the block and then other nodes verify it: valid proof of work, valid transactions, correct structure. If everything checks out, nodes append the block to their chain and Alice&amp;rsquo;s transaction becomes part of the permanent record.&lt;/p>
&lt;h4 id="state-updates">State Updates&lt;/h4>
&lt;p>Once the block is accepted, the network&amp;rsquo;s state changes:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>The commitment tree grows:&lt;/strong> Bob&amp;rsquo;s note commitment &lt;code>0x8a9b0c1d...&lt;/code> and Alice&amp;rsquo;s change note commitment &lt;code>0x2d3e4f5a...&lt;/code> are appended to the commitment tree. Now the tree now contains two more leaves than before and a new Merkle root is computed. This root becomes a valid anchor for future transactions.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>The nullifier set expands:&lt;/strong> Alice&amp;rsquo;s two nullifiers (&lt;code>0x2c3d4e5f...&lt;/code> and &lt;code>0x8f7a9b2c...&lt;/code>) are added to the nullifier set. Those notes are now permanently marked as spent. Any future transaction attempting to use either nullifier will be rejected.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>The block reward is issued:&lt;/strong> The miner receives newly minted ZEC (the block subsidy) plus the sum of all transaction fees in the block, including Alice&amp;rsquo;s 0.001 ZEC.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>These state updates are deterministic. Every node that processes the block arrives at exactly the same new state. The commitment tree has the same new root everywhere. The nullifier set contains the same entries everywhere. This is what makes the network consistent without central coordination.&lt;/p>
&lt;h4 id="confirmations">Confirmations&lt;/h4>
&lt;p>Alice&amp;rsquo;s transaction is now confirmed, but confirmation doesn&amp;rsquo;t mean finality.&lt;/p>
&lt;p>Like Bitcoin, Zcash uses pure Proof of Work, which has no cryptographic finality. The chain with the most cumulative
work wins, but nothing prevents a sufficiently resourced attacker from building a longer chain that rewrites history.
Transactions in orphaned blocks return to the mempool or become invalid if they conflict with the attacker&amp;rsquo;s chain.&lt;/p>
&lt;p>The conventional wisdom—that after six confirmations, reversal is &amp;ldquo;negligible&amp;rdquo;—is misleading. It frames security as a
statistical property when it&amp;rsquo;s actually an adversarial one. This applies to all pure-PoW chains, Bitcoin included.
Against an attacker with majority hashpower, no confirmation count provides cryptographic certainty—only economic
assumptions about attacker incentives and hashpower costs.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">Zcash&amp;rsquo;s 75-second block time means confirmations accumulate faster—six confirmations take about seven and a half
minutes versus Bitcoin&amp;rsquo;s hour. Each block represents less work, but confirmations compound quickly.&lt;/div>
&lt;/div>
&lt;p>The transaction is mined and the state is updated. Alice&amp;rsquo;s old notes are gone forever, replaced by two new notes in the commitment tree. One belongs to Bob, and now he needs to find it.&lt;/p>
&lt;h3 id="410-recipient-detection">4.10 Recipient Detection&lt;/h3>
&lt;p>Alice&amp;rsquo;s transaction is on-chain. Bob&amp;rsquo;s 5 ZEC exists as a commitment in the tree, but Bob doesn&amp;rsquo;t know that yet. His wallet needs to find the corresponding note.&lt;/p>
&lt;h4 id="scanning-the-blockchain">Scanning the Blockchain&lt;/h4>
&lt;p>Bob&amp;rsquo;s wallet periodically syncs with the network, downloading new blocks and scanning for incoming payments. The challenge is that Bob can&amp;rsquo;t simply search for his address. Shielded outputs don&amp;rsquo;t contain addresses in plaintext, every output resembles random encrypted data.&lt;/p>
&lt;p>Bob&amp;rsquo;s wallet tries to decrypt every shielded output it encounters, so for each &lt;code>encCiphertext&lt;/code> of every action of every block, the wallet attempts decryption using Bob&amp;rsquo;s incoming viewing key. Most of these attempts fail and produce unusable data, but that’s expected since those outputs belong to someone else.&lt;/p>
&lt;p>Finally, when Bob&amp;rsquo;s wallet hits Alice&amp;rsquo;s transaction and tries to decrypt the ciphertext in Action 0, the decryption succeeds and the valid note data emerges.&lt;/p>
&lt;h4 id="recovering-the-note">Recovering the Note&lt;/h4>
&lt;p>When decryption works, Bob&amp;rsquo;s wallet recovers the full note plaintext:&lt;/p>
&lt;pre tabindex="0">&lt;code>{
&amp;#34;addr&amp;#34;: &amp;#34;u1bob...&amp;#34;,
&amp;#34;v&amp;#34;: 500000000,
&amp;#34;rho&amp;#34;: &amp;#34;0x3e4f5a6b...&amp;#34;,
&amp;#34;psi&amp;#34;: &amp;#34;0x7c8d9e0f...&amp;#34;,
&amp;#34;rcm&amp;#34;: &amp;#34;0x1a2b3c4d...&amp;#34;
}
&lt;/code>&lt;/pre>&lt;p>Bob now has everything he needs:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>The value:&lt;/strong> 5 ZEC (500,000,000 zatoshis). His wallet updates his balance accordingly.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>The note components:&lt;/strong> The &lt;code>rho&lt;/code>, &lt;code>psi&lt;/code>, and &lt;code>rcm&lt;/code> values that Alice generated. These are essential. Without them, Bob couldn&amp;rsquo;t compute the commitment to verify that it matches what&amp;rsquo;s on-chain, or derive the nullifier to spend the note later.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>The position:&lt;/strong> Bob&amp;rsquo;s wallet also records where this commitment sits in the tree. When the block was processed, the commitment was appended at a specific leaf index. Bob needs this position to construct a Merkle path when he eventually spends.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h4 id="verifying-the-note">Verifying the Note&lt;/h4>
&lt;p>Bob&amp;rsquo;s wallet doesn&amp;rsquo;t blindly trust the decrypted data. It recomputes the commitment from the recovered values:&lt;/p>
&lt;pre tabindex="0">&lt;code>cmx_check = Hash(addr_bob, 500000000, rho, psi, rcm)
&lt;/code>&lt;/pre>&lt;p>If &lt;code>cmx_check&lt;/code> matches the &lt;code>cmx&lt;/code> published onchain in Alice&amp;rsquo;s transaction, the note is valid. If they don&amp;rsquo;t match, something is incorrect (either corruption or malicious senders), and the wallet discards the note.&lt;/p>
&lt;p>During normal operations, this check always passes. Alice&amp;rsquo;s wallet constructed the note correctly, and the decryption recovered exactly what she encrypted.&lt;/p>
&lt;h4 id="a-spendable-note">A Spendable Note&lt;/h4>
&lt;p>Bob now owns a spendable 5 ZEC note. His wallet stores the note data locally and keeps it ready for whenever he wants to use it. At that point, he’ll follow the same process that Alice did in order to send it to him:&lt;/p>
&lt;ol>
&lt;li>Select the note&lt;/li>
&lt;li>Retrieve its Merkle path from the locally maintained witnesses&lt;/li>
&lt;li>Compute its nullifier&lt;/li>
&lt;li>Create output notes for his recipients&lt;/li>
&lt;li>Generate a proof&lt;/li>
&lt;li>Broadcast the transaction&lt;/li>
&lt;/ol>
&lt;p>The cycle repeats: Bob&amp;rsquo;s spend will reveal a nullifier, marking his note as consumed, new commitments will be added to the tree, and then new recipients will scan, decrypt, and discover their funds.&lt;/p>
&lt;div class="box box-note">
&lt;div class="box-title">Note&lt;/div>
&lt;div class="box-content">Scanning is the main performance bottleneck for shielded wallets, as a wallet that&amp;rsquo;s been offline for months needs to trial-decrypt millions of outputs to catch up. It’s for this reason that light clients and optimized sync protocols matter. Project Tachyon, mentioned in section 2, aims to dramatically improve the catch-up process with oblivious synchronization, letting wallets query servers for relevant data without revealing what information is being sought.&lt;/div>
&lt;/div>
&lt;p>Alice sent 5 ZEC to Bob. The network verified the transaction without learning who sent what to whom, but Bob was still able to detect his payment without anyone else knowing he received it. The transaction is complete.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/panopticon.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Jeremy Bentham's Panopticon, 1791. A prison designed so inmates never know if they're being watched. They learn to watch themselves.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="5-the-philosophy-of-privacy">5. The Philosophy of Privacy&lt;/h2>
&lt;h3 id="51-privacy-as-a-precondition-for-progress">5.1 Privacy as a Precondition for Progress&lt;/h3>
&lt;p>Privacy does not mean secrecy, for secrecy aims to hide something shameful. Privacy is the right to choose what you reveal and to whom. Privacy is autonomy over your own information, it’s the foundation of freedom itself.&lt;/p>
&lt;p>This distinction matters because critics of privacy often conflate the two. The refrain of authoritarian systems proclaims that &amp;ldquo;if you have nothing to hide, you have nothing to fear,&amp;rdquo; and assumes that privacy is only valuable to those with something to conceal. However, privacy is valuable to everyone, precisely because it creates the conditions for everything else we value: free thought, free speech, free markets, and progress.&lt;/p>
&lt;h4 id="the-conditions-for-progress">The Conditions for Progress&lt;/h4>
&lt;p>Karl Popper thought that progress was dependent on criticism. Bold ideas must be proposed, tested, and corrected, so that errors can be identified and discarded. This process requires freedom from punishment for proposing bold ideas before they’re tested and which risk being wrong. The panopticon ensures that dissent is muted before it can be voiced. Innovation requires permissions and criticism gets punished - the mechanism of progress breaks down.&lt;/p>
&lt;p>David Deutsch extended Popper&amp;rsquo;s insights, positing that humans are unique in virtue of being universal explainers. Our capacity to create knowledge, to understand the cosmos, and even transform them, makes us special. Yet, knowledge creation requires experimentation, and experimentation requires the freedom to fail privately before succeeding publicly. Surveillance inhibits the freedom to experiment, for when every action is observed and recorded, it suffocates creative thinking.&lt;/p>
&lt;p>These are not abstract concerns. They’re the reality of anyone who has self-censored knowing their words were being surveilled. Anyone who chose not to donate to a controversial or novel cause knowing the transaction would be visible or traceable. Anyone who avoided researching a sensitive topic knowing the query would be logged. Surveillance changes behavior, that’s one of its primary functions. Sometimes, changing behaviors amounts to constraining ideas, and thus, to constraining progress.&lt;/p>
&lt;h4 id="money-as-the-final-monopoly">Money as the Final Monopoly&lt;/h4>
&lt;p>Throughout history, freedom has depended on the tools we had to protect it.&lt;/p>
&lt;p>The printing press encouraged free speech. Before Gutenberg, ideas often were chained to scribes and priests, locked behind institutional authority. The press broke the monopoly on information.&lt;/p>
&lt;p>The internet broke the monopoly of geography. Ideas could now be shared across borders in an instant. Coordination became possible without physical proximity. Censorship became harder when information could route around obstacles.&lt;/p>
&lt;p>Gunpowder shattered the monopoly of knights and kings over violence. A peasant with a musket could challenge a lord in armor. Power became more distributed.&lt;/p>
&lt;p>Every time, a new tool smashed an old monopoly. Now, one monopoly remains: money.&lt;/p>
&lt;p>Money is the most powerful coordination technology humans ever built. It’s how we signal value, allocate resources, and cooperate at scale, but it remains significantly restricted. Money is the most surveilled and the most controlled technology. Every transaction can be monitored. Governments can freeze accounts with a keystroke. Banks can cancel you overnight. Increasingly, capital controls can prevent you from withdrawing your own cash.&lt;/p>
&lt;p>Arguably, your money is not yours if someone else can see every transaction you make, decide whether or not to approve it, and later even decide to reverse that decision and inhibit access.&lt;/p>
&lt;h4 id="privacy-in-markets">Privacy in Markets&lt;/h4>
&lt;p>Free markets require privacy, this conclusion follows from understanding how markets work:&lt;/p>
&lt;p>Markets aggregate information through prices, meaning that as participants make decisions based on private knowledge, prices emerge from the sum of those decisions. The mechanism functions only if participants are able to make decisions based on their private information without also revealing it prematurely. A trader who must broadcast every position before taking it will be front-run. A business that must publish every supplier relationship will be undercut. A donor who must announce every contribution will be pressured.&lt;/p>
&lt;p>Any leak, even just of small pieces of information, changes the market because it introduces bias and distorts decisions. The more surveillance there is in a system, the more distortion it faces. Perfect markets require participants who can act freely on private information, which is made impossible under conditions of absolute surveillance.&lt;/p>
&lt;p>Your net worth should not be a public API. Your transaction history should not be a queryable database. Your financial life should not be subject to the approval of observers. These are not edge cases or paranoid concerns, they are the baseline requirements for markets to function and for individuals to be free.&lt;/p>
&lt;h3 id="52-the-transparency-trap">5.2 The Transparency Trap&lt;/h3>
&lt;p>Crypto was supposed to free us from financial surveillance, but It did the opposite.&lt;/p>
&lt;p>The cypherpunks who built this movement understood the stakes at hand. They understood that privacy in the digital age would not be granted by governments or corporations, but would have to be built, deployed, and defended with cryptographic tools. Bitcoin emerged from this tradition, and it did succeed in being the first crack in the dam, proof that money could exist outside government control.&lt;/p>
&lt;p>However, Bitcoin has a major flaw, it’s transparent by default. Every transaction, every address, and every balance is visible to anyone interested in looking for it. The blockchain is a permanent public ledger of all of the economic activity that has ever come across it. Satoshi acknowledged this limitation in his original whitepaper, suggesting that users could preserve some privacy by generating new addresses for each transaction. That was a weak mitigation then, and it’s developed into an absurd one now.&lt;/p>
&lt;p>Pseudonymity means that your identity is not directly tied to your address. Nevertheless, your identity can leak through observation of your behavior, such as the times at which you transact, the amounts that you move, the addresses you interact with, in sum, the patterns you repeat. With each data point the set of possible identities for an address narrows, until finally, with enough constraints, the set collapses to one.&lt;/p>
&lt;p>In the age of AI, pseudonymity is privacy on borrowed time, it’s just an illusion waiting to be dissolved by compute.&lt;/p>
&lt;h4 id="commerce-requires-opacity">Commerce Requires Opacity&lt;/h4>
&lt;p>The transparency problem is not limited to individuals, as commerce also breaks down without privacy.&lt;/p>
&lt;p>Consider what happens when you make a single payment to a business on a transparent chain. Now, you can now see their address, and from that address potentially derive their total revenue, their customer addresses, their supplier relationships, their payroll, even their cash flow and runway.&lt;/p>
&lt;p>There is a reason that HR departments treat compensation structures as closely guarded secrets, that businesses do not publish their supplier contracts, and that financial statements are released quarterly, in controlled formats, rather than streamed in real-time to the public. Competitive markets require informational asymmetry. Businesses must be able to act on private knowledge without broadcasting it to competitors.&lt;/p>
&lt;p>The same logic applies to individuals. If your spending patterns reveal your health conditions, your political affiliations, your religious practices, and your personal relationships, then every transaction becomes a data point in generating a picture of who you are, what you value, and how you can be influenced or coerced.&lt;/p>
&lt;p>The web needed HTTPS before commerce could function online. Transmitting credit card numbers in plaintext was obviously unacceptable due to security reasons. The payment layer of the internet needs the same evolution, just as plaintext transactions were a prototype, production requires encryption.&lt;/p>
&lt;h3 id="53-privacy-must-be-absolute">5.3 Privacy Must Be Absolute&lt;/h3>
&lt;p>Half-measures do not work because privacy is binary - you either have it or you do not.&lt;/p>
&lt;p>This may sound extreme, but it follows from how information works. A secret is only a secret until it leaks, as once it’s leaked, it cannot be unleaked. In a world of permanent storage, pattern recognition, and AI-powered analysis, any partial leak grows to become a full leak. The question is not if the remaining bits of information will be extracted, but when.&lt;/p>
&lt;h4 id="the-single-bit-problem">The Single-Bit Problem&lt;/h4>
&lt;p>Imagine a privacy system that hides 99% of your transaction data but leaks the remaining 1%. That 1% might seem acceptable, but information compounds. One leaked bit constrains possibilities, and two bits constrain it further. Each additional leak narrows the possibilities of who you could be, what you could be doing, and why.&lt;/p>
&lt;p>Adversaries are patient. They’re going to collect partial pieces of information over time, correlate across data sources, and apply statistical techniques to extract the signal from the noise. Though a timing correlation here, an amount pattern there, a network graph connection elsewhere are not individually sufficient to identify you, they can once they converge.&lt;/p>
&lt;p>Remember, this is not a hypothesis, it’s the methodology of chain analysis, metadata analysis, and every modern surveillance system. The assumption that small leaks will remain small is incorrect; small leaks accumulate to compose complete pictures.&lt;/p>
&lt;p>Any privacy system that leaks must answer the following question: What happens when an adversary with unlimited time and compute optimizes against those leaks? If the answer is &amp;ldquo;they eventually win,&amp;rdquo; then the system does not provide privacy, it just provides delayed exposure.&lt;/p>
&lt;h4 id="obfuscation-vs-encryption">Obfuscation vs Encryption&lt;/h4>
&lt;p>There are two approaches to hiding information, either you obfuscate it, making it harder to find among noise, or you encrypt it, making it mathematically inaccessible without the key.&lt;/p>
&lt;p>Obfuscation is hiding a needle in a haystack. It works until someone builds a better magnet. The needle is still there, still findable with sufficient effort. The security is economic, not mathematical. You are betting that finding the needle costs more than it is worth. But costs decline over time. Compute gets cheaper. Algorithms get smarter. Adversaries get more motivated. What is hidden today may be trivially exposed tomorrow.&lt;/p>
&lt;p>Encryption is destroying the needle and keeping only a locked description of it. Without the key, the description is indistinguishable from random noise. There is no magnet that helps. There is no amount of computation that extracts meaning from randomness. Security is mathematical, not economic. It does not degrade over time. An encrypted message from 2016 is exactly as secure today as it was then, assuming the cryptography was sound.&lt;/p>
&lt;p>This distinction matters enormously for financial privacy. Obfuscation-based approaches mix your transaction with others, to hide it among decoys or add noise to the data. Although these techniques raise the cost of analysis, they do not make analysis impossible. As analysis techniques improve, the protection weakens. Privacy that was adequate five years ago may be broken today, and privacy that seems adequate today may be broken by the tools of 2030.&lt;/p>
&lt;p>Encryption-based approaches hide the transaction itself, there is no transaction to analyze, only a proof that a valid transaction occurred. The data is not simply obscured, it is absent, and therefore immune to future developments in analysis techniques; you cannot find patterns in data that do not exist.&lt;/p>
&lt;h4 id="why-this-determines-architecture">Why This Determines Architecture&lt;/h4>
&lt;p>This is why Zcash encrypts transactions rather than obfuscating them. The sender, recipient, and amount are not hidden among decoys or mixed with noise. Instead, they are encrypted. The blockchain stores commitments and proofs, not obscured data, so what the network sees is mathematically indistinguishable from random bytes.&lt;/p>
&lt;p>The concise argument is that if you accept that privacy must be absolute, that partial leaks compound into total exposure, and that adversary capabilities only grow over time, then encryption is the only viable architecture as the permanent solution, and obfuscation is just a temporary measure.&lt;/p>
&lt;p>The choice is not between more privacy and less privacy. It is between privacy that will hold and privacy that will eventually fail. There is no middle ground.&lt;/p>
&lt;h3 id="54-the-macro-case">5.4 The Macro Case&lt;/h3>
&lt;p>So far, the privacy arguments have been philosophical. That privacy enables progress, transparency equates to surveillance, and partial privacy fails, remain true in any era. However, we do not live in just any era, in the current era, the macro environment makes privacy not just valuable but urgent.&lt;/p>
&lt;h4 id="history-does-not-end">History Does Not End&lt;/h4>
&lt;p>The stability of modern western societies may have led people to misjudge the permanence of stability. Throughout history and across the world, stability is the exception, not the rule. Regimes collapse. Currencies fail. Debt cycles reset. Capital controls appear overnight. These are not rare events or distant history, these are features of the modern world happening to someone, somewhere, right now.&lt;/p>
&lt;p>In the past decade alone &lt;a href="https://en.wikipedia.org/wiki/2012%E2%80%932013_Cypriot_financial_crisis">Cyprus seized bank deposits&lt;/a> during its financial crisis and &lt;a href="https://en.wikipedia.org/wiki/Capital_controls_in_Greece">Greece imposed capital controls&lt;/a> preventing citizens from withdrawing their own money. &lt;a href="https://en.wikipedia.org/wiki/Lebanese_liquidity_crisis">Lebanon&amp;rsquo;s banking system collapsed&lt;/a>, trapping savings behind withdrawal limits that have lasted years. &lt;a href="https://en.wikipedia.org/wiki/2018%E2%80%93present_Argentine_monetary_crisis">Argentina cycled through currency crises&lt;/a> with depressing regularity. &lt;a href="https://www.cbn.gov.ng/out/2013/fprd/circular%20to%20all%20banks%20and%20other%20financial%20institutions-us$10,000.pdf">Nigeria restricted access to foreign currency&lt;/a>. &lt;a href="https://www.reuters.com/markets/asia/china-steps-up-scrutiny-capital-flows-yuan-depreciates-2025-02-27/">China tightened capital flight controls&lt;/a>.&lt;/p>
&lt;p>There’s a consistent pattern of governments reaching for financial controls when faced with fiscal pressure. The national economy and central banks allow bank accounts to be frozen, withdrawals limited, transfers blocked, and assets seized. Thus, the question becomes which assets are seizable and which are not.&lt;/p>
&lt;p>Gold has historically served as a hedge against scenarios of fiscal unpredictability. It’s hard to confiscate at scale, difficult to track, and holds value across regime transitions. Unfortunately, gold has terrible user experience in the modern world, as it must be physically acquired, verified for authenticity, stored securely, and transported though it’s high risk. The friction of its user experience limits its utility as a practical store of value for most.&lt;/p>
&lt;p>Bitcoin was supposed to be digital gold. Arguably, it is in certain ways, yet its transparency creates a different vulnerability. If every one of your transactions is visible on a public ledger, the state can simply identify your holdings, track your movements, and apply pressure through legal channels. The transparency that makes Bitcoin trustless also makes it targetable.&lt;/p>
&lt;h4 id="the-surveillance-ratchet">The Surveillance Ratchet&lt;/h4>
&lt;p>Surveillance capabilities only move in one direction: expansion.&lt;/p>
&lt;p>Governments accumulate data, build systems, hire analysts, and develop analysis techniques. Governments can share information across agencies and even across borders. The infrastructure of surveillance, once built, does not get dismantled, but upgraded.&lt;/p>
&lt;p>AI is going to dramatically accelerate these advancements. Pattern matching that once required teams of analysts can now be automated. Metadata that once sat in silos can now be correlated at scale. Behavioral analysis that once took months can now happen in real time. The cost of surveillance per person drops toward zero. The only limit is what data exists to be analyzed.&lt;/p>
&lt;p>On transparent blockchains, that data is everything. Literally every transaction that you have ever made is permanently preserved, waiting for better analysis tools. The blockchain does not forget, and neither do the adversaries mining it for information.&lt;/p>
&lt;p>What you do today will be analyzed with the tools of tomorrow. Transactions that seem anonymous now may be trivially traceable in five years. Patterns that seem hidden in noise today may be obvious signals once the algorithms improve. The decisions that you make in 2026 must account for the state of privacy and analysis in 2030.&lt;/p>
&lt;h4 id="the-precedent-we-must-remember">The Precedent We Must Remember&lt;/h4>
&lt;p>One of the most effective tools of authoritarian control is mandatory disclosure. It doesn’t begin with confiscation, but with the collection of information. Register your religion. Declare your assets. Report your associations. Though these requirements are presented as administrative and bureaucratic, these often precede something worse.&lt;/p>
&lt;p>Once disclosure becomes mandatory, populations can be segmented, and groups can be identified, analyzed, and assessed. Do they follow a religion that we disapprove of? Do they belong to associations that we find threatening? Do they possess assets that we might want? The separation and distinction precedes the persecution, it’s once the data exists that the targeted actions become possible.&lt;/p>
&lt;p>Authoritarian control has occurred within living memory, and even happened without the scalability advantages that modern technology provides. The Nazis used paper records and filing cabinets. Today, our digital tools make population-scale identification and targeting effortless.&lt;/p>
&lt;p>To hold private assets is to refuse these threats, it is to reject the premise that your financial life should be legible to power, it is a stance against a philosophy that has proven catastrophic when implemented.&lt;/p>
&lt;p>AI-powered surveillance is ever expanding. The weaponization of legal systems against disfavored groups is increasing. Capital controls are becoming more common as fiscal pressures mount. Confiscation for political reasons is no longer unthinkable in developed democracies.&lt;/p>
&lt;p>The security of your wealth should not depend on who wins elections. Your savings should not be one policy change away from seizure. Your financial privacy should not rely on the continued goodwill of institutions that have demonstrated their willingness to bend the rules.&lt;/p>
&lt;p>In sum, the macro case for privacy is that bad things have happened, are happening, and will continue to happen. The question is whether you’ll be prepared to face them when they arrive at your door.&lt;/p>
&lt;h3 id="55-the-fork-in-history">5.5 The Fork in History&lt;/h3>
&lt;p>We’re at a branching point. The infrastructure of money is being rebuilt. The choices made now will determine what is possible late, and the branches diverge sharply.&lt;/p>
&lt;h4 id="surveillance-money">Surveillance Money&lt;/h4>
&lt;p>One path leads to total financial visibility, where every transaction is logged, every donation is analyzed, and every purchase builds a profile. This outcome is the trajectory of our current system.&lt;/p>
&lt;p>Central bank digital currencies are being piloted across the globe. For example, &lt;a href="https://en.wikipedia.org/wiki/Digital_renminbi">China&amp;rsquo;s digital yuan&lt;/a> is already deployed at scale, the &lt;a href="https://en.wikipedia.org/wiki/Digital_euro">European Central Bank is developing the digital euro&lt;/a>, and the &lt;a href="https://www.federalreserve.gov/cbdc-faqs.htm">Federal Reserve has studied a digital dollar&lt;/a>. Importantly, these systems are surveillance-enabling, not privacy-preserving, by design. The objective is increased visibility: who spent what, where, when, and with whom.&lt;/p>
&lt;p>Programmable money further extends the logic of fiscal control, introducing expiration dates on currency that force spending, restrictions on what categories of goods can be purchased, social credit systems where financial access depends on behavior scores, and stimulus payments that can only be used at approved vendors. None of this requires conspiracy, it only requires the infrastructure to have been built and the incentives to use it to arise.&lt;/p>
&lt;p>Transparent blockchains fulfill the infrastructure component by providing surveillance without the overhead of building CBDCs. Governments do not need to issue digital currency when citizens voluntarily record their transactions on public ledgers. The outcome is the same: a panopticon where economic activity is legible to anyone with the tools to read it.&lt;/p>
&lt;p>The path of total financial visibility ends with money as a means of control. It’s not an instrument of voluntary coordination, but a device for social management. Spend ‘correctly’ and you are left alone, spend ‘incorrectly’ and you are flagged, restricted, and frozen. The freedom to transact becomes a privilege granted to you by Big Brother.&lt;/p>
&lt;h4 id="freedom-money">Freedom Money&lt;/h4>
&lt;p>The other leads to money that cannot be surveilled, censored, or controlled. Transactions are private by default, and account balances are visible only to their owners, making economic activity legible to participants and opaque to observers.&lt;/p>
&lt;p>It’s important to note that this path does not result in anarchy, a state of being without rules. The result of this path is rules, but rules that are enforced by mathematics rather than institutions. It’s not possible to double-spend because cryptography prevents it. It’s not possible to inflate the supply because the protocol forbids it. It’s not possible to forge transactions because you do not have access to the required keys. The rules are embedded in the system itself, enforced by nodes instead of government, and importantly, immune to discretionary override.&lt;/p>
&lt;p>In this future, markets function without the distortive effect of observation. Group coordination remains possible without the influence of surveillance. Dissenting organizations remain possible because financial support cannot be traced. Innovation remains possible because experimentation cannot be monitored. Thus, the conditions for progress described in section 5.1 are preserved.&lt;/p>
&lt;h4 id="the-encryption-precedent">The Encryption Precedent&lt;/h4>
&lt;p>There’s still reason to believe that the freedom path is not foreclosed.&lt;/p>
&lt;p>In the 1990s, the United States government tried to ban strong encryption. The NSA and FBI argued that encrypted communications would support criminals and terrorists, and pushed for key escrow systems that would provide the government with backdoor access. These federal organizations classified encryption software as munition, making its export illegal.&lt;/p>
&lt;p>The cypherpunks opposed and defeated these measures, but encryption spread anyway. Researchers published algorithms. Developers shipped software. The internet adopted TLS. Today, encryption is not merely legal, but mandatory. HTTPS is required for banking, commerce, and communication. The government that once tried to ban encryption now mandates it to protect citizens.&lt;/p>
&lt;p>The transition from &amp;ldquo;encryption is dangerous&amp;rdquo; to &amp;ldquo;encryption is required&amp;rdquo; took about two decades. It’s very plausible that private money is going to follow this arc. Today, financial privacy is treated with suspicion: regulators view it as a tool for criminals, and compliance frameworks assume transparency to be the default. The arguments for communication privacy, deemed legitimate and important, also extend to financial privacy: individuals need protection from surveillance, commerce requires confidentiality, and the alternative is a world where control surfaces are everywhere.&lt;/p>
&lt;p>Zcash is legal in the United States, it’s even traded on regulated exchanges. It has operated for nearly a decade without being banned. This is not an accident. It reflects the same legal and political logic that protected encryption: the right to use cryptographic tools is defensible, and the benefits of privacy extend far beyond those who would abuse it.&lt;/p>
&lt;h4 id="the-choice">The Choice&lt;/h4>
&lt;p>These paths are mutually exclusive, you cannot have both surveillance money and freedom money. You cannot have both financial privacy and universal transaction monitoring. The infrastructure currently being built will determine which world we inhabit.&lt;/p>
&lt;p>Choosing to shield your transactions is not just a personal financial decision, it’s a vote for which future path to choose. Your choices reveal your preferences, as every transaction in the shielded pool strengthens the network and every user who adopts private money makes it more viable. The technology exists, now we must decide to use it.&lt;/p>
&lt;p>Surveillance money leads to a future where economic freedom is a permission to be granted by the powerful. Freedom money leads to a world where economic freedom is fundamental and guaranteed by mathematics. Which do you choose?&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/northern-rock.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Depositors queue outside Northern Rock, September 2007. The first British bank run in 150 years.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="6-evolution--economics">6. Evolution &amp;amp; Economics&lt;/h2>
&lt;h3 id="61-protocol-generations">6.1 Protocol Generations&lt;/h3>
&lt;p>Zcash has upgraded its core cryptography twice since launching, and with each generation came better performance, stronger security, and fewer trust assumptions. The protocol of today is substantially better than the protocol of 2016.&lt;/p>
&lt;h4 id="sprout-2016">Sprout (2016)&lt;/h4>
&lt;p>The original shielded pool proved that private cryptocurrency was possible, as, for the first time, a production network offered cryptographic privacy backed by zero-knowledge proofs.&lt;/p>
&lt;p>Sprout was just a prototype clothed as production. Creating a shielded transaction required about 40 seconds of computation and several gigabytes of RAM. Sprout was not usable on phones, and barely usable on laptops. Most transactions remained transparent simply because shielding was too costly.&lt;/p>
&lt;p>Sprout also required a trusted setup ceremony, where six participants generated the initial parameters, each taking elaborate precautions to destroy their secret contributions. The ceremony worked, but it left an uncomfortable question: what if someone secretly kept the toxic waste?&lt;/p>
&lt;h4 id="sapling-2018">Sapling (2018)&lt;/h4>
&lt;p>Two years later, Sapling replaced Sprout&amp;rsquo;s cryptography with something far more efficient. The time required for proof generation dropped from forty seconds to just a few. Memory requirements fell to a few dozen megabytes, and shielded transactions became practical on mobile devices for the first time.&lt;/p>
&lt;p>Sapling also introduced features that made privacy more usable. For example, viewing keys let users share read access to their transaction history without exposing spending authority, and diversified addresses let a single wallet generate billions of unlinkable receiving addresses.&lt;/p>
&lt;p>Importantly, the trusted setup remained. A new ceremony called Powers of Tau involved hundreds of participants over several months, followed by a Sapling-specific phase. The larger ceremony increased confidence, but the trust model was the same: believe that at least one participant was honest.&lt;/p>
&lt;h4 id="orchard-2022">Orchard (2022)&lt;/h4>
&lt;p>Orchard replaced the entire system of proofs. Built on the Halo 2 proving system, it didn’t require a trusted setup and there was no ceremony. Thus, there’s no toxic waste and no trust assumptions about events that happened years ago.&lt;/p>
&lt;p>The performance of Orchard is comparable to Sapling, but with slightly larger proofs and no setup requirements. The cryptography is also structured differently, using a new curve cycle (Pallas and Vesta) designed specifically for recursive proofs.&lt;/p>
&lt;p>Orchard is the pool that Zcash was always meant to have. The earlier generations were the best technology available at the time; Orchard is what became possible once the research caught up with the vision.&lt;/p>
&lt;h4 id="today">Today&lt;/h4>
&lt;p>Orchard is now the default for new shielded transactions. Some wallets, like Zashi, route users to Orchard automatically and auto-shield transparent funds before spending.&lt;/p>
&lt;p>Sapling remains supported but is being phased out. It served its purpose as a bridge between the prototype and the production-ready system, but Orchard is the final destination.&lt;/p>
&lt;p>Sprout has deprecated, though the pool still exists on-chain, wallets no longer create new Sprout transactions and users with funds in Sprout are encouraged to migrate.&lt;/p>
&lt;h3 id="62-turnstiles">6.2 Turnstiles&lt;/h3>
&lt;p>Privacy creates an auditing problem. On a transparent chain, you can count every coin. The supply is the sum of all balances and visible to anyone. If a bug allowed coins to be created from nothing, you would see the total increase.&lt;/p>
&lt;p>Shielded pools hide balances. You cannot simply add up what everyone holds because you cannot see what anyone holds. So, if counterfeit coins entered the shielded pool, how would you know?&lt;/p>
&lt;p>The answer is turnstiles.&lt;/p>
&lt;h4 id="the-mechanism">The Mechanism&lt;/h4>
&lt;p>Shielded pools each have their own turnstile, that is, a running tally of the ZEC that has entered and exited the pool. When coins move from the transparent pool into a shielded pool, the turnstile records the deposit, and when coins move back out, it records the withdrawal.&lt;/p>
&lt;p>The math is simple. If the turnstile shows 1 million ZEC have entered a pool and 800,000 ZEC have exited, then at most 200,000 ZEC remain. If someone tries to withdraw 300,000 ZEC, something is wrong, either the cryptography failed, or someone is attempting to commit fraud.&lt;/p>
&lt;p>Turnstiles do not prevent counterfeiting, instead, they detect it. More precisely, turnstiles detect any attempt to cash out counterfeit coins. You can forge ZEC inside a shielded pool (if you somehow break the complex cryptography), but you cannot spend those coins in the transparent pool without the discrepancy being noted.&lt;/p>
&lt;h4 id="the-sprout-bug">The Sprout Bug&lt;/h4>
&lt;p>In 2018, a vulnerability was discovered in the Sprout cryptography. A flaw in the proof system that could have allowed an attacker to create coins without detection inside the shielded pool.&lt;/p>
&lt;p>The bug was found by the Zcash team during a security audit and patched before any exploitation occurred, but the episode demonstrated the importance of turnstiles.&lt;/p>
&lt;p>If an attacker had exploited the bug, they could have minted arbitrary ZEC within Sprout. but they could not have extracted those coins silently. The moment they tried to move forged ZEC into the transparent pool or a different shielded pool, the turnstile math would break and auditors would see that more ZEC exited Sprout than had ever entered.&lt;/p>
&lt;p>Turnstiles would successfully limit the blast radius of any attacks, as even a catastrophic cryptographic failure would not produce undetectable inflation. The damage would be bounded by the pool&amp;rsquo;s capacity, and any attempt to realize the counterfeit value would raise alarms.&lt;/p>
&lt;h3 id="63-funding-development">6.3 Funding Development&lt;/h3>
&lt;p>Zcash made a controversial choice when it launched: to pursue protocol-level funding for development. Rather than relying on donations or corporate sponsorship, a portion of every block reward goes directly to development organizations.&lt;/p>
&lt;h4 id="founders-reward-2016-2020">Founders&amp;rsquo; Reward (2016-2020)&lt;/h4>
&lt;p>For the first four years, 20% of all block rewards went to founders, early investors, employees, and the Zcash Foundation, through what was called the Founders&amp;rsquo; Reward.&lt;/p>
&lt;p>It remained a controversial decision despite the fact that the arrangement was disclosed before launch, and anyone mining or buying ZEC knew the terms. On one hand, the critics saw it as a tax on miners and a windfall for insiders. On the other hand, the supporters saw it as necessary funding for a project that required years of ongoing cryptographic research.&lt;/p>
&lt;p>The Founders&amp;rsquo; Reward ended upon the first halving in November 2020 and every recipient received exactly what was promised. The founders now no longer receive protocol rewards.&lt;/p>
&lt;h4 id="dev-fund-2020-2024">Dev Fund (2020-2024)&lt;/h4>
&lt;p>Before the Founders&amp;rsquo; Reward expired, the community debated what should come next. The result was the Dev Fund, a continuation of the 20% allocation under a different structure.&lt;/p>
&lt;p>The new distribution directed 7% of block rewards to the Electric Coin Company (the primary development team), 5% to the Zcash Foundation (infrastructure and governance), and 8% to community grants administered by an independent committee. The founders and early investors were removed from the funding stream.&lt;/p>
&lt;p>The Dev Fund arrangement ran between the first halving and second halving in November 2024.&lt;/p>
&lt;h4 id="extended-dev-fund-2024-2025">Extended Dev Fund (2024-2025)&lt;/h4>
&lt;p>As the second halving approached, the community voted on the allotment again, and decided to extend the Dev Fund with some modifications.&lt;/p>
&lt;p>Development funding continues at 20% of block rewards, but now a portion flows to a &amp;ldquo;lockbox&amp;rdquo; controlled by future governance mechanisms rather than existing organizations. The intent is to decentralize funding decisions over time, giving token holders more direct influence over how development money is spent.&lt;/p>
&lt;h3 id="64-decentralized-governance">6.4 Decentralized Governance&lt;/h3>
&lt;p>No single entity controls Zcash. Development, infrastructure, and governance are distributed across independent organizations with different jurisdictions, funding sources, and mandates.&lt;/p>
&lt;h4 id="the-organizations">The Organizations&lt;/h4>
&lt;p>Electric Coin Company (ECC) is the primary protocol development team. The ECC team maintains the reference node implementation, develops the Zashi wallet, and drives the core research. ECC is a subsidiary of the Bootstrap Project, a 501(c)(3) nonprofit based in the United States.&lt;/p>
&lt;p>Zcash Foundation handles infrastructure, community programs, and grants. The foundation’s team developed Zebra, an independent node implementation written in Rust, ensuring the network does not depend on a single codebase. The Zcash Foundation is a 501(c)(3) public charity, also US-based but operationally independent from ECC.&lt;/p>
&lt;p>Shielded Labs focuses on long-term research and ecosystem development. Based in Switzerland and funded by donations rather than protocol rewards, it provides geographic and structural diversity to the contributor base.&lt;/p>
&lt;p>Tachyon, led by cryptographer Sean Bowe, is building the infrastructure for Zcash to scale. Bowe was the architect behind Halo 2 and much of Zcash&amp;rsquo;s core cryptography. The Tachyon project aims to enable global private transactions through innovations in how wallets sync with the network without leaking information to servers.&lt;/p>
&lt;p>These four organizations collaborate but are not required to answer to each other. They can disagree and they sometimes do. The diversity of aims and perspectives is a feature that prevents capture and ensures multiple perspectives inform protocol decisions.&lt;/p>
&lt;h4 id="the-zip-process">The ZIP Process&lt;/h4>
&lt;p>Protocol changes follow the Zcash Improvement Proposal (ZIP) process, meaning that anyone can propose a change. Proposals are debated publicly, refined through feedback, and accepted or rejected based on technical merit and community consensus.&lt;/p>
&lt;p>Major decisions skip the ZIP process and are resolved through community-wide polling. The Dev Fund extensions in 2020 and 2024 both involved extensive public deliberation and sentiment gathering before implementation. Input was taken from token holders, miners, and community members.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/enigma.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">The Enigma machine, used by Nazi Germany to encrypt military communications during World War II. Operators changed settings daily, producing messages that appeared as random gibberish to interceptors.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="7-zcash-vs-">7. Zcash VS &amp;hellip;&lt;/h2>
&lt;p>Privacy comes from value at rest, not value in motion.&lt;/p>
&lt;p>This single principle explains why most privacy solutions fail and why base layer encryption is the only architecture that works. Once you understand it, the landscape of privacy technologies becomes clear.&lt;/p>
&lt;h3 id="71-tornado-cash-and-mixers">7.1 Tornado Cash and Mixers&lt;/h3>
&lt;p>Consider what happens when you use a mixer. You deposit funds, wait for some period, then withdraw it to a fresh address. The goal is to break the link between your input and output, but both the deposit and the withdrawal are visible. An observer sees when funds enter and funds exit. The mixer tries to obscure which input corresponds to which output, but this does not ensure privacy.&lt;/p>
&lt;p>Rather, it’s adding privacy to value in motion, which fails for the fundamental reason that the entry and exit points leak information.&lt;/p>
&lt;p>The deposit reveals the time and amount. The withdrawal reveals the time and the amount. If these correlate, privacy is broken. If you deposit 1.5 ETH and someone withdraws 1.5 ETH an hour later, the connection is obvious. Mixers try to solve this with fixed denominations and delays, but the leakage of information remains. Correlations are bound to emerge given enough data and sophisticated analysis.&lt;/p>
&lt;p>AI worsens these risks. Pattern matching that was once impractical becomes trivial to solve with timing analysis, amount clustering, and behavioral patterns. Every mixer is a puzzle waiting for algorithms to develop ways to solve it.&lt;/p>
&lt;p>The only way to truly separate incoming and outgoing transactions is to separate them on the aspects of both time and value. The incoming transaction must not cause the outgoing transaction. The amounts and the transaction timing must be unrelated.&lt;/p>
&lt;p>The private system therefore serves as an actual store of value. Money goes in, it sits, time passes, life happens, until eventually, unrelated amounts go out for unrelated reasons. The deposit and withdrawal are not two parts of a single operation, they are independent events separated by months or years of genuine storage.&lt;/p>
&lt;p>You could, in theory, do this with a mixer like Tornado Cash and leave funds in the pool indefinitely, but this is impractical because you cannot do anything with those funds while they sit there.&lt;/p>
&lt;p>Additionally, Tornado has fixed denomination pools, so you cannot send arbitrary amounts within the pool, you cannot transfer from one Tornado position to another, nor can you use it to pay someone or to interact with any application. To use your funds for anything at all, you must withdraw to a transparent Ethereum address, re-exposing yourself to the surveillance layer.&lt;/p>
&lt;p>Zcash is different. Shielded-to-shielded transfers are native, so you can receive funds, hold them, spend arbitrary amounts, receive change, and transact again, all without ever touching the transparent layer. Bridge from the shielded pool to other chains using Near Intents, paying in shielded ZEC while the recipient receives whatever asset they want. The shielded pool is not a waiting room, it’s a fully functional monetary system.&lt;/p>
&lt;p>This is the architectural distinction that matters. Mixers are escape hatches from transparent systems - you visit them, you wait, you leave. Zcash&amp;rsquo;s shielded pool is a destination - you can live there.&lt;/p>
&lt;h3 id="72-monero">7.2 Monero&lt;/h3>
&lt;p>Monero is the most widely used privacy cryptocurrency besides Zcash. It represents a fundamentally different approach to the information leakage problem, and in understanding why their approach fails, we will clarify why Zcash’s approach works.&lt;/p>
&lt;p>Monero’s approach is to use ring signatures. When you spend funds, your transaction includes your real input plus 15 decoys sampled from the blockchain. An observer sees 16 possible senders and cannot tell which one is real.&lt;/p>
&lt;p>This sounds robust. Sixteen possibilities per transaction. The real spend is hidden among many fakes. In reality, this just means that the privacy is probabilistic, but not cryptographic.&lt;/p>
&lt;p>Law enforcement agencies have successfully traced Monero transactions. There’s even &lt;a href="https://cointelegraph.com/news/monero-transactions-japanese-authorities-arrest-18-scammers">a documented case of Japanese police analyzing Monero transactions&lt;/a> to identify and arrest eighteen suspected fraudsters.&lt;/p>
&lt;p>The fundamental issue is the anonymity set. Each Monero transaction hides among 16 outputs, whereas each Zcash shielded transaction hides among every note ever created in the pool. There are millions of these notes, so the privacy Zcash offers is not incrementally superior, but categorically superior.&lt;/p>
&lt;p>Sixteen is a small number, definitely small enough to attack probabilistically, especially now that timing analysis, amount patterns, and behavioral heuristics can narrow the candidates. Sixteen is small enough that sufficient compute and data will eventually crack it.&lt;/p>
&lt;p>There is no probabilistic attack that works against a privacy set of millions of notes. It’s impossible to narrow the candidates through elimination because nothing is eliminated. The note you spent remains indistinguishable from millions of others forever.&lt;/p>
&lt;p>Monero&amp;rsquo;s developers understand this limitation, and there is active research into replacing ring signatures with zero-knowledge proofs, effectively, it’s planning on adopting Zcash&amp;rsquo;s approach; an implicit acknowledgment that decoy-based privacy has a ceiling.&lt;/p>
&lt;p>The distinction is simple: Monero obfuscates, Zcash encrypts. Obfuscation degrades over time as analysis techniques improve, encryption does not.&lt;/p>
&lt;p>On top of the technical weaknesses, Monero also carries cultural baggage. The community has embraced an association with illicit use, making its institutional adoption nearly impossible. This is part of why Monero has been delisted from virtually every major exchange while Zcash remains available on Coinbase, Gemini, and others. Privacy technology needs a path to legitimacy, and Monero has made that path harder for itself than it needed to be.&lt;/p>
&lt;h3 id="73-privacy-pools">7.3 Privacy Pools&lt;/h3>
&lt;p>Privacy Pools present a different approach to privacy solutions. Rather than hiding among random decoys or encrypting everything, it lets users prove they are not associated with known bad actors. You can withdraw from a pool while demonstrating your funds did not come from sanctioned addresses or flagged transactions.&lt;/p>
&lt;p>The design is clever, association sets let you define who you are willing to be grouped with. Thus, you prove membership in a &amp;ldquo;clean&amp;rdquo; set without revealing which specific deposit is yours. Regulators receive assurance that funds are not tainted and users receive some privacy, everyone is happy.&lt;/p>
&lt;p>Except, this inverts due process.&lt;/p>
&lt;p>The premise of Privacy Pools is that you must prove your innocence. It’s on you to prove that your funds are not associated with criminals and to opt into a set of &amp;ldquo;good&amp;rdquo; users and provide cryptographic evidence that you belong there. The default assumption is suspicion, and the burden falls on you to clear it.&lt;/p>
&lt;p>In functioning legal systems, you do not have to prove that you are not a criminal - the prosecution must prove that you are. Privacy Pools normalize the opposite, that you are guilty until you prove yourself innocent through the approved association sets.&lt;/p>
&lt;p>The implications abound, as your privacy depends on what others choose to disclose. If members of your association set start proving exclusion from various activities to clear their own names, the remaining members become more suspicious. There is constant pressure to prove more, disclose more, and further narrow your set. The system creates chilling effects by design.&lt;/p>
&lt;p>There does not exist &amp;ldquo;compliant encryption&amp;rdquo; for messaging. Signal does not ask you to prove that you are not conversing with terrorists, it accepts that communication privacy is a right, at the cost of benefiting criminals.&lt;/p>
&lt;p>There is no reason that it should be any different for finance. The argument that money is special or that financial privacy uniquely enables harm do not survive scrutiny. Criminals use cars, phones, and the internet, yet, we do not require proof of innocence to drive, call, or browse.&lt;/p>
&lt;p>Privacy Pools attempts to find the middle between surveillance and freedom. It offers privacy that is conditional on compliance, requires proving you deserve it, and that can be withdrawn if you fail to convince others of your innocence.&lt;/p>
&lt;p>It&amp;rsquo;s permissioned finance with extra steps.&lt;/p>
&lt;h3 id="74-aztec-and-private-l2s">7.4 Aztec and Private L2s&lt;/h3>
&lt;p>Ethereum Layer 2s, when supplemented with privacy features, represent serious engineering. Projects like Aztec are building encrypted rollups with sophisticated cryptography. The technology is sound and the team is talented; this is not a critique of their technical capabilities.&lt;/p>
&lt;p>Fundamentally, Aztec and Zcash are solving different problems.&lt;/p>
&lt;p>Aztec is a smart contract platform. Its value proposition is private programmability: encrypted DeFi, confidential computation, and private applications. This is valuable as it enables use cases not addressed by Zcash. If you want to interact with complex financial protocols without exposing your positions, use an encrypted smart contract chain.&lt;/p>
&lt;p>Zcash is money. Its value proposition is being a private store of value and medium of exchange. The memetics are clear: it’s essentially encrypted Bitcoin. A place to hold wealth privately, for years or decades, with confidence that the system will remain in existence and continue to function.&lt;/p>
&lt;p>These are not the same use case, therefore, their requirements differ.&lt;/p>
&lt;p>A store of value needs to be Lindy. It needs to sustain years of operation under adversarial conditions, survive market cycles, regulatory pressure, and technical challenges without breaking. Zcash has already built nearly a decade of this history. Aztec is new, and though the cryptography may be perfect, the system has not been tested over time. This may be acceptable for experimental applications, but not for the security of wealth holdings.&lt;/p>
&lt;p>A store of value also needs memetic strength. Bitcoin succeeded partly because &amp;ldquo;digital gold&amp;rdquo; is a powerful narrative that people understand and believe. &amp;ldquo;Encrypted Bitcoin&amp;rdquo; gives Zcash a similar anchor, inheriting Bitcoin&amp;rsquo;s monetary properties while adding the privacy that Bitcoin lacks. Aztec does not have this narrative, it’s simply a privacy infrastructure layer, not a monetary network.&lt;/p>
&lt;p>Beyond the technical design, there is a social layer. Zcash’s community formed around a shared commitment to privacy as a non-negotiable principle, and over nearly a decade it has resisted legal, political, and reputational pressure to weaken that commitment. By contrast, a Layer-2 system inherits its ultimate norms and governance constraints from its Layer-1. In Ethereum’s case, it is unclear whether the broader community would consistently defend strong encryption and transaction privacy if faced with regulatory pressure. For an asset intended to function as a long-term store of value, that uncertainty itself constitutes risk.&lt;/p>
&lt;p>Aztec and similar projects will likely find significant demand for private applications, but for the core use case of private money, a place where wealth can rest indefinitely, they serve a different purpose than Zcash.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/samizdat.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Samizdat — Soviet citizens copying and distributing banned literature by hand to evade state censorship. Possession meant prison.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="8-misconceptions">8. Misconceptions&lt;/h2>
&lt;h3 id="81-zcash-is-not-private-by-default">8.1 &amp;ldquo;Zcash Is Not Private by Default&amp;rdquo;&lt;/h3>
&lt;p>This misconception confuses what has historically been the default for wallets with protocol design.&lt;/p>
&lt;p>The misconception about default privacy arose because early wallets defaulted to transparent addresses for reasons of practicality. In Sprout and Sapling, shielded transactions were computationally expensive and exchanges required transparent deposits. So, the path of least resistance was often transparent.&lt;/p>
&lt;p>Orchard has now made shielded transactions more efficient and wallets like Zashi enforce shielding by default, automatically moving any transparent funds into the shielded pool before allowing you to spend. The user experience has become private-first.&lt;/p>
&lt;p>The transparent option remains for specific use cases, such as exchange compatibility, regulatory compliance, and user choice, but the default path through modern Zcash is shielded from start to finish.&lt;/p>
&lt;h3 id="82-the-anonymity-set-is-small">8.2 &amp;ldquo;The Anonymity Set Is Small&amp;rdquo;&lt;/h3>
&lt;p>This misconception stems from confusing Zcash with decoy-based systems.&lt;/p>
&lt;p>As we covered above, in Monero, your transaction hides among a fixed number of decoys. If there are 16 possible senders, your anonymity set is 16. Therefore, many critics assume that Zcash works similarly: if few people use the shielded pool, then your transaction hides among just a few others.&lt;/p>
&lt;p>However, this is wrong. Zcash does not sample decoys, it uses Merkle tree membership proofs.&lt;/p>
&lt;p>When you spend a shielded note, you prove that it exists somewhere in the commitment tree that contains every note ever created, without revealing which note it is. The verifier learns only that your note is one of the millions, not hundreds or thousands, in the tree.&lt;/p>
&lt;p>The Orchard pool contains millions of notes, that’s the anonymity set for every shielded transaction and it grows with every transaction and never shrinks.&lt;/p>
&lt;p>The size of the transparent pool is irrelevant, even if 99% of ZEC sat in transparent addresses, the shielded 1% would have an anonymity set of every shielded note ever created. The two pools are mathematically independent.&lt;/p>
&lt;h3 id="83-optional-transparency-weakens-privacy">8.3 &amp;ldquo;Optional Transparency Weakens Privacy&amp;rdquo;&lt;/h3>
&lt;p>This misconception assumes the transparent pool somehow contaminates the shielded pool.&lt;/p>
&lt;p>The two are independent systems, transparent ZEC and shielded ZEC operate in parallel. Transactions on the transparent side reveal nothing about the shielded side. The cryptographic guarantees of shielded transactions do not depend on how much ZEC sits in transparent addresses.&lt;/p>
&lt;p>Think of it as two separate ledgers that happen to share a currency; activity on one does not affect the privacy properties of the other.&lt;/p>
&lt;p>The transparent option exists because it provides real value. Exchanges can use transparent addresses for deposits and withdrawals, satisfying compliance requirements while still listing ZEC. This permits users who need auditability to choose it and applications that require transparency to build on it.&lt;/p>
&lt;p>The optional transparency does not compromise shielded privacy, it simply increases Zcash’s adoptability, something that completely private-by-default chains lack. This is exemplified by the fact that Monero has been delisted from major exchanges, while Zash remains on Coinbase and Gemini.&lt;/p>
&lt;h3 id="84-zcash-uses-a-trusted-setup">8.4 &amp;ldquo;Zcash Uses a Trusted Setup&amp;rdquo;&lt;/h3>
&lt;p>This misconception has failed to update from what once was true, but isn’t anymore.&lt;/p>
&lt;p>Sprout and Sapling required trusted setup ceremonies where participants generated cryptographic parameters and destroyed the secret values used to create them. If anyone kept those secrets, they could forge proofs and mint counterfeit ZEC.&lt;/p>
&lt;p>As covered above, the ceremonies were elaborate, consisting of multiple participants, air-gapped machines, and even subsequently destroyed hardware. Despite these strong precautions, the trust model introduced modicums of doubt.&lt;/p>
&lt;p>Orchard resolved this issue by using Halo 2, a proving system that requires no trusted setup. There was no ceremony, no toxic waste, and no threat of secrets not being destroyed. Now, the parameters come from public, verifiable data.&lt;/p>
&lt;p>Zcash&amp;rsquo;s shielded pool is now trustless, just like Bitcoin, and the security is guaranteed by cryptographic mathematics, rather than faith in ceremony participants.&lt;/p>
&lt;h3 id="85-there-was-a-premine">8.5 &amp;ldquo;There Was a Premine&amp;rdquo;&lt;/h3>
&lt;p>This misconception is fundamentally incorrect. No coins existed before the genesis block, there was zero premine.&lt;/p>
&lt;p>The fallacy arises from the Founders&amp;rsquo; Reward, because during Zcash’s first four years, 20% of block rewards went to founders, investors, employees, and the Zcash Foundation. However, this was not a premine, it was simply a portion of ongoing issuance, created through mining, just as for every other coin.&lt;/p>
&lt;p>This distinction matters. Premine would have created coins before anyone else can participate, whereas the Founders&amp;rsquo; Reward created coins at the same rate as miner rewards, and then directed them differently. Miners received 80% of each block, and founders received the remaining 20%, importantly, both came from the same issuance schedule.&lt;/p>
&lt;p>The terms of the Founder’s Reward were fully disclosed before launch, both the whitepaper and the website explained its reason and its process. So anyone mining or buying ZEC in 2016 knew exactly how its distribution functioned, and there was no hidden allocation, secret stash, or coins that appeared from nowhere.&lt;/p>
&lt;p>The Founders&amp;rsquo; Reward ended upon the first halving in November 2020, at that point, every recipient had received what was publicly promised and nothing more.&lt;/p>
&lt;h3 id="86-devs-get-20-of-mining-rewards">8.6 &amp;ldquo;Devs Get 20% of Mining Rewards&amp;rdquo;&lt;/h3>
&lt;p>This misconception conflates two programs and their respective recipients.&lt;/p>
&lt;p>The Founders&amp;rsquo; Reward ran from 2016 to 2020, directed 20% of block rewards to founders, early investors, employees, and the Zcash Foundation, and ended at the first halving. Therefore, founders haven’t received protocol rewards since 2020.&lt;/p>
&lt;p>The Dev Fund replaced the Founder’s Reward and ran from 2020 to 2024. The Dev Fund also allocates 20% of block rewards, but to different recipients. ECC receives 7% for protocol development, the Zcash Foundation receives 5% for infrastructure and grants, and community grants, administered by an independent community, receive 8%.&lt;/p>
&lt;p>Contrary to misconceptions, Dev Fund does not serve to support personal enrichment. Rather, it funds organizations that employ developers, maintain infrastructure, and award grants to ecosystem projects. The fund pays for Zcash’s continuous improvement.&lt;/p>
&lt;p>The alternative is Bitcoin’s model, which relies on donations and corporate sponsorships—an approach with its own tradeoffs. Zcash instead adopted protocol-level funding to support sustainable development, and nearly nine years of continuous upgrades suggest that this choice has been justified.&lt;/p>
&lt;h3 id="87-the-zcash-foundation-controls-zcash">8.7 &amp;ldquo;The Zcash Foundation Controls Zcash&amp;rdquo;&lt;/h3>
&lt;p>This misconception fails to understand that no single entity controls Zcash.&lt;/p>
&lt;p>In fact, there are four independent organizations that contribute to the protocol. The Electric Coin Company (ECC) builds the reference implementation and Zashi wallet. The Zcash Foundation maintains Zebra, an independent node implementation, and administers grants. Shielded Labs conducts research from Switzerland. The Tachyon team, led by Sean Bowe, builds scalability infrastructure.&lt;/p>
&lt;p>These organizations operate in different jurisdictions, with different funding sources, and different mandates. Though they collaborate on protocol development, they can disagree on issues and do not answer to a common authority.&lt;/p>
&lt;p>The separation of these organizations was implemented deliberately. In case one of the organizations is pressured, captured, or compromised, the others can continue to function and maintain the system. The protocol does not depend on a single team, and the two independent node implementations mean that there’s no single authoritative codebase.&lt;/p>
&lt;p>Zcash is more decentralized in governance than most cryptocurrency projects. Arguably, it’s more decentralized than Bitcoin, as the latter is dominated by a single implementation mechanism and a handful of maintainers control what gets merged.&lt;/p>
&lt;h3 id="88-the-mossad-is-behind-zcash">8.8 &amp;ldquo;The Mossad Is Behind Zcash&amp;rdquo;&lt;/h3>
&lt;p>This misconception is simply conspiracy theory, there is no evidence to support it.&lt;/p>
&lt;p>The conspiracy either points to the fact that some founders have connections to Israel or the fact that academic cryptographers are involved in the project. Based on this logic, any technology developed in part by people with ties to any country is controlled by that country&amp;rsquo;s intelligence services.&lt;/p>
&lt;p>Zcash is open source, literally every line of code is public and auditable; its cryptography is published mathematics, peer-reviewed and scrutinized by researchers worldwide. If there were a backdoor, it would be visible in the code and the proofs.&lt;/p>
&lt;p>Additionally, the four independent organizations, based in multiple countries, contribute to the protocol. The community includes developers, researchers, and users from every continent. It’s simply irrational to believe that an intelligence agency controls a globally distributed open source project due to the descent of any of the early contributors.&lt;/p>
&lt;p>The same conspiracy thinking could be used to target any technology. Signal was developed in part from grants from the United-States government, does that mean that the CIA is behind Singal? Linux has contributors from every major government and corporation, does that mean that multiple governments have compromised it?&lt;/p>
&lt;p>The code is open source and the math is public, both invalidate the conspiracy.&lt;/p>
&lt;h3 id="89-criminals-use-monero-for-a-reason">8.9 &amp;ldquo;Criminals Use Monero for a Reason&amp;rdquo;&lt;/h3>
&lt;p>This misconception implies that criminals would have necessarily identified the strongest privacy technology in order to conceal their crimes, but this gives criminals too much credit.&lt;/p>
&lt;p>Criminals are not cryptographers. They do not evaluate elliptic curve implementations or compare anonymity set constructions. Instead, they use what’s familiar and what already has a reputation in their communities.&lt;/p>
&lt;p>Monero built its brand around being the ‘crime coin’ and therefore attracted criminals. This demonstrates a pattern of reinforcement between Monero’s brand and criminals&amp;rsquo; use of Monero, not Monero’s technical superiority.&lt;/p>
&lt;p>The comparison of Monero and Zcash’s privacy capacities favours Zcash. Monero hides transactions among 16 decoys, while Zcash hides notes among more than millions of others. Monero&amp;rsquo;s decoys can be eliminated through chain analysis with time, while Zcash&amp;rsquo;s cryptographic indistinguishability makes such chain analysis decryption impossible. Monero cannot be criminals&amp;rsquo; choice for privacy reasons when law enforcement has successfully traced Monero transactions, as exemplified by the Japanese case covered above.&lt;/p>
&lt;p>Criminals also use cash, prepaid phones, and even standard email in their business, but no one argues these are used because they’re the most secure options available. Rather, these means are used because they are the most accessible and familiar options.&lt;/p>
&lt;p>The criminals’ choices reveal decisions based on marketing and network effects, not reasoned decisions based on cryptographic strength.&lt;/p>
&lt;h3 id="810-monero-is-more-private-because-all-transactions-are-private">8.10 &amp;ldquo;Monero Is More Private Because All Transactions Are Private&amp;rdquo;&lt;/h3>
&lt;p>This misconception argues that Monero&amp;rsquo;s mandatory privacy somehow means that it’s more secure than Zcash’s optional privacy model. The confusion arises from failing to distinguish design defaults from cryptographic strength.&lt;/p>
&lt;p>As covered above, Zcash is also private by default, as modern wallets enforce shielding. The default path is fully encrypted.&lt;/p>
&lt;p>Even if Monero and Zcash’s default paths differed, the distinction would not determine their privacy strengths.&lt;/p>
&lt;p>The mechanism matters more than the setting.&lt;/p>
&lt;p>Monero&amp;rsquo;s mechanism: ring signatures with 16 decoys, hiding your transaction among 16 possible senders. As the decoys can be eliminated over time through chain analysis, the anonymity set shrinks retroactively and the connection can be traced.&lt;/p>
&lt;p>Zcash&amp;rsquo;s mechanism: zero-knowledge proofs over a Merkle tree of over millions notes. Your transaction could have spent any of the notes, and there is no process of elimination to trace the origin. The set only grows and the cryptographic indistinguishability is permanent.&lt;/p>
&lt;p>The default of weak locks on every door is not preferential to the default of a strong lock on the doors that matter, and the option to add locks to the others. Mandatory weak privacy is simply weak privacy, and optional strong privacy is simply strong privacy.&lt;/p>
&lt;p>The correct question is not whether privacy is the default, but whether the privacy holds up under adversarial analysis. Zcash’s privacy does, Monero’s privacy does not.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/zcash-team.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Zcash team in the early days, featuring among others Zooko Wilcox-O'Hearn, co-founder of Zcash, and Jay Graber, then a junior developer in the Zcash team and who went on to later become CEO of Bluesky.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="9-road-ahead">9. Road Ahead&lt;/h2>
&lt;h3 id="91-project-tachyon">9.1 Project Tachyon&lt;/h3>
&lt;p>Tachyon addresses three scaling bottlenecks in Zcash: double-spend prevention, blockchain scanning, and transaction size. Double-spend prevention is the hardest of the three, and its solution reveals what makes Tachyon a genuine breakthrough rather than another incremental optimization.&lt;/p>
&lt;h4 id="the-nullifier-problem">The Nullifier Problem&lt;/h4>
&lt;p>Zcash prevents double-spending through nullifiers - when you spend a note, you reveal a nullifier: a random-looking string that functions as a revocation token. Nullifiers can&amp;rsquo;t be linked to the notes that they revoke, but if you try to spend the same note twice, you reveal the same nullifier and the network knows to reject the duplicate.&lt;/p>
&lt;p>The nullifier problem is that every validating node must store every nullifier ever revealed, forever. It’s unsafe to prune old nullifiers because someone may decide to respend an old note. At one hundred transactions per second, this would create roughly one gigabyte of state growth per day. If you’re not familiar, that&amp;rsquo;s an extreme amount compared to most blockchains, including high-throughput chains like Solana.&lt;/p>
&lt;h4 id="why-naive-solutions-fail">Why Naive Solutions Fail&lt;/h4>
&lt;p>The cryptographic community has known for years that recursive proofs could solve this problem. Rather than the network tracking nullifiers, recursive proofs would permit users to prove they haven&amp;rsquo;t double-spent. Attach the proof to the transaction and validators verify the proof and then prune old nullifiers.&lt;/p>
&lt;p>The devil’s in the details.&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Approach 1:&lt;/strong> Download the full chain history to your wallet and construct the proof locally. This works cryptographically but fails practically, as your wallet bears the bandwidth and computational cost of every transaction everyone else makes and phones can’t do this.&lt;/li>
&lt;li>&lt;strong>Approach 2:&lt;/strong> Add an intermediary service. Send your transaction to the service, let it construct the proof using full chain history, and then broadcast it. This works, but it introduces massive latency. The service must process the entire chain for every transaction, and requires you to trust the service with your transaction data.&lt;/li>
&lt;li>&lt;strong>Approach 3:&lt;/strong> Send your nullifiers to the service in advance, receive the proofs back, then later, attach those proofs to your transactions and broadcast. This may seem clever, but it has a fatal flaw: the service is able to observe which nullifiers you&amp;rsquo;re preparing to spend, and can therefore link your transactions together, leaking your primacy to the intermediary.&lt;/li>
&lt;/ul>
&lt;h4 id="oblivious-synchronization">Oblivious Synchronization&lt;/h4>
&lt;p>Here’s Tachyon&amp;rsquo;s solution: A service that proves that you haven&amp;rsquo;t double-spent by performing the computation, without seeing what appears in the final transaction and learning which nullifiers you&amp;rsquo;re spending. The service cannot distinguish your transactions from anyone else&amp;rsquo;s.&lt;/p>
&lt;p>Technically, this is defined as being an &amp;ldquo;oblivious&amp;rdquo; service. The service is blind to the actual data that it&amp;rsquo;s processing on your behalf, so you get the computational help without trusting the helper.&lt;/p>
&lt;p>The result is validators that don&amp;rsquo;t store the full nullifier history. Therefore, users aren&amp;rsquo;t exposed to costs that scale with total network activity, and ledger indistinguishability, Zcash&amp;rsquo;s core privacy property, remains intact.&lt;/p>
&lt;h4 id="the-other-bottlenecks">The Other Bottlenecks&lt;/h4>
&lt;p>Blockchain scanning, the process of identifying which transactions belong to you, is solved through protocol design changes rather than new cryptography. The current requirement to trial-decrypt every transaction becomes replaced with a more efficient payment protocol.&lt;/p>
&lt;p>Transaction size and verification time use the same recursive proof techniques. The marginal transaction size and the verification time drop to about the scale of Bitcoin. Thus, a fully private Zcash transaction ends up being around the same size and speed as a transparent Bitcoin transaction.&lt;/p>
&lt;h4 id="what-this-enables">What This Enables&lt;/h4>
&lt;p>Once Tachyon is implemented, Zcash&amp;rsquo;s scaling constraints will become the same as those facing other blockchains - bandwidth and latency. The cryptographic overhead that made privacy expensive disappears and even a phone can transact privately without processing the full chain. A node can validate without storing gigabytes of nullifier state.&lt;/p>
&lt;p>The tradeoff between privacy and scale, long assumed to be fundamental to encrypted money, turns out to be an engineering problem with a cryptographic solution.&lt;/p>
&lt;h3 id="92-network-sustainability-mechanism-nsm">9.2 Network Sustainability Mechanism (NSM)&lt;/h3>
&lt;p>Bitcoin faces a looming problem: As block rewards halve towards zero, transaction fees must compensate miners for retaining the network’s security. Whether fees will suffice remains an open question, but the anticipated alternatives, such as tail emissions, are going to break the 21 million cap.&lt;/p>
&lt;p>Zcash inherits this problem, but the &lt;a href="https://shieldedlabs.net/nsm/">Network Sustainability Mechanism&lt;/a> solves it without breaking the cap.&lt;/p>
&lt;h4 id="the-mechanism-1">The Mechanism&lt;/h4>
&lt;p>The NSM allows ZEC to be burned from circulating supply and reintroduced as future block rewards. Burning 1 ZEC now causes 0.5 additional ZEC to be issued over the next four years, 0.25 over the following four years, and so on. The issuance follows an exponential decay model approximating the existing four-year halving schedule.&lt;/p>
&lt;p>In the short-term, this results in reduced circulating supply and increased scarcity. In the long-term, there will be more ZEC available for block rewards further along the emission curve, sustaining miner incentives without exceeding the 21 million cap.&lt;/p>
&lt;h4 id="three-zips">Three ZIPs&lt;/h4>
&lt;p>&lt;a href="https://zips.z.cash/zip-0233">ZIP 233&lt;/a> establishes voluntary burning, meaning that users can donate directly to the Zcash network rather than to organizations or individuals. Wallets could offer an option to burn ZEC when transacting. Verifiable burns enable token-gated communities or identity badges that prove contribution to network sustainability.&lt;/p>
&lt;p>&lt;a href="https://zips.z.cash/zip-0234">ZIP 234&lt;/a> smooths the issuance curve, so that instead of abrupt halvings, emissions decay continuously. This provides a predictable mechanism for reintroducing burned coins without sudden supply shocks.&lt;/p>
&lt;p>&lt;a href="https://zips.z.cash/zip-0235">ZIP 235&lt;/a> burns 60% of transaction fees. Currently, this amounts to roughly 210 ZEC per year, which is a negligible amount. The point is to establish the mechanism while fees are low and miners have no economic incentive to oppose it, future fee structures remain a community decision to be made once NSM is operational.&lt;/p>
&lt;h4 id="future-applications">Future Applications&lt;/h4>
&lt;p>The NSM creates infrastructure for use cases that the community will encounter down the line:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>ZSA fees:&lt;/strong> Minting, transacting, or bridging Zcash Shielded Assets could burn a portion to compensate ZEC holders.&lt;/li>
&lt;li>&lt;strong>Legacy support fees:&lt;/strong> Users storing funds in older pools could pay fees, thus incentivizing migration to newer, more secure pools.&lt;/li>
&lt;li>&lt;strong>Privacy incentivization fees:&lt;/strong> Transparent address usage could incur fees to compensate for the reduced anonymity set.&lt;/li>
&lt;li>&lt;strong>Dynamic fees:&lt;/strong> Shielded Labs is developing a &lt;a href="https://fees.shieldedinfra.net/">market-based fee system&lt;/a> that replaces the fixed 10,000 zatoshi per-action fee. The mechanism calculates a median-based marginal fee from the previous 50 blocks, rounds to powers of ten to preserve privacy, and offers a 10× priority lane during congestion.&lt;/li>
&lt;/ul>
&lt;h4 id="why-now">Why Now?&lt;/h4>
&lt;p>Currently, Transaction fees are minimal, so implementing the burn mechanism now avoids the political difficulty that Ethereum faced with EIP-1559, where miners had strong incentives to oppose fee burning. If implemented now, the precedent will exist by the time Zcash fees become significant.&lt;/p>
&lt;p>The NSM can continue Zcash&amp;rsquo;s tradition of improving on Bitcoin&amp;rsquo;s design. Privacy and the Dev Fund already differentiate Zcash, and this upgrade would add a third differentiation: a mechanism for long-term network sustainability that’s not present in Bitcoin.&lt;/p>
&lt;h3 id="93-quantum-resistance">9.3 Quantum Resistance&lt;/h3>
&lt;p>Zcash&amp;rsquo;s relationship with quantum computing is more nuanced than most other cryptocurrencies. The protocol already provides significant post-quantum privacy protections in common scenarios, as a result of deliberate design choices made since the project&amp;rsquo;s inception.&lt;/p>
&lt;h4 id="whats-already-protected">What&amp;rsquo;s Already Protected&lt;/h4>
&lt;p>Quantum adversaries cannot compromise onchain anonymity. Zcash&amp;rsquo;s nullifiers, the mechanism preventing double-spends, use keyed pseudorandom functions built on symmetric cryptography, and these primitives remain secure against quantum attacks. The commitment schemes are therefore perfectly hidden, and the symmetric encryption uses key sizes designed for post-quantum security.&lt;/p>
&lt;p>This contrasts sharply with other privacy cryptocurrencies. Monero&amp;rsquo;s key images, the equivalent of nullifiers, would become transparent to a quantum adversary, and the transaction graph would be revealed. Zcash&amp;rsquo;s construction avoids this vulnerability entirely.&lt;/p>
&lt;h4 id="the-two-threats">The Two Threats&lt;/h4>
&lt;p>Quantum computers threaten two distinct properties: privacy and soundness.&lt;/p>
&lt;p>Privacy concerns center on &amp;ldquo;harvest now, decrypt later&amp;rdquo; style attacks. An adversary could collect encrypted transaction data today and decrypt it later, once quantum computers have arrived. This primarily affects in-band secret distribution, the mechanism for transmitting transaction details to recipients. Tachyon&amp;rsquo;s design removes in-band secret distribution entirely, protecting against this future threat.&lt;/p>
&lt;p>Soundness concerns center on elliptic curve cryptography, which could be broken by quantum computers. Though this would enable counterfeiting or theft, it would not compromise privacy. Therefore, the threats differ in their urgency as privacy breaks are retroactive (past transactions become vulnerable), while soundness breaks often are not (you can react when quantum computers appear).&lt;/p>
&lt;h4 id="quantum-recoverability">Quantum Recoverability&lt;/h4>
&lt;p>ECC has developed techniques for “quantum recoverability” in Orchard. After upcoming wallet changes, and assuming that quantum computers appear, users would be able to recover funds through a special mechanism that prevents quantum adversaries from stealing them, a mechanism that also protects privacy.&lt;/p>
&lt;p>The timeline for wallet integration is that it’s released in 2026, so users that shield their coins and await these improvements will be protected.&lt;/p>
&lt;h4 id="best-practices-today">Best Practices Today&lt;/h4>
&lt;p>Shield your coins. The shielded pool&amp;rsquo;s design already provides substantial quantum resistance for on-chain privacy. Treat addresses as secrets whenever possible. Turnstiles remain the final defense: even if counterfeiting occurred, it would eventually become detectable when funds exit shielded pools.&lt;/p>
&lt;p>Zcash&amp;rsquo;s cryptographers will remain ahead of developments, because the protocol&amp;rsquo;s modular design, which isolates vulnerable primitives, enables future upgrades without overhaul.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/tank-man.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">"Tank Man" standing in front of a column of tanks near Tiananmen Square in Beijing on June 5, 1989.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="10-conclusion">10. Conclusion&lt;/h2>
&lt;p>In conclusion, this article opened with a simple observation: unless you&amp;rsquo;re using cash, every purchase you make is tracked and stored indefinitely. Bitcoin could have fixed this, but it didn&amp;rsquo;t. The blockchain that was supposed to free us from financial surveillance became the most comprehensive surveillance tool ever deployed.&lt;/p>
&lt;p>Zcash took a different path. Instead of transparency by default, with privacy bolted on as an afterthought, it first solved the hardest problem: how do you verify transactions without seeing them?&lt;/p>
&lt;p>The answer required zero-knowledge proofs, commitments that hide amounts, nullifiers that prevent double-spends without linking transactions, and a note model that shatters the transaction graph entirely. Nine years of protocol evolution followed: Sprout proved that privacy was possible, Sapling made privacy practical, and now Orchard has made it trustless.&lt;/p>
&lt;p>The result of this evolution is ledger indistinguishability. Two shielded transactions cannot be told apart, not by observers, validators, or nation-states with unlimited resources. The data is not just obscured or mixed with decoys, it is encrypted. What the network sees is mathematically indistinguishable from random noise. A true Swiss vault.&lt;/p>
&lt;p>The road ahead remains demanding. Tachyon removes the bottlenecks that constrain scale. The NSM creates sustainable economics. Quantum resistance is a solvable problem with work already underway. The foundation is built. The cryptography works. The privacy is real.&lt;/p>
&lt;p>Before us are two futures: One where every transaction is visible, controllable, and reversible by whoever holds power, and another where money is as private as thoughts.&lt;/p>
&lt;p>Zcash is how money stays free.&lt;/p>
&lt;div class="further-reading-section">
&lt;hr>
&lt;aside class="further-reading">
&lt;h4>Further Reading&lt;/h4>
&lt;ul>
&lt;li>&lt;a href="https://example.com">The Sovereign Individual&lt;/a> by James Dale Davidson&lt;/li>
&lt;li>&lt;a href="https://www.scifi.money/zec-bag">My Zcash Investment Thesis&lt;/a> by Frank Braun&lt;/li>
&lt;li>&lt;a href="https://zips.z.cash/protocol/protocol.pdf">Zcash Protocol Specification&lt;/a> by Daira-Emma Hopwood et al.&lt;/li>
&lt;li>&lt;a href="https://www.scifi.money/zcash">Zcash: A Zero to Hero&amp;rsquo;s Guide&lt;/a> by Arjun Khemani&lt;/li>
&lt;li>&lt;a href="https://messari.io/report/understanding-zcash-a-comprehensive-overview">Understanding Zcash: A Comprehensive Overview&lt;/a> by Youssef Haidar&lt;/li>
&lt;li>&lt;a href="https://www.coindesk.com/research/inside-zcash-encrypted-money-at-planetary-scale">Inside Zcash: Encrypted Money at Planetary Scale&lt;/a> by CoinDesk Research&lt;/li>
&lt;li>&lt;a href="https://www.scifi.money/zec-thesis">The Case for a Small Allocation to ZEC&lt;/a> by Sacha&lt;/li>
&lt;li>&lt;a href="https://www.scifi.money/freedom-money">Freedom Money&lt;/a> by Arjun Khemani&lt;/li>
&lt;li>&lt;a href="https://bitcoin.org/bitcoin.pdf">Bitcoin Whitepaper&lt;/a> by Satoshi Nakamoto&lt;/li>
&lt;/ul>
&lt;/aside>
&lt;/div></description></item><item><title>Understanding Many-Worlds</title><link>https://maxdesalle.com/understanding-many-worlds/</link><pubDate>Tue, 23 Sep 2025 00:00:00 +0000</pubDate><guid>https://maxdesalle.com/understanding-many-worlds/</guid><description>&lt;figure>
&lt;img src="https://maxdesalle.com/solvay-conference.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">The 1927 Solvay conference, lauded by Heisenberg as, “officially, the completion of the quantum theory,” while Langevin remarked it was, “where the confusion of ideas reached its peak.”&lt;/figcaption>
&lt;/figure>
&lt;hr>
&lt;p>&lt;em>With gratitude to Giulia Mouland, and to Logan Chipkin, Sam Kuypers and
Charles Alexandre Bédard, all three from the &lt;a href="https://www.conjectureinstitute.com/">Conjecture
Institute&lt;/a>, for their
feedback and editorial review.&lt;/em>&lt;/p>
&lt;hr>
&lt;aside id="toc">
&lt;h4>Table of Contents&lt;/h4>
&lt;nav id="TableOfContents">
&lt;ul>
&lt;li>&lt;a href="#1-introduction">&lt;strong>1. Introduction&lt;/strong>&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#11-what-if-all-fiction-were-reality">&lt;strong>1.1 What If All Fiction Were Reality?&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#12-quantum-nonsense">&lt;strong>1.2 Quantum Nonsense&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#13-a-better-explanation">&lt;strong>1.3 A Better Explanation&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#14-who-this-is-for">&lt;strong>1.4 Who This Is For&lt;/strong>&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#2-a-history-of-quantum-mechanics">&lt;strong>2. A History of Quantum Mechanics&lt;/strong>&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#21-physics-before-quantum-mechanics">&lt;strong>2.1 Physics Before Quantum Mechanics&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#22-the-birth-of-quantum-mechanics">&lt;strong>2.2 The Birth of Quantum Mechanics&lt;/strong>&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#3-a-primer-on-quantum-mechanics">&lt;strong>3. A Primer on Quantum Mechanics&lt;/strong>&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#31-the-wave-function">&lt;strong>3.1 The Wave Function&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#32-hilbert-space">&lt;strong>3.2 Hilbert Space&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#33-the-schrödinger-equation">&lt;strong>3.3 The Schrödinger Equation&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#34-the-born-rule">&lt;strong>3.4 The Born Rule&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#35-superposition">&lt;strong>3.5 Superposition&lt;/strong>&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#4-why-the-collapse-interpretation-is-wrong">&lt;strong>4. Why the Collapse Interpretation is Wrong&lt;/strong>&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#41-what-the-collapse-interpretation-claims">&lt;strong>4.1 What the Collapse Interpretation Claims&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#42-the-observer-as-a-magical-boundary">&lt;strong>4.2 The Observer as a Magical Boundary&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#43-mathematically-ill-defined">&lt;strong>4.3 Mathematically Ill-Defined&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#44-the-logic-of-scientific-inertia">&lt;strong>4.4 The Logic of Scientific Inertia&lt;/strong>&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#5-the-theory-of-the-universal-wave-function">&lt;strong>5. The Theory of the Universal Wave Function&lt;/strong>&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#51-everetts-insight">&lt;strong>5.1 Everett&amp;rsquo;s Insight&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#52-measurement-without-collapse">&lt;strong>5.2 Measurement Without Collapse&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#53-interference">&lt;strong>5.3 Interference&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#54-what-is-a-world-in-many-worlds">&lt;strong>5.4 What Is a &amp;ldquo;World&amp;rdquo; in Many-Worlds?&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#55-re-interference">&lt;strong>5.5 Re-interference&lt;/strong>&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#6-myths-and-misconceptions-about-many-worlds">&lt;strong>6. Myths and Misconceptions About Many-Worlds&lt;/strong>&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#61-do-the-worlds-exist-in-other-dimensions">&lt;strong>6.1 Do the Worlds Exist in Other Dimensions?&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#62-why-dont-i-notice-the-split">&lt;strong>6.2 Why Don&amp;rsquo;t I Notice the Split?&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#63-is-energy-conserved-if-worlds-multiply">&lt;strong>6.3 Is Energy Conserved If Worlds Multiply?&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#64-at-what-speed-do-worlds-split">&lt;strong>6.4 At What Speed Do Worlds Split?&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#65-is-there-a-finite-or-countable-number-of-worlds">&lt;strong>6.5 Is There a Finite or Countable Number of Worlds?&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#66-can-we-interact-with-other-worlds">&lt;strong>6.6 Can We Interact with Other Worlds?&lt;/strong>&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#7-can-many-worlds-be-tested">&lt;strong>7. Can Many-Worlds Be Tested?&lt;/strong>&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#71-misunderstanding-what-proof-means">&lt;strong>7.1 Misunderstanding What &amp;ldquo;Proof&amp;rdquo; Means&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#72-collapse-requires-extra-assumptions">&lt;strong>7.2 Collapse Requires Extra Assumptions&lt;/strong>&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#8-living-in-many-worlds">&lt;strong>8. Living in Many-Worlds&lt;/strong>&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#81-probability-free-will-and-ethics">&lt;strong>8.1 Probability, Free Will, and Ethics&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#82-fiction-and-reality">&lt;strong>8.2 Fiction and Reality&lt;/strong>&lt;/a>&lt;/li>
&lt;li>&lt;a href="#83-a-brief-explanation-of-quantum-computing">&lt;strong>8.3 A Brief Explanation of Quantum Computing&lt;/strong>&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#9-conclusion">&lt;strong>9. Conclusion&lt;/strong>&lt;/a>&lt;/li>
&lt;/ul>
&lt;/nav>
&lt;/aside>
&lt;h2 id="1-introduction">&lt;strong>1. Introduction&lt;/strong>&lt;/h2>
&lt;h3 id="11-what-if-all-fiction-were-reality">&lt;strong>1.1 What If All Fiction Were Reality?&lt;/strong>&lt;/h3>
&lt;p>You flip a coin. Heads, you text your ex. Tails, you don&amp;rsquo;t. You flip it
and catch it. It hits tails. You go on with your life.&lt;/p>
&lt;p>But what if both outcomes happened? What if, somewhere, a version of you
did send the message, and is now navigating that reality, while you sit
here, relieved that you didn&amp;rsquo;t?&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">Of course, you wouldn&amp;rsquo;t suddenly start doing random things in another
version of reality—you&amp;rsquo;d still act for your own reasons. The coin is
just a simple way to picture it.&lt;/div>
&lt;/div>
&lt;p>Welcome to quantum mechanics, where quantum events cause the universe to
split, creating a new, independent version of reality for each
possibility.&lt;/p>
&lt;p>This isn't metaphorical; it literally happens in our physical reality,
all of the time.&lt;/p>
&lt;p>There&amp;rsquo;s a &amp;ldquo;you&amp;rdquo; who became a concert pianist, a &amp;ldquo;you&amp;rdquo; who never met your
best friend, a &amp;ldquo;you&amp;rdquo; who died in an accident you narrowly avoided. And
all of them are real.&lt;/p>
&lt;h3 id="12-quantum-nonsense">&lt;strong>1.2 Quantum Nonsense&lt;/strong>&lt;/h3>
&lt;p>Quantum physics is famously bizarre. You may have heard of
Schrodinger's cat: both alive and dead, until you see it. The thought
experiment posits that an outcome cannot exist until it is observed.
That&amp;rsquo;s the accepted story told in universities
and textbooks, it&amp;rsquo;s not science-fiction.&lt;/p>
&lt;p>But the problem is: it&amp;rsquo;s wrong.&lt;/p>
&lt;p>This mainstream interpretation of quantum mechanics is often called the
&lt;em>Copenhagen&lt;/em> interpretation.&lt;/p>
&lt;p>However, this name is misleading: it wasn&amp;rsquo;t a single unified theory, nor
solely the creation of Bohr and the &lt;em>Copenhagen&lt;/em> school after which it&amp;rsquo;s
called. Pieces of it came from different people, like Bohr&amp;rsquo;s idea of
&amp;lsquo;complementarity&amp;rsquo; (wave&amp;ndash;particle duality), Von Neumann&amp;rsquo;s collapse
postulate as a stopgap measure, and later generations who mixed them
into an official-sounding package.&lt;/p>
&lt;p>We will thus use &lt;em>collapse interpretation&lt;/em> to refer to this mix of ideas
instead of &lt;em>Copenhagen interpretation&lt;/em> as it&amp;rsquo;s commonly called.&lt;/p>
&lt;p>It&amp;rsquo;s also sometimes called the &amp;ldquo;Shut up and calculate!&amp;rdquo; interpretation,
due to its denial of the implications of quantum theory and emphasis on
the calculatory aspect of quantum theory.&lt;/p>
&lt;p>The collapse interpretation adds unnecessary and ad hoc assumptions to
avoid the implications of many worlds existing. It&amp;rsquo;s wrong, and we will
see why in this article.&lt;/p>
&lt;h3 id="13-a-better-explanation">&lt;strong>1.3 A Better Explanation&lt;/strong>&lt;/h3>
&lt;p>The good news is there&amp;rsquo;s a better explanation—a better framework—to
understand quantum mechanics. Importantly, this framework doesn&amp;rsquo;t add
any additional assumptions beyond quantum theory proper.&lt;/p>
&lt;p>This explanation has various names. Some call it &lt;em>Many-Worlds&lt;/em>, others
call it &lt;em>Everettian Quantum Mechanics&lt;/em>, after Hugh Everett, the
physicist who proposed it in 1957. In mainstream media it&amp;rsquo;s often called
the &lt;em>Multiverse&lt;/em>. Henceforth, we will refer to it as Many-Worlds.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">&lt;p>I have a grudge with the term &lt;em>Everettian quantum mechanics&lt;/em>,
because Everettian quantum mechanics is simply quantum mechanics, as
we will see later on in this article. Adding the &amp;lsquo;&lt;em>Everettian&lt;/em>&amp;rsquo; prefix
may convey the misconception that they are different.&lt;/p>
&lt;p>&lt;em>Many-Worlds&lt;/em> is preferred over &lt;em>Multiverse&lt;/em>, as this latter term has
been used in many different ways, including cosmological theories,
plots for Hollywood movies, etc., which may lead to confusion.&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>Many-Worlds is often grouped with other &amp;ldquo;interpretations&amp;rdquo; of quantum
mechanics. But unlike collapse-based views, it doesn&amp;rsquo;t add extra
assumptions. It simply takes the Schrödinger equation literally and
universally.&lt;/p>
&lt;p>For now, we&amp;rsquo;ll call it Many-Worlds. Later in this article, we&amp;rsquo;ll argue
why it&amp;rsquo;s better understood not as just one interpretation among others,
but as quantum theory itself.&lt;/p>
&lt;h3 id="14-who-this-is-for">&lt;strong>1.4 Who This Is For&lt;/strong>&lt;/h3>
&lt;p>The intended audience for this article is everyone, especially if you&amp;rsquo;ve
never studied physics.&lt;/p>
&lt;p>For the sake of comprehensiveness, we will start at the very beginning,
but you&amp;rsquo;re more than encouraged to skip parts that you&amp;rsquo;re already
familiar with or aren&amp;rsquo;t of interest.&lt;/p>
&lt;p>Equations will be used throughout this article. You shouldn&amp;rsquo;t shy away
from them. Whenever equations are introduced, they will be thoroughly
covered and explained so that no one is left behind.&lt;/p>
&lt;p>These equations may look scary, but remember, everything is hard before
it is easy. If something feels confusing at first, that&amp;rsquo;s normal—it
means you&amp;rsquo;re learning. Even geniuses struggle early on, and what
distinguishes them is not talent, but persistence. As Thomas Edison once
said: &amp;ldquo;Genius is 1% inspiration and 99% perspiration.&amp;rdquo; So, always
remember: no idea is inherently too complex to be understood.&lt;/p>
&lt;p>In case you get lost at some point throughout the article, don&amp;rsquo;t
hesitate to go back and re-read the previous sections. Don&amp;rsquo;t hesitate to
use tools like ChatGPT to get a better understanding of certain topics.
However, be warned that ChatGPT, like most physicists, unfortunately
tends to irrationally favor collapse interpretations, as the collapse
view is the most widely presented one on the web.&lt;/p>
&lt;p>Without further ado, let&amp;rsquo;s get into it.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/nobel-laureates.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Albert
Einstein and Max Planck (middle) together with three other Nobel
laureates—Walther Nernst, Robert Andrews Millikan, and Max von
Laue—captured at a dinner hosted by Laue in Berlin on 11 November 1931.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="2-a-history-of-quantum-mechanics">&lt;strong>2. A History of Quantum Mechanics&lt;/strong>&lt;/h2>
&lt;h3 id="21-physics-before-quantum-mechanics">&lt;strong>2.1 Physics Before Quantum Mechanics&lt;/strong>&lt;/h3>
&lt;h4 id="211-newton-and-laplace">&lt;strong>2.1.1 Newton and Laplace&lt;/strong>&lt;/h4>
&lt;p>In the 17th century, Isaac Newton described nature using a set of simple
mathematical laws. His laws of motion and universal gravitation
explained everything from falling apples to the orbits of planets. Time
and space were absolute and universal.&lt;/p>
&lt;p>His work, along with the work of many others that followed, came to be
known as &lt;em>classical physics&lt;/em>&lt;/p>
&lt;p>Importantly, according to classical physics, everything was
deterministic: if you knew the position and velocity of every particle
in the universe at one time, you could predict the future perfectly.&lt;/p>
&lt;p>In the early 1800s, Pierre-Simon Laplace pushed this deterministic idea
to its logical extreme. He wrote:&lt;/p>
&lt;blockquote>
&lt;p>&lt;em>&amp;ldquo;We may regard the present state of the universe as the effect of its
past and the cause of its future. An intellect which at a certain moment
would know all forces that set nature in motion, and all positions of
all items of which nature is composed, if this intellect were also vast
enough to submit these data to analysis, it would embrace in a single
formula the movements of the greatest bodies of the universe and those
of the tiniest atom; for such an intellect nothing would be uncertain
and the future just like the past could be present before its eyes.&amp;rdquo;&lt;/em> — Pierre-Simon Laplace&lt;/p>
&lt;/blockquote>
&lt;p>This hypothetical intelligence, now called Laplace&amp;rsquo;s Demon, would be
able to compute the entire future of the universe from its present
state. According to this conception, the universe was fully knowable and
completely predictable.&lt;/p>
&lt;h4 id="212-the-limits-begin-to-show">&lt;strong>2.1.2 The Limits Begin to Show&lt;/strong>&lt;/h4>
&lt;p>The classical worldview worked astonishingly well&amp;hellip;for a while. It
explained the motion of planets, the trajectory of projectiles, and the
behavior of pendulums and fluids. It wasn't until the beginning of the
20th century that cracks began to appear. Reality, it turned out, was
hiding something deeper and stranger.&lt;/p>
&lt;p>Here are three key examples where classical physics failed completely:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Blackbody Radiation:&lt;/strong> Physicists tried to model the radiation
emitted by a hot object (a so-called &lt;em>blackbody&lt;/em>) using classical
ideas. However their equations predicted that the object would emit
infinite energy at high frequencies, which contradicted observations
and was rightly regarded as an absurdity for theoretical reasons. This
failure was known as the &lt;em>ultraviolet catastrophe&lt;/em>, because classical
theory predicted that blackbodies should glow with blinding
ultraviolet light.&lt;/p>
&lt;p>The mystery was only solved when Max Planck proposed that energy could
only be emitted or absorbed in discrete packets, or &lt;em>quanta&lt;/em> (plural
of &lt;em>quantum&lt;/em>). A quantum of light is the smallest discrete unit in
which light energy exists or is emitted/absorbed. This was the first
seed of quantum theory.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>The Photoelectric Effect:&lt;/strong> When light shines on a metal surface, it
can knock electrons (electrically charged particles often found inside
atoms) free, a phenomenon called the &lt;em>photoelectric effect&lt;/em>.&lt;/p>
&lt;p>Classical physics predicted that the intensity of light—its
brightness&amp;ndash;should determine whether electrons are emitted. However,
experiments showed that this wasn&amp;rsquo;t true. Frequency—which
corresponds to the color of the light—was the actual determinant of
the electrons emitted. For example, even very dim ultraviolet light
could eject electrons, while bright red light could not.&lt;/p>
&lt;p>Think of a frequency as the frequency a radio is tuned into. When
light is &amp;ldquo;tuned into&amp;rdquo; a certain frequency, it has a certain color,
like red or blue, if the frequency is within the range that the human
eye can detect. Infrared or ultraviolet light are examples of
frequencies that are invisible to the human eye.&lt;/p>
&lt;p>The photoelectric effect was completely inexplicable in classical
terms. Einstein resolved the mystery by suggesting that light itself
comes in particles, now called photons, each carrying a fixed energy
determined by its frequency. This energy is given by a beautifully
simple equation: \(E = h\nu\) where \(E\) is the photon&amp;rsquo;s energy, \(h\) is Planck&amp;rsquo;s constant, and \(\nu\)
(the Greek letter &amp;rsquo;nu&amp;rsquo;) is the frequency of the light.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Atomic Spectra:&lt;/strong> When you heat a gas or pass electricity through
it, it emits light at specific frequencies. &lt;a href="https://en.wikipedia.org/wiki/Electromagnetic_spectrum#/media/File:EM_Spectrum_Properties_edit.svg">Each frequency is a line
of color, or spectral line, in a larger spectrum&lt;/a>.&lt;/p>
&lt;p>Classical physics had no explanation for why atoms should emit only
certain frequencies of light and not others. Something was wrong with
the classical picture.&lt;/p>
&lt;p>The first step toward a solution came in 1913, when Niels Bohr
proposed that electrons in an atom could only occupy discrete energy
levels, and that light is emitted or absorbed when the electron&amp;rsquo;s
wavefunction changes from one level to another. This explained why
atoms give off sharp spectral lines rather than a continuous smear of
colors.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h4 id="213-the-crisis-of-the-classical-worldview">&lt;strong>2.1.3 The Crisis of the Classical Worldview&lt;/strong>&lt;/h4>
&lt;p>By the early 20th century, physicists were forced to admit that
classical physics couldn&amp;rsquo;t be the full story. At large scales, with the
exception of extreme conditions like high speed or strong gravity, it
worked beautifully, but at small scales—the microscopic level of
atoms, photons, and electrons—it wasn&amp;rsquo;t accurate.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">Atoms are tiny units of matter, while photons are particles of light.
Notably, both exhibit wave-like behavior. A wave is a repeating
pattern that spreads through space, like ripples on water.&lt;/div>
&lt;/div>
&lt;p>The new explanation of microscopic reality that emerged—quantum
mechanics—wasn&amp;rsquo;t just a better theory.&lt;/p>
&lt;p>It was a new way of understanding reality.&lt;/p>
&lt;h3 id="22-the-birth-of-quantum-mechanics">&lt;strong>2.2 The Birth of Quantum Mechanics&lt;/strong>&lt;/h3>
&lt;h4 id="221-plancks-quanta">&lt;strong>2.2.1 Planck&amp;rsquo;s Quanta&lt;/strong>&lt;/h4>
&lt;p>As previously mentioned, Max Planck tried to solve the blackbody
radiation problem, the so-called &lt;em>ultraviolet catastrophe&lt;/em>.&lt;/p>
&lt;p>Planck proposed that energy could only be emitted in multiples of a tiny
unit: \(E = h\nu\). In this equation, \(E\) is the energy, \(h\) is Planck&amp;rsquo;s
constant, and \(\nu\) is the frequency of the radiation.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">Planck&amp;rsquo;s constant is equal to
\(h = 6.626\ 070\ 15 \times 10^{- 34}\ \frac{J}{Hz}\), where \(J\) stands
for Joules, a unit of energy, and \(Hz\) stands for Hertz, a unit of
frequency.&lt;/div>
&lt;/div>
&lt;h4 id="222-bohrs-atomic-model">&lt;strong>2.2.2 Bohr&amp;rsquo;s Atomic Model&lt;/strong>&lt;/h4>
&lt;p>In 1913, Danish physicist Niels Bohr built on these ideas to propose a
model of the hydrogen atom that explained atomic spectra, the unique
&amp;ldquo;fingerprints&amp;rdquo; of light emitted by atoms.&lt;/p>
&lt;p>Bohr&amp;rsquo;s model was revolutionary:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>Electrons could only occupy specific energy levels.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Electrons didn&amp;rsquo;t spiral into the nucleus as classical theory
predicted.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>When electrons transitioned between levels, their wavefunction changed
in such a way that they emitted or absorbed a photon with energy
\(E = h\nu\).&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>This model explained the spectral lines of hydrogen with stunning
precision. Bohr&amp;rsquo;s model hinted at a radical new idea: the microscopic
world operates on rules fundamentally different from those that govern
the macroscopic world.&lt;/p>
&lt;h4 id="223-something-deeper-was-needed">&lt;strong>2.2.3 Something Deeper Was Needed&lt;/strong>&lt;/h4>
&lt;p>By the 1920s, physicists had a growing list of quantum &amp;ldquo;fixes&amp;rdquo;: Planck&amp;rsquo;s
energy quanta, Einstein&amp;rsquo;s photons, Bohr&amp;rsquo;s energy levels, and others.
However, these collectively amounted to a patchwork, rather than a
single, coherent theory.&lt;/p>
&lt;p>Such a theory would require a mathematical framework that could
encompass all of the discovered quantum phenomena in a single language.
Eventually this language was established, bringing with it a strange and
abstract equation. This equation would describe an entirely novel
concept in physics—the &lt;em>wave function&lt;/em>.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/dirac-heisenberg.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Paul Dirac and
Werner Heisenberg, likely in the early 1930s. Heisenberg created the
first complete formulation of quantum mechanics and Dirac unified
quantum mechanics with special relativity, among other things.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="3-a-primer-on-quantum-mechanics">&lt;strong>3. A Primer on Quantum Mechanics&lt;/strong>&lt;/h2>
&lt;h3 id="31-the-wave-function">&lt;strong>3.1 The Wave Function&lt;/strong>&lt;/h3>
&lt;p>In 1926, Erwin Schrödinger introduced what would become the core
equation of quantum mechanics: the Schrödinger equation.&lt;/p>
&lt;p>But more importantly, he introduced a completely new object into
physics, the wave function, usually denoted by the Greek letter \(\Psi\)
(psi).&lt;/p>
&lt;h4 id="311-what-is-the-wave-function">&lt;strong>3.1.1 What Is the Wave Function?&lt;/strong>&lt;/h4>
&lt;p>The wave function \(\Psi\) is a mathematical object that encodes the
entire physical state of a quantum system.&lt;/p>
&lt;p>Given \(\Psi\), you can calculate everything you might want to know: how
likely it is to find a particle in a given location, how it will evolve
over time, or what outcomes an experiment might yield.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">A &lt;em>quantum system&lt;/em> can be anything—for instance, a particle in a
box. The wave function allows you to calculate the likelihood of
finding the particle in a specific location of the box.&lt;/div>
&lt;/div>
&lt;p>Here is an example of a wave function (don&amp;rsquo;t be scared, it doesn&amp;rsquo;t
bite):&lt;/p>
\[\Psi_{n}(x) = \sqrt{\frac{2}{L}}\sin\left( \frac{n\pi x}{L} \right),\ 0 &lt; x &lt; L\ 0,\ otherwise\ \]
&lt;p>Don&amp;rsquo;t worry if this looks imposing, you don&amp;rsquo;t need to understand what is
exactly happening here to understand the rest of the article.&lt;/p>
&lt;h3 id="32-hilbert-space">&lt;strong>3.2 Hilbert Space&lt;/strong>&lt;/h3>
&lt;p>To understand \(\Psi\), the wave function, we need to understand the kind
of space it &amp;ldquo;lives&amp;rdquo; in—the so-called &lt;em>Hilbert space&lt;/em>.&lt;/p>
&lt;p>In classical physics, a system might be described by a few numbers:
position, momentum, energy. In quantum mechanics, a system is described
by a vector in Hilbert space, written as \(|\psi\rangle\). No need to
overthink the notation, as we could have written it as \(x\) or \(john\),
but for reasons that we won&amp;rsquo;t get into here, we write it as
\(|\psi\rangle\). It&amp;rsquo;s just a name.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">&lt;p>A vector is just an object that holds multiple numbers at once.&lt;/p>
&lt;p>In everyday life, think of a vector like a shopping list. Instead of
holding just one number, it holds several: 2 apples, 3 bananas, 1 loaf
of bread (the numbers here are completely random, we could have picked
any other). It&amp;rsquo;s a single object (the list) that bundles together
multiple values.&lt;/p>
&lt;p>In quantum mechanics, the vector \(|\psi\rangle\) works the same way,
except the &amp;ldquo;items on the list&amp;rdquo; are possible states or outcomes of the
system (like different coin toss results, or different locations of a
particle). Each number in the vector tells you how strongly that state
is &amp;ldquo;present&amp;rdquo; in the overall mixture.&lt;/p>
&lt;p>So you can think of \(|\psi\rangle\) as the master list of all the ways
the system can exist, and how much weight each way carries.&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>At its core, a Hilbert space is a mathematical space where each point
represents a possible quantum state of a system. It&amp;rsquo;s like the stage on
which quantum reality plays out.&lt;/p>
&lt;p>You can think of it as 3D space, but instead of three coordinates like
\((x,y,z)\), states in Hilbert space can have infinitely many dimensions.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">&lt;p>If this sounds abstract, that&amp;rsquo;s because it is. Here is a simple
analogy: Imagine a piano keyboard that extends forever in both
directions, left and right, with an infinite number of keys, each with
a unique tune. A Hilbert space is like the entire infinite keyboard
itself.&lt;/p>
&lt;p>Any sound you play (a chord, a song, noise) is a combination of those
infinite unique tones—this is like a vector in Hilbert space. Just
as any sound can be broken down into individual notes, any quantum
state can be decomposed into simpler building blocks, called &lt;em>basis
states&lt;/em>, in Hilbert space.&lt;/p>
&lt;/div>
&lt;/div>
&lt;h3 id="33-the-schrödinger-equation">&lt;strong>3.3 The Schrödinger Equation&lt;/strong>&lt;/h3>
&lt;p>The Schrödinger equation tells us how the wave function changes over
time. In its most common form, it looks like this:&lt;/p>
\[i\hslash\frac{\partial\Psi}{\partial t} = \widehat{H}\Psi\]
&lt;p>Let&amp;rsquo;s break it down:&lt;/p>
&lt;p>- \(\Psi\) is the wave function (the full quantum state).&lt;/p>
&lt;p>- \(i\) is the &lt;em>imaginary unit&lt;/em>. Its value is defined as
\(i = \sqrt{- 1}\). So \(i^{2} = - 1\). Don&amp;rsquo;t be scared of it. It&amp;rsquo;s just a
number, whose value is the square root of \(- 1\). No need to overthink
it.&lt;/p>
&lt;p>- \(\hslash\) is Planck&amp;rsquo;s constant divided by \(2\pi\) (meaning
\(\hslash = \frac{h}{2\pi}\)). Again, no need to overthink this, we&amp;rsquo;re
just taking Planck&amp;rsquo;s constant and dividing it by \(2\pi\).&lt;/p>
&lt;p>- \(\frac{\partial\Psi}{\partial t}\) is the time derivative of \(\Psi\),
the wave function, meaning its rate of change at a specific point in
time \(t\).&lt;/p>
&lt;p>- \(\widehat{H}\) is the Hamiltonian operator, which describes the total
energy of the quantum system. In quantum mechanics, the Hamiltonian is
an operator, meaning we apply it to the wave function (this is true of
all operators). Importantly, the Hamiltonian doesn't directly calculate
the energy of the system. Instead, it tells you which energy levels are
possible, like a rulebook listing the notes a piano can play.&lt;/p>
&lt;h4 id="331-determinism-linearity-and-universality">&lt;strong>3.3.1 Determinism, Linearity and Universality&lt;/strong>&lt;/h4>
&lt;p>The Schrödinger equation is linear, deterministic, and universal:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Deterministic:&lt;/strong> If you know \(\Psi(t_{0})\), the state of the wave
function at a time \(t_{0}\), then you can compute \(\Psi(t)\) for any
future time \(t\).&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Linear:&lt;/strong> If \(\Psi_{1}\) and \(\Psi_{2}\) are solutions to the
Schrödinger equation, then any combination \(a\Psi_{1} + b\Psi_{2}\) is
also a solution, where \(a\) and \(b\) are any real numbers.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Universal:&lt;/strong> It applies to all particles or systems that can exist.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>These three features, linearity, determinism, and universality, will be
crucial later on.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">A solution to the Schrödinger equation is a specific wave function
\(\Psi\) that satisfies the equation. In other words, it&amp;rsquo;s a function
that correctly describes how a quantum system (like an electron, atom,
or a particle in a box) evolves over time according to quantum
mechanics. Once you have this solution, you can predict how the system
behaves at any moment.&lt;/div>
&lt;/div>
&lt;p>While the wave function describes the physical state of a quantum system
at a given moment, the Schrödinger equation allows us to track its
evolution over time.&lt;/p>
&lt;h3 id="34-the-born-rule">&lt;strong>3.4 The Born Rule&lt;/strong>&lt;/h3>
&lt;p>One of the most famous results in quantum mechanics is the Born rule,
introduced by Max Born in 1926. It tells us how to extract probability
density from the wave function:&lt;/p>
\[p(x) = |\Psi(x)|^{2}\]
&lt;p>The difference between probability and probability density is as
follows: the probability of something is the likelihood of it happening,
but the probability density describes the concentration of that
likelihood among different values, sort of like a map showing where
outcomes are more or less likely.&lt;/p>
&lt;p>This means the probability density of finding a particle near position
\(x\) is the square of the absolute value of the wave function at that
position.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">The absolute value of the wave function just means how strong or how
big the wave function is at a certain point, its magnitude, without
regard to direction or sign.&lt;/div>
&lt;/div>
&lt;p>For example, if you want to calculate the probability density of finding
the particle near position \(x = 2\), and \(\Psi(2) = 0.8\), for instance,
then the density is \(p(2) = |\Psi(2)|^{2} = {0.8}^{2} = 0.64\).&lt;/p>
&lt;h3 id="35-superposition">&lt;strong>3.5 Superposition&lt;/strong>&lt;/h3>
&lt;p>In classical physics, a system is always in one definite state. A coin
is either heads or tails. A particle has a specific position and
velocity. Reality is singular.&lt;/p>
&lt;p>Quantum mechanics, as described by the wave function \(\Psi\), is
different. A system can exist in a superposition, a single physical
state that encodes multiple and simultaneous realities.&lt;/p>
&lt;p>This isn&amp;rsquo;t a statement about our ignorance or uncertainty. It&amp;rsquo;s a
statement about what is, superpositions are entirely real, evolve
deterministically, and follow the Schrödinger equation at all times.&lt;/p>
&lt;h4 id="351-what-is-a-superposition">&lt;strong>3.5.1 What Is a Superposition?&lt;/strong>&lt;/h4>
&lt;p>A quantum system can be described as (again, don&amp;rsquo;t worry about the weird
notation):&lt;/p>
\[|\psi\rangle = a|A\rangle + b|B\rangle\]
&lt;p>The above equation is an example of a superposition. \(|A\rangle\) is one
outcome, \(|B\rangle\) is another outcome, and both outcomes are equally
real.&lt;/p>
&lt;p>Imagine having a coin where neither face is just heads or just tails,
but instead, both at once, not because the state of the coin's face is
unknown, but because the outcomes exist in a blended state.&lt;/p>
&lt;p>Let&amp;rsquo;s say that \(|A\rangle\) is heads and \(|B\rangle\) is tails. The numbers
\(a\) and \(b\), called &lt;em>amplitudes&lt;/em>, tell us how much of \(|A\rangle\) and
\(|B\rangle\) are in the mix relative to each other. The amplitudes are
like proportions of ingredients in a recipe, and indicate how much of
each outcome (ingredient) the system has.&lt;/p>
&lt;p>However, we don&amp;rsquo;t see both outcomes when we look. We&amp;rsquo;ll come to that
later.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/schrodinger.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Portrait of Erwin Schrödinger.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="4-why-the-collapse-interpretation-is-wrong">&lt;strong>4. Why the Collapse Interpretation is Wrong&lt;/strong>&lt;/h2>
&lt;h3 id="41-what-the-collapse-interpretation-claims">&lt;strong>4.1 What the Collapse Interpretation Claims&lt;/strong>&lt;/h3>
&lt;p>Before we can dismantle the collapse interpretation of quantum
mechanics, we need to understand what it actually claims.&lt;/p>
&lt;p>To be clear: this section is &lt;em>not&lt;/em> an endorsement. These ideas will soon
be shown to be inconsistent, unnecessary, and in direct conflict with
the literal meaning of quantum theory. But it&amp;rsquo;s important to accurately
state what the collapse interpretation view says, and what generations
of physicists have been taught to accept without question.&lt;/p>
&lt;p>The collapse interpretation asserts that the wave function \(\Psi\), while
useful for predicting probabilities, is not real. According to this
view, \(\Psi\) is a tool for calculating the probability density of
various outcomes (using the Born rule), but not a description of the
system itself.&lt;/p>
&lt;p>The defining feature of the collapse interpretation is of course the
collapse postulate: &lt;em>the wave function evolves smoothly and
deterministically only until a measurement is made. Then, randomly
collapses into one of its outcomes, and all other outcomes are
destroyed.&lt;/em>&lt;/p>
&lt;p>This collapse is instantaneous and non-deterministic. Before collapse, a
system might be in a superposition, like the example from earlier:&lt;/p>
\[|\psi\rangle = a|A\rangle + b|B\rangle\]
&lt;p>After a measurement, one of the outcomes, say, heads, remains:&lt;/p>
\[|\psi\rangle = |A\rangle\]
&lt;p>The other possibility, tails, is considered to have &amp;ldquo;disappeared.&amp;rdquo; The
wave function no longer describes both outcomes, only one is real. This
abrupt change is not derived from the Schrödinger equation, it's an
addition. To be clear, this is not a minor technical point, it requires
introducing a separate rule for quantum systems once observed:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>Deterministic Schrödinger equation when unobserved.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Random collapse when observed.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>In other words, according to the collapse interpretation view, the
Schrödinger equation applies everywhere and at any point in time,
&lt;em>except&lt;/em> when an observation is made.&lt;/p>
&lt;h3 id="42-the-observer-as-a-magical-boundary">&lt;strong>4.2 The Observer as a Magical Boundary&lt;/strong>&lt;/h3>
&lt;p>According to the collapse interpretation, collapse occurs when an
&amp;ldquo;observation&amp;rdquo; is made, but what qualifies as an observation, and who, or
what, counts as an observer?&amp;quot;&lt;/p>
&lt;p>It's here that things get suspicious. The collapse interpretation never
provides a clear, physical definition of a measurement or an observer.
The theory assumes this boundary but refuses to say where it lies. Is it
the eye? The brain? A camera? A Geiger counter? A thermometer?
Consciousness?&lt;/p>
&lt;p>It gets even worse: observers themselves are made of quantum particles!&lt;/p>
&lt;p>The collapse interpretation avoids resolving these issues by simply
declaring that somehow collapse happens when it needs to, and that the
details don't matter.&lt;/p>
&lt;p>Hence why it&amp;rsquo;s called by many the &amp;ldquo;Shut up and calculate!&amp;rdquo;
interpretation. But the cost of shutting up is blocking decades of
scientific progress.&lt;/p>
&lt;h3 id="43-mathematically-ill-defined">&lt;strong>4.3 Mathematically Ill-Defined&lt;/strong>&lt;/h3>
&lt;p>It&amp;rsquo;s important to emphasize that collapse contradicts the core equation
of quantum mechanics, the Schrödinger equation.&lt;/p>
&lt;p>As seen in &lt;a href="#33-the-schr%C3%B6dinger-equation">&lt;em>section 3.3&lt;/em>&lt;/a>, the Schrödinger equation is:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Linear:&lt;/strong> superpositions evolve linearly. Their parts may interfere
or cancel, but they never collapse on their own.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Deterministic:&lt;/strong> there is no randomness in the equation.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Universal:&lt;/strong> the Schrödinger equation applies to all physical
systems. Planets, labs, and observers are built from atoms, and atoms
are quantum systems, so the whole remains quantum.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>Collapse violates these features, as it&amp;rsquo;s:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Non-linear:&lt;/strong> it destroys all but one term.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Non-deterministic:&lt;/strong> it introduces randomness with respect to
measurement outcomes.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Non-universal:&lt;/strong> it happens only when &amp;ldquo;observed,&amp;rdquo; but never explains
what that means physically.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>Importantly, the collapse mechanism isn&amp;rsquo;t derived from anything. It&amp;rsquo;s
injected by arbitrary fiat.&lt;/p>
&lt;p>And as shown through the violation of linearity, determinism and
universality, it&amp;rsquo;s not just an unneeded philosophical add-on. It&amp;rsquo;s
physically incoherent and mathematically ill-defined—an extra rule
with no place in the framework of the Schrödinger equation.&lt;/p>
&lt;h3 id="44-the-logic-of-scientific-inertia">&lt;strong>4.4 The Logic of Scientific Inertia&lt;/strong>&lt;/h3>
&lt;p>Frustratingly, the collapse interpretation answers the question, &amp;ldquo;What
happens in a quantum system?&amp;rdquo; with, &amp;ldquo;Whatever we happen to see.&amp;rdquo; It
relies on an undefined observer and a discontinuous rule that cannot be
derived from the theory&amp;rsquo;s core equation.&lt;/p>
&lt;p>Schrödinger himself described it as &amp;ldquo;patently absurd&amp;rdquo; that the wave
function should &amp;ldquo;be controlled in two entirely different ways, at times
by the wave equation, but occasionally by direct interference of the
observer, not controlled by the wave equation.&amp;rdquo;&lt;/p>
&lt;p>So, why is it still so popular if it&amp;rsquo;s so wrong?&lt;/p>
&lt;p>The collapse interpretation became entrenched because:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>The math works:&lt;/strong> Quantum mechanics makes extremely accurate
predictions and for decades many thought collapse was necessary to
connect the equations to the Born rule.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Questioning foundational assumptions is considered philosophical:&lt;/strong>
Therefore a distraction or even a threat to one&amp;rsquo;s career.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Philosophical discomfort:&lt;/strong> Many-Worlds implies that all possible
outcomes happen. That there are countless versions of you. This feels
crazy.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Institutional tradition:&lt;/strong> The collapse interpretation was canonized
early on. Challenging it meant challenging the authority of Bohr,
Heisenberg, and generations of physicists.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>The strongest reason, by far, is that fear of ridicule for proposing
different views or engaging with the philosophical questions poisoned
the first generation of quantum physicists, and has been passed on ever
since.&lt;/p>
&lt;p>Academia, unfortunately, thrives on status. Talking about &amp;ldquo;many worlds&amp;rdquo;
sounds like science fiction, and credibility is vital in the academic
world. But science is not about comfort or credibility. It&amp;rsquo;s about
truth. And the truth is this: when you stop denying reality and start
taking quantum mechanics seriously, you get Many-Worlds.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/everett.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Portrait of Hugh Everett, who in 1957 released the paper "The Theory Of
The Universal Wave Function", which later became known as Many-Worlds.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="5-the-theory-of-the-universal-wave-function">&lt;strong>5. The Theory of the Universal Wave Function&lt;/strong>&lt;/h2>
&lt;h3 id="51-everetts-insight">&lt;strong>5.1 Everett&amp;rsquo;s Insight&lt;/strong>&lt;/h3>
&lt;p>In 1957, a 26-year-old Princeton graduate student named Hugh Everett III
published what would become one of the most important papers in the
history of physics.&lt;/p>
&lt;p>Everett&amp;rsquo;s radical proposal was stunning in its simplicity: &lt;em>Take the
Schrödinger equation seriously. Apply it to everything. Never collapse
the wave function.&lt;/em>&lt;/p>
&lt;p>Everett asked: What if we stop treating measurement as a special
exception to the rules of physics? What if we treat observers, whether
humans or instruments, as quantum systems unto themselves, obeying the
same deterministic laws as everything else?&lt;/p>
&lt;p>After all, as stated in &lt;a href="#33-the-schr%C3%B6dinger-equation">&lt;em>section 3.3&lt;/em>&lt;/a>, nothing in quantum theory
indicates that the Schrödinger equation shouldn&amp;rsquo;t apply everywhere.&lt;/p>
&lt;p>The implications of his simple insight were extraordinary.&lt;/p>
&lt;h3 id="52-measurement-without-collapse">&lt;strong>5.2 Measurement Without Collapse&lt;/strong>&lt;/h3>
&lt;p>So, what actually happens when you perform a measurement, if it&amp;rsquo;s not
collapse? Everett&amp;rsquo;s answer was simple: nothing out of the ordinary.
Measurement is just another physical interaction, one quantum system
interacting with another, governed entirely by the Schrödinger equation.&lt;/p>
&lt;p>Suppose you have a particle \(|\psi\rangle\) in a superposition of two
outcomes \(|A\rangle\) and \(|B\rangle\):&lt;/p>
\[|\psi\rangle = a|A\rangle + b|B\rangle\]
&lt;p>Now, let's suppose that you bring in a measurement device, such as a
detector, or even just your own eyes. That measurement device is itself
a quantum system, and so is also described by its own wave equation.
Let&amp;rsquo;s assume the device (or your eyes) to initially be in the state:&lt;/p>
\[|D_{0}\rangle\]
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">Here, again, \(|D_{0}\rangle\) is just a name. We could have called it
anything else. We only chose the letter &lt;em>D&lt;/em> because it&amp;rsquo;s the first
letter of &lt;em>device&lt;/em>.&lt;/div>
&lt;/div>
&lt;p>When the particle interacts with the device, the universal Schrödinger
equation doesn&amp;rsquo;t collapse anything. Instead, it entangles the two:&lt;/p>
\[|\psi\rangle = a|A\rangle|D_{A}\rangle + b|B\rangle|D_{B}\rangle\]
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">&lt;em>Entanglement&lt;/em> means that their outcomes are no longer described by
independent wave functions. In the above example, \(|A\rangle\) and
\(|D_{A}\rangle\) are tied together. Same for \(|B\rangle\) and
\(|D_{B}\rangle\).&lt;/div>
&lt;/div>
&lt;p>Here&amp;rsquo;s what the entanglement signifies:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>If the particle is in state \(|A\rangle\), the device registers &amp;ldquo;A&amp;rdquo;,
which is why we write it as \(|D_{A}\rangle\). It&amp;rsquo;s tied to the state
\(|A\rangle\)—it&amp;rsquo;s &lt;em>entangled&lt;/em> with it.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>If it&amp;rsquo;s in state \(|B\rangle\), the device registers &amp;ldquo;B&amp;rdquo;, which explains
why we write it as \(|D_{B}\rangle\).&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>There is no collapse here. Instead, there is just entanglement, and two
equally real outcomes.&lt;/p>
&lt;p>Further, if an observer was in the room, say initially in the state
\(|O_{0}\rangle\), they would become entangled as well:&lt;/p>
\[|\psi\rangle = a|A\rangle|D_{A}\rangle|O_{A}\rangle + b|B\rangle|D_{B}\rangle|O_{B}\rangle\]
&lt;p>What the above equation says is: there is a &lt;em>branch&lt;/em> where the device
measured outcome \(|A\rangle\), and the observer subsequently became
entangled with that branch. There is another branch where the device
measured outcome \(|B\rangle\), and the observer subsequently became
entangled with that one as well.&lt;/p>
&lt;p>Taking things literally, without fear of the implications, this means
that there are now &lt;em>two&lt;/em> observers: one who observed and became
entangled with state \(|A\rangle\), and another who observed and became
entangled with state \(|B\rangle\).&lt;/p>
&lt;p>Both are equally real, but they can&amp;rsquo;t interact with each other (we will
see why later). Importantly, until the exact moment that the
entanglement occurred, the observer was one person, however, once the
entanglement happened, two versions of the same observer emerged.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">Think of it like a book that splits into two storylines. Up to chapter
5, there&amp;rsquo;s only one character, Bob. At chapter 6, the story splits
into two parallel plotlines: in one version Bob opens the red door, in
the other he opens the blue door. Both stories exist in the book,
written side by side, but each Bob only experiences the one inside his
storyline.&lt;/div>
&lt;/div>
&lt;p>That&amp;rsquo;s what the equation is saying: both Bobs exist, both are equally
real, each is restricted to the outcomes of their own branch, in their
own &lt;em>world&lt;/em>.&lt;/p>
&lt;p>This might seem crazy, but all we&amp;rsquo;re doing here is taking quantum
mechanics seriously and figuring out its implications. There are no
additional, ad hoc assumptions here.&lt;/p>
&lt;p>This is why calling Many-Worlds an &amp;lsquo;interpretation&amp;rsquo; is
misleading. It is quantum theory taken literally. Collapse
interpretations, by contrast, are extra rules pasted on top.&lt;/p>
&lt;p>We will cover later on in the article where each version of Bob resides,
and why they can&amp;rsquo;t communicate with each other.&lt;/p>
&lt;p>But first, if an observer in the room becomes entangled with each
branch, what about the rest of the world? Won&amp;rsquo;t it eventually become
entangled as well? The answer is, yes, but before that, let&amp;rsquo;s go over
what &lt;em>interference&lt;/em> is.&lt;/p>
&lt;h3 id="53-interference">&lt;strong>5.3 Interference&lt;/strong>&lt;/h3>
&lt;p>Superpositions don&amp;rsquo;t just list the different possibilities. Their
amplitudes—the &amp;ldquo;weights&amp;rdquo; of each possibility—can also interact with
each other. This interaction is called interference.&lt;/p>
&lt;p>Think of two ripples on a pond. When the ripples meet, they can either
converge into a larger ripple, a form of &lt;em>constructive&lt;/em> interference, or
they can cancel each other into still water, a form of &lt;em>destructive&lt;/em>
interference.&lt;/p>
&lt;p>More formally, suppose you have a particle \(|\psi\rangle\) in a
superposition of two outcomes \(|A\rangle\) and \(|B\rangle\):&lt;/p>
\[|\psi\rangle = a|A\rangle + b|B\rangle\]
&lt;p>Here \(a\) and \(b\) (the amplitudes) aren&amp;rsquo;t just passive numbers. How they
combine will determine whether in some situations \(|A\rangle\) and
\(|B\rangle\) constructively interfere or destructively interfere.&lt;/p>
&lt;p>In practice, this means that before decoherence kicks in, a phenomenon
we will shortly go over, branches have sufficient &lt;em>overlap&lt;/em> in order to
interfere. When decoherence kicks in, they become independent worlds and
no longer have the ability to interfere.&lt;/p>
&lt;h3 id="54-what-is-a-world-in-many-worlds">&lt;strong>5.4 What Is a &amp;ldquo;World&amp;rdquo; in Many-Worlds?&lt;/strong>&lt;/h3>
&lt;p>In &lt;a href="#52-measurement-without-collapse">&lt;em>section 5.2&lt;/em>&lt;/a> we covered an example of a device becoming entangled
with each possible state of a particle \(|\psi\rangle\), with the observer
in the room eventually becoming entangled as well. But what about the
rest of the world?&lt;/p>
&lt;p>Eventually, the rest of the world will become entangled as well. The
measuring device may emit heat, for example, the amount of which depends
on the device&amp;rsquo;s measurement outcome. Heat gets air molecules to be more
&amp;ldquo;excited&amp;rdquo;, and, as a result, they bump into each other more. This
results in the air molecules becoming entangled with the original
particle&amp;rsquo;s state as well.&lt;/p>
&lt;p>Over time, the disturbance ripples outward—molecules colliding,
photons scattering, and even the underlying fields (like the
electromagnetic field) extending—so that larger and larger parts of
the environment become correlated with the original outcome. Because
nothing is perfectly isolated, the entanglement spreads far beyond the
device.&lt;/p>
&lt;p>It&amp;rsquo;s not literally the entire universe all at once—what actually
happens is that ever-larger subsystems become independent bubbles of
history. Each &amp;lsquo;world&amp;rsquo; is one such bubble, expanding as more of its
surroundings get locked into its storyline.&lt;/p>
&lt;p>In the above example, I used the device&amp;rsquo;s heat as an initial trigger,
but it could have been anything. Photons could have become entangled
with the device, if it reflects light. The arrangement of the atoms that
make up the device could be slightly different depending on the
measurement, causing the photons to reflect slightly differently. As a
result, the rest of the environment would become entangled over time,
just like in the previous air molecule example.&lt;/p>
&lt;p>The important point here is that microscopic differences in the device
after the measurement, eventually ripple into large macroscopic changes,
entangling the environment with each state.&lt;/p>
&lt;p>Eventually, the whole world gets entangled with each branch, meaning
there are now two worlds. One world entangled with state \(|A\rangle\),
and another entangled with state \(|B\rangle\). We call this process of
growing entanglement and the separation of branches &lt;em>decoherence&lt;/em>.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">&lt;p>Decoherence is what happens when a quantum system becomes entangled
with its environment in so many uncontrollable ways that the different
branches of its wave function can no longer interfere with each other.&lt;/p>
&lt;p>In plain words: it&amp;rsquo;s the process by which quantum possibilities (like
outcome \(|A\rangle\) and outcome \(|B\rangle\)) stop overlapping and
start behaving like separate, classical realities.&lt;/p>
&lt;/div>
&lt;/div>
&lt;p>It&amp;rsquo;s important to stress that splitting is local, not global. The whole
universe doesn&amp;rsquo;t branch at once. The chain starts right where the
measurement happens: a particle hits the device and entangles it to a
branch, and as photons bounce differently in each branch, the air
molecules scatter differently in each branch.&lt;/p>
&lt;p>The branching then propagates outward at the speed of these interactions
(though never faster than light). That&amp;rsquo;s why, in the Bob example, &amp;ldquo;two
Bobs&amp;rdquo; only exist from the moment Bob himself becomes entangled with the
device. Before that, there was still just one Bob, even though there
were already two devices (assuming the particle already hit the device).&lt;/p>
&lt;h3 id="55-re-interference">&lt;strong>5.5 Re-interference&lt;/strong>&lt;/h3>
&lt;p>We now know how splitting works, and how a microscopic branch split
eventually leads to completely separate and independent worlds.&lt;/p>
&lt;p>But if worlds split, can they ever come back together again? Could the
two Bobs merge back into one later on?&lt;/p>
&lt;p>The answer is, yes! The Schrödinger equation is linear, which means that
when different parts of the wavefunction evolve, they don&amp;rsquo;t erase each
other, they just separate. All the information about each branch is
still present in principle. So re-interference is possible: If you could
take every particle, photon, and atom in both branches and put them back
into exactly the same state, the two branches would interfere again,
merging back into a single branch.&lt;/p>
&lt;p>However, this happens &lt;em>extremely&lt;/em> infrequently. Recalling the example
from &lt;a href="#53-interference">&lt;em>section 5.3&lt;/em>&lt;/a>, a microscopic difference like a trillionth of a
Celsius degree can get one air molecule to behave just slightly
differently, bumping into others slightly differently as a result,
entangling them. Then &lt;em>those&lt;/em> air molecules will entangle still others,
and so on.&lt;/p>
&lt;p>For re-interference to happen, you would have to bring every single
particle back into the original state. That&amp;rsquo;s nearly impossible in
practice, especially given the exponential nature of entanglement. You
would need to be very quick in order to stop the chain of events and
reverse the entanglement.&lt;/p>
&lt;p>For this reason, re-interference is possible in simple, isolated
systems, where we carefully shield the studied particles from the
environment, but for macroscopic systems, like a device, an observer,
and a room full of air, it&amp;rsquo;s beyond reach, at least at the moment.&lt;/p>
&lt;p>So while re-interference is never ruled out by the laws of physics,
decoherence spreads entanglement so fast and so completely that for
anything larger than a handful of particles, the worlds may as well be
permanently separate.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/einstein-bohr.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Niels
Bohr (left) with Albert Einstein (right) at Paul Ehrenfest\'s home in
Leiden, December 1925. Bohr strongly defended the collapse
interpretation, while Einstein rejected it, arguing the theory was
incomplete.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="6-myths-and-misconceptions-about-many-worlds">&lt;strong>6. Myths and Misconceptions About Many-Worlds&lt;/strong>&lt;/h2>
&lt;h3 id="61-do-the-worlds-exist-in-other-dimensions">&lt;strong>6.1 Do the Worlds Exist in Other Dimensions?&lt;/strong>&lt;/h3>
&lt;p>It&amp;rsquo;s a myth that Many-Worlds implies merely a collection of spatially
distant, causally separated bubble universes.&lt;/p>
&lt;p>All Everettian worlds, all of the constantly differentiating and
emerging branches, exist in the exact same reality we live in. They
overlap the same physical space we&amp;rsquo;re in.&lt;/p>
&lt;p>This obviously sounds insane—why can't we see them or interact with
them?&lt;/p>
&lt;p>The answer has to do with Hilbert space, which we covered in &lt;a href="#32-hilbert-space">&lt;em>section 3.2&lt;/em>&lt;/a>. As you know by now, every quantum state resides in Hilbert space.
Mathematically, the phenomenon of branching caused by decoherence is
just quantum states in Hilbert space becoming orthogonal to each other.&lt;/p>
&lt;p>Those who remember high school math may think of orthogonality as a 90º
angle between two lines, making it a right angle and the lines
perpendicular to each other. This is the case here, but it also means
something more abstract and deeper: the states are completely
independent and non-overlapping.&lt;/p>
&lt;p>Think of two songs playing on totally different radio frequencies. They
both fill the air of the same city, but because they&amp;rsquo;re on separate
channels, your radio only ever picks up one. In this analogy, you are
the radio (not to insult you), tuned into a specific branch.&lt;/p>
&lt;p>In Hilbert space, orthogonal states are like those separate radio
channels. They exist together, in the same exact physical space, but
they don&amp;rsquo;t interfere with each other. Your radio is &lt;em>tuned&lt;/em> into a
specific frequency, just like decoherence &lt;em>tunes&lt;/em> the environment into
specific branches.&lt;/p>
&lt;p>This is all very mathematical and fine, but how is it even possible? How
is it possible that there are trillions of or infinite overlapping
worlds that exist in the same reality we are in, but that we can&amp;rsquo;t touch
them or interact with?&lt;/p>
&lt;p>The reason is that, as explained above, once states become orthogonal
through decoherence, all possible interference between them vanishes.
Even if you tried to &amp;ldquo;peek&amp;rdquo; into another branch, you couldn't, as your
eyes, your neurons, and the photons that reach you, are all already
entangled with your branch.&lt;/p>
&lt;p>The entire chain of your perception is locked into one storyline. From
the inside, you only ever experience your branch, never the others.&lt;/p>
&lt;p>Additionally, the issue of non-interaction comes down to practical
impossibility. In order to interact with another branch, you would need
to reverse every single entangling interaction that separates them,
every scattered photon, every vibrating atom, every air molecule
collision. At a macroscopic level, this is essentially impossible, as
explained in &lt;a href="#54-what-is-a-world-in-many-worlds">&lt;em>section 5.4&lt;/em>&lt;/a>.&lt;/p>
&lt;p>So, the reason that you don&amp;rsquo;t feel molecules from other worlds hitting
you is because &amp;ldquo;those molecules&amp;rdquo; don&amp;rsquo;t even exist in your branch. They
exist in their own orthogonal state, evolving in their distinct and
independent branch.&lt;/p>
&lt;p>If you are having trouble visualizing this or understanding this, don&amp;rsquo;t
worry, it&amp;rsquo;s normal. Again, we made no additional assumptions here. And,
for what it&amp;rsquo;s worth, black holes, spacetime, and other phenomena in
physics are at least as counterintuitive as this.&lt;/p>
&lt;h3 id="62-why-dont-i-notice-the-split">&lt;strong>6.2 Why Don&amp;rsquo;t I Notice the Split?&lt;/strong>&lt;/h3>
&lt;p>By now you might be wondering: If I split into two versions of myself
whenever a measurement happens, why don&amp;rsquo;t I feel the splitting?
Shouldn&amp;rsquo;t I feel something when a new &amp;ldquo;me&amp;rdquo; appears?&lt;/p>
&lt;p>The reason is simple: from the inside of a branch, there is nothing to
notice or feel. Each copy of you is perfectly continuous with your past
and is only aware of what happens in that particular branch.&lt;/p>
&lt;p>Going back to Bob&amp;rsquo;s example from &lt;a href="#52-measurement-without-collapse">&lt;em>section 5.2&lt;/em>&lt;/a>: Before the
measurement, there was one Bob in state \(|O_{0}\rangle\).&lt;/p>
&lt;p>After the device&amp;rsquo;s measurement, the wave function branched and
subsequently entangled Bob along with it:&lt;/p>
\[|\psi\rangle = a|A\rangle|D_{A}\rangle|O_{A}\rangle + b|B\rangle|D_{B}\rangle|O_{B}\rangle\]
&lt;p>Now there are two Bobs: Bob A and Bob B. But each one remembers being
the original Bob. Each one experienced a smooth, uninterrupted flow of
time. Neither has any sense of &amp;ldquo;splitting.&amp;rdquo;&lt;/p>
&lt;p>Why? Because everything that makes up &amp;ldquo;you&amp;rdquo; has already been entangled:
your eyes, neurons, memories, etc. When the split happens, each version
of you carries forward the same memories up to that moment. Within each
branch, it feels like nothing unusual happened. It just seems as though
&amp;ldquo;one outcome&amp;rdquo; occurred.&lt;/p>
&lt;p>So why don&amp;rsquo;t you notice the split? Because noticing requires comparison,
and you never have access to the other branch to compare it with. The
only way you could notice would be if the wavefunction actually broke
its smooth, reversible evolution—as if it really collapsed. But it
never does, so nothing appears out of the ordinary.&lt;/p>
&lt;p>That&amp;rsquo;s why your everyday experience feels &amp;ldquo;normal&amp;rdquo;, even though the
universal wave function is constantly branching.&lt;/p>
&lt;h3 id="63-is-energy-conserved-if-worlds-multiply">&lt;strong>6.3 Is Energy Conserved If Worlds Multiply?&lt;/strong>&lt;/h3>
&lt;p>If there are constantly new branches being created, aren&amp;rsquo;t we creating
new energy all the time out of thin air?&lt;/p>
&lt;p>This is one of the most natural objections to the Many-Worlds
explanation of quantum mechanics. Its resolution is admittedly difficult
to grasp intuitively. It &lt;em>feels&lt;/em> like branching should mean that more
and more energy appears: two worlds, two Bobs, two devices, twice as
much matter and energy.&lt;/p>
&lt;p>The reality, though, is that at the level of the universal wave
function, the mathematical object that describes all branches, energy is
perfectly conserved. The Schrödinger equation that governs its evolution
guarantees that the total energy of the universe never changes.&lt;/p>
&lt;p>To see how this works, let&amp;rsquo;s use a very simple example. Suppose the
universal state is&lt;/p>
\[|\psi\rangle = a|A\rangle + b|B\rangle\]
&lt;p>with two possible branches, \(|A\rangle\) and \(|B\rangle\). Remember, \(a\)
and \(b\) are called the amplitudes of the branches. They aren&amp;rsquo;t just
arbitrary numbers: their squared magnitudes, \(|a|^{2}\) and \(|b|^{2}\),
represent the &amp;ldquo;share&amp;rdquo; of the total wave function taken up by each
branch. This is another case of the Born rule, which we saw in &lt;a href="#34-the-born-rule">&lt;em>section 3.4&lt;/em>&lt;/a>.&lt;/p>
&lt;p>Now, one of the most important properties of any wave function is that
it must be &lt;em>normalized&lt;/em>. Normalization simply means that when you add up
the shares of all possible branches, you get exactly 1:&lt;/p>
\[|a|^{2} + |b|^{2} = 1\]
&lt;p>This ensures that the probabilities of all possible outcomes always add
up to 100%, meaning the whole state of the wave function always
represents 100% of reality, no matter how many branches it splits into.
Without it, we would assign either too little or too much total
probability, which would make no physical sense.&lt;/p>
&lt;p>Let&amp;rsquo;s make this concrete. Suppose the total energy of the universal
state before branching is \(10\ J,\) where \(J\) denotes &lt;em>joules&lt;/em>, a unit of
energy. After branching, each branch looks like a complete world from
the inside, with as much energy as its &amp;lsquo;parent&amp;rsquo; branch had had: say
\(E_{A} = 10\ J\) and \(E_{B} = 10\ J\). To Bob A and Bob B, nothing seems
to be missing, and everything is continuous. Each Bob lives in a
complete-seeming world.&lt;/p>
&lt;p>But when we calculate the total energy of the universal wave function,
we don&amp;rsquo;t just add \(E_{A} + E_{B}\). That would be double counting, since
the &amp;lsquo;weight&amp;rsquo; of the parent branch is equal to the sum of the &amp;lsquo;weights&amp;rsquo;
of the branches that include Bob A and Bob B. The correct calculation,
then, is the &lt;em>expectation value,&lt;/em> the average of all the possible
outcomes of a measurement as weighted by their likelihood:&lt;/p>
\[E_{total} = |a|^{2}E_{A} + |b|^{2}E_{B}\]
&lt;p>If, for example, \(a = b = \frac{1}{\sqrt{2}}\), for example, then each
branch has weight:&lt;/p>
\[|a|^{2} = |b|^{2} = \left| \frac{1}{\sqrt{2}} \right|^{2} = \frac{1}{2}\]
&lt;p>So, the total energy is:&lt;/p>
\[E_{total} = \frac{1}{2} \cdot 10 + \frac{1}{2} \cdot 10 = 5 + 5 = 10\]
&lt;p>Energy is conserved, as promised. The &amp;ldquo;two worlds&amp;rdquo; didn&amp;rsquo;t double the
energy. Rather, the amplitudes rebalanced their contributions so that
the universal total stays constant.&lt;/p>
&lt;p>A common question at this point is whether energy is somehow
&amp;ldquo;transferred&amp;rdquo; from a parent branch into its child branches. If the
original world had \(10\ J\), and each child world also has \(10\ J\), then
it may seem as if something must have been duplicated and handed out.&lt;/p>
&lt;p>But that picture is misleading. Before branching, the state was a single
vector \(|\psi\rangle\). After branching, it is still a single vector
\(|\psi\rangle\), just written as a sum of components \(|A\rangle\) and
\(|B\rangle\). At no point is energy taken from one and given to another,
the global expectation value of energy is constant throughout.&lt;/p>
&lt;h3 id="64-at-what-speed-do-worlds-split">&lt;strong>6.4 At What Speed Do Worlds Split?&lt;/strong>&lt;/h3>
&lt;p>When we talk about worlds branching, it might sound as if the universe
suddenly duplicates itself in an instant. But this is not how branching
works.&lt;/p>
&lt;p>Worlds don&amp;rsquo;t split all at once nor in every place simultaneously.
Splitting is a local and continuous process, unfolding as particles
interact with their surroundings.&lt;/p>
&lt;p>Each time a particle collides, or a photon interacts with something,
information about the outcome is copied into the environment, and the
corresponding branches grow more orthogonal (meaning more distinct) to
one another.&lt;/p>
&lt;p>The &amp;ldquo;speed&amp;rdquo; of branching is therefore just the speed of physical
interactions:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>Photons carry outcome information at the speed of light.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Air molecules spread information at their thermal speeds (hundreds of
meters per second).&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Vibrations in solids transmit information at the speed of sound in the
material.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>Branching propagates outward at those speeds. There is no global cosmic
moment at which &amp;ldquo;the split happens.&amp;rdquo;&lt;/p>
&lt;p>Instead, the process ripples outward from the site of the quantum event,
like concentric waves on a pond after a stone is thrown in. But quantum
branching is not caused by just one stone—it&amp;rsquo;s caused by trillions,
scattered everywhere, making ripples all the time. Every photon, every
air molecule collision, every atomic vibration is another &amp;ldquo;stone,&amp;rdquo;
creating its own expanding ripples of branching.&lt;/p>
&lt;p>For macroscopic systems, this all happens incredibly fast. A dust grain
floating in air can decohere in less than a billionth of a second. To
us, that is indistinguishable from instant. This explains why everyday
reality feels so definite. Branching happens on timescales far shorter
than human perception could ever detect.&lt;/p>
&lt;p>Additionally, branches don&amp;rsquo;t drift through space and collide with each
other. Instead, what&amp;rsquo;s spreading is entanglement: when a quantum event
happens, information about its outcome ripples outward at the speed of
interactions (light, molecules, vibrations).&lt;/p>
&lt;p>If that ripple reaches you later, you don&amp;rsquo;t &amp;ldquo;merge with another branch.&amp;rdquo;
Instead, you split at that moment, becoming correlated with that earlier
event. In this way, branching is continuous and local, with new splits
layering on top of old ones.&lt;/p>
&lt;h3 id="65-is-there-a-finite-or-countable-number-of-worlds">&lt;strong>6.5 Is There a Finite or Countable Number of Worlds?&lt;/strong>&lt;/h3>
&lt;p>Many-Worlds is often pictured as a collection of a vast, even infinite,
number of parallel universes you could (in principle) list and manually
count.&lt;/p>
&lt;p>But that is wrong. Branches are not fundamental objects in the theory.
Those are downstream from the universal wave function, which evolves
smoothly and deterministically.&lt;/p>
&lt;div class="box box-info">
&lt;div class="box-title">Info&lt;/div>
&lt;div class="box-content">In fact, Hugh Everett named his revolutionary 1957 paper &amp;ldquo;The Theory
of the Universal Wave Function&amp;rdquo;, and didn&amp;rsquo;t mention the existence of
other universes even once throughout the entire paper. It is implied
by quantum mechanics, as an emergent description, but not a
fundamental part of it.&lt;/div>
&lt;/div>
&lt;p>Branches are an emergent description we use when decoherence makes parts
of the wave function effectively independent. They are patterns in the
mathematics of the wave equation, not individually labeled &amp;ldquo;things&amp;rdquo; that
physics keeps a register of. This doesn&amp;rsquo;t mean they aren&amp;rsquo;t real—they
very much are. It just means there isn&amp;rsquo;t a database or registry
somewhere of all branches.&lt;/p>
&lt;p>Every possible microscopic detail of the environment defines another way
the wave function can decohere. There is no line where you can stop and
say, &amp;ldquo;Here is the exact number of worlds.&amp;rdquo; It&amp;rsquo;s effectively infinite.&lt;/p>
&lt;p>So while it&amp;rsquo;s fine as a shorthand to say &amp;ldquo;a world where Bob saw A&amp;rdquo; and
&amp;ldquo;a world where Bob saw B,&amp;rdquo; in reality there are infinitely many slight
variations entangled into those states, each differing by the paths of
countless photons, molecules, and atoms. Talking about a &amp;ldquo;number of
worlds&amp;rdquo; is like asking, &amp;ldquo;How many waves are in the ocean?&amp;rdquo;&lt;/p>
&lt;h3 id="66-can-we-interact-with-other-worlds">&lt;strong>6.6 Can We Interact with Other Worlds?&lt;/strong>&lt;/h3>
&lt;p>Another common myth about Many-Worlds is that, while we can&amp;rsquo;t interact
with other branches &lt;em>yet&lt;/em>, perhaps some future technology might allow us
to cross over or send a message, like building a radio tuned to another
universe.&lt;/p>
&lt;p>The answer is no. Once branches become orthogonal through decoherence,
they no longer interfere. Orthogonality means that they occupy
completely independent directions in Hilbert space.&lt;/p>
&lt;p>No process allowed by quantum mechanics can cause two orthogonal states
to overlap again unless you perfectly reverse every single entangling
interaction or through some different chain of interactions that happens
to bring them back together. For a macroscopic system, that is in
practice impossible.&lt;/p>
&lt;p>From the inside, this means your awareness is always locked to a single
branch. Your eyes, neurons, and every photon reaching you are already
entangled with your branch&amp;rsquo;s history. There is no way to &amp;ldquo;look sideways&amp;rdquo;
into another branch, because the very act of looking is part of what
entangles you to this one.&lt;/p>
&lt;p>Decohered worlds are effectively like radio channels on different
frequencies. Both fill the air, but once you&amp;rsquo;re tuned into one, you
cannot hear the others.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/von-neumann.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Portrait of John Von Neumann, who gave
quantum mechanics its precise formal structure.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="7-can-many-worlds-be-tested">&lt;strong>7. Can Many-Worlds Be Tested?&lt;/strong>&lt;/h2>
&lt;h3 id="71-misunderstanding-what-proof-means">&lt;strong>7.1 Misunderstanding What &amp;ldquo;Proof&amp;rdquo; Means&lt;/strong>&lt;/h3>
&lt;p>When people first hear about Many-Worlds, their first reaction is often:
&lt;em>&amp;ldquo;But you can&amp;rsquo;t prove it! You can&amp;rsquo;t see the other worlds, so it&amp;rsquo;s just
speculation.&amp;rdquo;&lt;/em>&lt;/p>
&lt;p>Technically, there is a way to test it. David Deutsch, the father of
quantum computing, showed so
&lt;a href="https://boulderschool.yale.edu/sites/default/files/files/Deutsch.pdf">here&lt;/a>
(see &lt;em>8. A Thought Experiment&lt;/em>). But it relies on technology we don&amp;rsquo;t
possess today and probably won&amp;rsquo;t possess in the near future.&lt;/p>
&lt;p>In any case, this objection sounds powerful, but it rests on a
fundamental misunderstanding of how science works. Science is not about
directly observing every part of reality. It&amp;rsquo;s about conjecturing
theories that explain what we &lt;em>do&lt;/em> observe in terms of entities that we
do &lt;em>not&lt;/em> observe, and then testing those theories against experiments.&lt;/p>
&lt;p>We never directly observe most of the entities science deals with. No
one has ever seen an electron with the naked eye. No one has touched
spacetime curvature. We infer their existence because the theories that
invoke them explain our observations better than all rival theories that
don&amp;rsquo;t.&lt;/p>
&lt;p>By this standard, Many-Worlds is not speculative at all. It is simply
quantum mechanics taken seriously, without ad hoc additions or fixes.
The Schrödinger equation is one of the most precisely tested laws in all
of science. It has never once failed an experimental test. As previously mentioned, Everett&amp;rsquo;s
insight was simple: don&amp;rsquo;t add collapse, just apply the equation
universally.&lt;/p>
&lt;h3 id="72-collapse-requires-extra-assumptions">&lt;strong>7.2 Collapse Requires Extra Assumptions&lt;/strong>&lt;/h3>
&lt;p>If you deny Many-Worlds, you will probably accept collapse as an
alternative &amp;ldquo;explanation&amp;rdquo;. But collapse is not written in the
mathematics of quantum mechanics. It is an extra rule, pasted on top.&lt;/p>
&lt;p>The problem is that collapse rules are vague and contradictory: When
exactly does it happen? What counts as a measurement? Why should
observers or consciousness have special powers that no other physical
system has?&lt;/p>
&lt;p>There are no clear, testable answers. Collapse is not just an
unnecessary assumption, it&amp;rsquo;s one that directly contradicts the linear,
deterministic, universal nature of the Schrödinger equation.&lt;/p>
&lt;p>This is why Many-Worlds is not a speculative add-on. It is the default
reading of the equations. If you take the Schrödinger equation and
follow it through consistently, you arrive at Many-Worlds automatically.
The burden of proof lies not on Everett, but on anyone who wants to
&lt;em>change the equations&lt;/em> by injecting collapse.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/dewitt.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">Bryce DeWitt with his wife Cécile DeWitt-Morette. Bryce DeWitt revived
Everett's Many-Worlds interpretation and helped gain it recognition.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="8-living-in-many-worlds">&lt;strong>8. Living in Many-Worlds&lt;/strong>&lt;/h2>
&lt;h3 id="81-probability-free-will-and-ethics">&lt;strong>8.1 Probability, Free Will, and Ethics&lt;/strong>&lt;/h3>
&lt;p>What does probability even mean if all outcomes happen? Is there free
will—do my choices and ethics still matter?&lt;/p>
&lt;p>First, it&amp;rsquo;s important to clarify that while there is practically an
infinity of other worlds, they each respect the laws of physics. So all
outcomes &lt;em>within the laws of physics&lt;/em> happen.&lt;/p>
&lt;p>Second, we must distinguish between two perspectives. From the outside,
looking at the universal wave function, there is no randomness at all.
The Schrödinger equation is fully deterministic: the state evolves
continuously and smoothly, splitting into branches, etc. From that
global view, nothing is uncertain.&lt;/p>
&lt;p>From the inside of a branch, it&amp;rsquo;s impossible to know which outcome you
will experience in advance. Before a quantum event, there are multiple
possible future versions of you, each tied to a different outcome. You
can&amp;rsquo;t predict which &amp;ldquo;you&amp;rdquo; you will become, creating uncertainty. That
subjective uncertainty corresponds to the probabilities of outcomes. The
Born rule, as seen in &lt;a href="#34-the-born-rule">&lt;em>section 3.4&lt;/em>&lt;/a>, tells you how much &amp;ldquo;weight&amp;rdquo; each
outcome has in the universal wave function, which translates directly
into how likely you are to find yourself in that branch.&lt;/p>
&lt;p>Some worry that if everything happens, then nothing we do matters, as if
we&amp;rsquo;re passengers on a train of predetermined splits. But free will is
branch-relative. Inside your branch, you still make decisions, and those
decisions still cause real effects in that branch. The fact that other
versions of you are making different choices in other branches doesn&amp;rsquo;t
reduce your agency, instead, each version of you is a genuine
continuation of the original, exercising choice in their own storyline.&lt;/p>
&lt;p>This leads naturally to ethics. In Many-Worlds, your actions still
matter deeply. Not in some vague spiritual manner, but concretely and
practically. When you choose to help someone, you shape the future of
the branch in which you did so. There may be other branches in which you
didn&amp;rsquo;t, but that doesn&amp;rsquo;t erase the fact that, in this branch, real
people benefit from your action. The existence of other branches doesn&amp;rsquo;t
trivialize morality. In fact, it multiplies morality&amp;rsquo;s scope, as your
choices in this branch impact all future branches that claim this branch
as its ancestor.&lt;/p>
&lt;p>So probability, free will, and ethics all survive in Many-Worlds.
Probability is your uncertainty about which branch you will find
yourself in. Free will is your power to act within your branch. Ethics
is the recognition that, in each branch, your choices define the futures
that real people, real versions of you and everyone else, will live.&lt;/p>
&lt;h3 id="82-fiction-and-reality">&lt;strong>8.2 Fiction and Reality&lt;/strong>&lt;/h3>
&lt;p>One of the most unsettling implications of Many-Worlds is that, within
the laws of physics, every possible outcome actually happens somewhere.
There are deplorable worlds where the Nazis won World War II, Napoleon
triumphed at Waterloo, etc.&lt;/p>
&lt;p>But, again, fiction that violates the laws of physics, like
faster-than-light travel or dragons breathing fire by magic, doesn&amp;rsquo;t
happen. What does happen are all sequences of events that remain
consistent with quantum mechanics. The scope is vast beyond
comprehension, but it&amp;rsquo;s not unconstrained.&lt;/p>
&lt;p>This framework does lead to interesting observations. There are
universes in which what &lt;em>seems&lt;/em> like magic happens. There are worlds,
for example, where someone jumped from a skyscraper and successfully
flew in the air for 30 seconds due to an extraordinarily unlikely air
configuration.&lt;/p>
&lt;p>In each of these cases, what appears supernatural from inside those
branches, what seems like magic, is in reality just extraordinarily
unlikely coincidences. The laws of physics are never violated, and the
branches in which these events happen have an astronomically small
weight compared to the overwhelming number of &amp;ldquo;ordinary&amp;rdquo; branches in
which those events did not coincidentally align.&lt;/p>
&lt;h3 id="83-a-brief-explanation-of-quantum-computing">&lt;strong>8.3 A Brief Explanation of Quantum Computing&lt;/strong>&lt;/h3>
&lt;p>Ordinary computers are made out of millions of bits, which you can think
of as tiny switches that are either on (equal to 1) or off (equal to 0).&lt;/p>
&lt;p>Quantum computers are fundamentally different because they don&amp;rsquo;t operate
on bits, but on qubits. Qubits are quantum states that can be in
&lt;em>superpositions&lt;/em> of 0 and 1, meaning not just 0 and 1, but any
combination of the states 0 and 1 (as long as their respective weights
add up to 1), as explained in &lt;a href="#35-superposition">&lt;em>section 3.5&lt;/em>&lt;/a>.&lt;/p>
&lt;p>Qubits can be made out of many things, including photons, electrons,
atoms, etc. That&amp;rsquo;s why there are a lot of different approaches to
quantum computing, as different companies use different systems and
approaches.&lt;/p>
&lt;p>Now, people often make the mistake of saying that a quantum computer
works by &amp;ldquo;making the computations across many different parallel
universes at once.&amp;rdquo; It&amp;rsquo;s a nice metaphor, but that&amp;rsquo;s not how it works in
practice. The real source of quantum computing&amp;rsquo;s power is interference
between universes.&lt;/p>
&lt;p>When a quantum computer performs a computation, it creates a state of
superposition. By carefully arranging the computation, we can ensure
that in almost all branches, the wrong answers cancel out, while the
correct answer reinforces itself.&lt;/p>
&lt;p>You can compare quantum computing to creating waves in a pond: if you do
it badly, the ripples collide chaotically and nothing comes out of it.
However, if you do so with precision, you could get the waves to ripple
against each other in such a way that most cancel each other out and a
particular pattern, for example a circle, emerges. That&amp;rsquo;s what a quantum
algorithm is: a recipe for arranging interference across the different
branches of a superposition so that only the right answers survive.&lt;/p>
&lt;p>As for why many quantum computers need to be cooled at extraordinarily
low temperatures, that&amp;rsquo;s due to thermal noise. At nonzero temperature,
particles jiggle around, because heat drives movement. These random
excitations can knock a qubit out of its delicate quantum state, causing
decoherence or errors. Cooling reduces the energy available for these
unwanted excitations, making qubits more stable.&lt;/p>
&lt;figure>
&lt;img src="https://maxdesalle.com/wheeler.jpg" alt="" />
&lt;figcaption style="font-size: 75%; line-height:1.2; margin-top:0.25em;">John
Wheeler, legendary physicist and one of Everett's mentors.&lt;/figcaption>
&lt;/figure>
&lt;h2 id="9-conclusion">&lt;strong>9. Conclusion&lt;/strong>&lt;/h2>
&lt;p>Quantum mechanics is often described as the strangest theory in science.
But the real strangeness isn&amp;rsquo;t in the equations, it&amp;rsquo;s in how people have
historically resisted taking them seriously. For nearly a century,
physicists have added unnecessary collapse rules.&lt;/p>
&lt;p>As we've covered, following the Schrödinger equation and taking it
seriously, arrives at a breathtaking conclusion: reality is constantly
branching, splitting into worlds upon worlds. Every possibility
consistent with the laws of physics is realized somewhere. Every choice
you might make is played out in full.&lt;/p>
&lt;p>It means that there are countless versions of you, living out different
futures, and that miracles and tragedies, as unlikely as they seem,
happen in some branches.&lt;/p>
&lt;p>But it also gives us something profound. It shows us that reality is
richer than we ever could have imagined. The world we see is merely a
grain of sand in an immense structure described by quantum theory, an
endless tapestry of realities, woven by the Schrödinger equation. An
infinite, beautiful reality.&lt;/p></description></item><item><title>In Defense of Growth and Capitalism</title><link>https://maxdesalle.com/in-defense-of-growth-and-capitalism/</link><pubDate>Mon, 10 Jul 2023 00:00:00 +0000</pubDate><guid>https://maxdesalle.com/in-defense-of-growth-and-capitalism/</guid><description>&lt;figure>
&lt;img src="https://maxdesalle.com/wright-first-airplane.jpg" alt="" />
&lt;figcaption style="font-size: 75%">The &lt;a href="https://en.wikipedia.org/wiki/Wright_Flyer">Wright Flyer&lt;/a>, which made the first airplane flight in 1903.&lt;/figcaption>
&lt;/figure>
&lt;hr>
&lt;blockquote>
&lt;p>&lt;em>&amp;ldquo;Degrowth is an idea that critiques the global capitalist system which pursues growth at all costs, causing human exploitation and environmental destruction.&lt;/em>&lt;/p>
&lt;p>&lt;em>The degrowth movement of activists and researchers advocates for societies that prioritize social and ecological well-being instead of corporate profits, over-production and excess consumption.&lt;/em>&lt;/p>
&lt;p>&lt;em>This requires radical redistribution, reduction in the material size of the global economy, and a shift in common values towards care, solidarity and autonomy.&lt;/em>&lt;/p>
&lt;p>&lt;em>Degrowth means transforming societies to ensure environmental justice and a good life for all within planetary boundaries.&amp;rdquo;&lt;/em>&lt;/p>
&lt;p>— &lt;a href="https://web.archive.org/web/20240715135439/https://degrowth.info/degrowth">degrowth.info&lt;/a>&lt;/p>
&lt;/blockquote>
&lt;hr>
&lt;h2 id="introduction">Introduction&lt;/h2>
&lt;p>The core ideology behind Degrowth is that we should stop in our tracks, turn back the clock, and revert to a time where living conditions were depressingly poor, to somehow &amp;lsquo;fix&amp;rsquo; climate change. It&amp;rsquo;s a perspective that looks down on progress, even deems it unwelcome.&lt;/p>
&lt;p>This vision of society celebrates poverty as a badge of honor, and views restrictions on freedom as a positive, essential even. Within this worldview, children, who are nothing short of miracles breathing life into our world, &lt;a href="https://web.archive.org/web/20230924120151/https://foreignpolicy.com/2015/11/03/a-brutality-born-of-helplessness-china-one-child-policy-western-population-bomb-fearmongering//">are viewed as liabilities&lt;/a>, exacerbating what they perceive as an overpopulation crisis.&lt;/p>
&lt;p>Degrowth calls for a centralized power to dictate where progress can and cannot take place, effectively deciding who receives resources and who does not. It&amp;rsquo;s a system that inherently demands compliance, strongly resembling communism.&lt;/p>
&lt;p>Some Degrowth advocates pretend that it&amp;rsquo;s possible to degrow the economy without centralized power and authoritarian tactics, because &amp;ldquo;everyone would willingly participate&amp;rdquo;. We will go over this argument later in this piece, but for now, the fact that I&amp;rsquo;m writing this already proves the contrary.&lt;/p>
&lt;p>Degrowth and authoritarianism, dictatorships, even world government, are all part of the same melody. Because if even one subset of the world&amp;rsquo;s population doesn&amp;rsquo;t participate and continues growing, that could cause sufficient pollution to keep climate change going on.&lt;/p>
&lt;p>Advocates of Degrowth dress up their rhetoric with appealing terms like &amp;lsquo;harmony&amp;rsquo;, &amp;lsquo;well-being&amp;rsquo;, and &amp;lsquo;sustainability&amp;rsquo;. But don&amp;rsquo;t be duped. Their intentions may be well-meaning, but the aftermath of degrowth would be catastrophic.&lt;/p>
&lt;p>When the pie isn&amp;rsquo;t getting larger, my share getting larger means yours is getting smaller, opening the door towards conflict. Corruption, violence, and oppression prevail in &lt;s>zero-sum&lt;/s> negative-sum societies – a stark contrast with &amp;ldquo;harmony&amp;rdquo;, &amp;ldquo;well-being&amp;rdquo;, and &amp;ldquo;sustainability&amp;rdquo;.&lt;/p>
&lt;h2 id="no-overconsumption-or-overproduction">No overconsumption or overproduction&lt;/h2>
&lt;p>A common critique of Capitalism is that it leads to overconsumption and overproduction. But that is evidently wrong.&lt;/p>
&lt;p>Of course, there are instances where true overconsumption transpires. Like when you&amp;rsquo;re at a restaurant and you order more than you can eat, resulting in wasted food. But this form of wastage isn&amp;rsquo;t applauded by Capitalism, it’s penalized.&lt;/p>
&lt;p>You&amp;rsquo;ve wasted resources – you&amp;rsquo;ve lost money. If you&amp;rsquo;d been more attuned to your actual appetite, you&amp;rsquo;d have ordered wisely, saved money, and still been perfectly sated. Hence, Capitalism subtly nudges you towards precise consumption - not more, not less.&lt;/p>
&lt;p>The same applies to corporations. If a business overproduces, the surplus stock piles up, unsold. This is a clear cut loss, a monetary penalty, prompting them to match production to the demand. Capitalism, in essence, incentivizes companies to manufacture what the market necessitates, no more, no less.&lt;/p>
&lt;p>Those subscribing to the Degrowth doctrine often misinterpret the utility of products, suggesting that several commodities lack intrinsic value and, hence, shouldn&amp;rsquo;t be produced. But the notion of utility is subjective.&lt;/p>
&lt;p>The market responds to consumer demand. If someone is willing to pay money for a product, it is, by definition, useful to them. If the product isn&amp;rsquo;t beneficial to anyone, it won&amp;rsquo;t find a buyer, inflicting financial losses on the company, potentially pushing it to the brink of bankruptcy.&lt;/p>
&lt;p>In case of underproduction, meaning when a company is unable to meet the demands of the market in terms of product supply, the market directly incentivizes a competitor to emerge and offer a competing product, through the market&amp;rsquo;s unmet demand.&lt;/p>
&lt;p>Because of these reasons, it&amp;rsquo;s fair to conclude that Capitalism denotes &amp;lsquo;right-sized&amp;rsquo; consumption and production. Whenever there&amp;rsquo;s a misstep, a tilt towards the excess or the insufficient, the unforgiving but fair hand of the market steps in to administer a course correction.&lt;/p>
&lt;hr>
&lt;figure>
&lt;img src="https://maxdesalle.com/worker-empire-state-building.jpg" alt="" />
&lt;figcaption style="font-size: 75%">Picture by &lt;a href="https://en.wikipedia.org/wiki/Lewis_Hine">Lewis Hine&lt;/a> taken in 1931, of a worker during the construction of the Empire State Building.&lt;/figcaption>
&lt;/figure>
&lt;hr>
&lt;h2 id="no-one-would-willingly-participate-in-degrowth">No one would willingly participate in Degrowth&lt;/h2>
&lt;p>A common theme among alternatives to Capitalism is their lack of pragmatism. The critique that is often used against the argument that Degrowth requires centralized power, is that the population will somehow willingly take part in it.&lt;/p>
&lt;p>As if nations like China, India, and Nigeria would willingly limit their growth, and settle for poor living conditions, all because of climate change? They wouldn&amp;rsquo;t, and frankly, if we were in their shoes, we would feel exactly the same way. Our ancestors lived incredibly poorly compared to how we live now, after all.&lt;/p>
&lt;p>But even if they aren&amp;rsquo;t in the shoes of third-world countries, the vast majority of people continue living as they have always done. Prior to the pandemic, despite all the climate protests, the number of passengers &lt;a href="https://web.archive.org/web/20240204141326/https://www.iea.org/data-and-statistics/charts/world-air-passenger-traffic-evolution-1980-2020">flying globally&lt;/a> and &lt;a href="https://web.archive.org/web/20240301064523/https://cruisemarketwatch.com/growth/">travelling on cruises&lt;/a> only increased year after year.&lt;/p>
&lt;p>While some may vocally support Degrowth, it&amp;rsquo;s only rarely reflected in their actions. Degrowth for thee, not for me.&lt;/p>
&lt;p>This also applies to governments, who have been attending COP conferences to discuss climate change solutions and virtue signal about their &amp;ldquo;initiatives&amp;rdquo; since 1995, while carbon emissions &lt;a href="https://web.archive.org/web/20240503175507/https://ourworldindata.org/grapher/annual-co2-emissions-per-country?country=~OWID_WRL">have only been increasing&lt;/a> since then.&lt;/p>
&lt;p>Interestingly, in the past ten years, they have &lt;a href="https://web.archive.org/web/20240503180641/https://ourworldindata.org/grapher/annual-co2-emissions-per-country?time=2012..latest&amp;amp;country=USA~CHN">remained stable or very slightly decreased for the USA, a capitalistic country, whereas they have increased for China, a socialist country&lt;/a>. And &lt;a href="https://web.archive.org/web/20240503180805/https://www.noahpinion.blog/p/no-the-us-didnt-outsource-our-carbon">the USA didn&amp;rsquo;t just outsource its carbon emissions to China&lt;/a>, like it&amp;rsquo;s commonly believed.&lt;/p>
&lt;p>Countries like China are not game theoretically incentivized to care about climate change. They are incentivized to grow as much as possible. We wouldn&amp;rsquo;t behave any differently if we were in their shoes, and you can protest as much as you like, China won&amp;rsquo;t stop growing.&lt;/p>
&lt;h2 id="happiness-is-not-a-valid-argument">Happiness is not a valid argument&lt;/h2>
&lt;p>Degrowth advocates often point out that economic growth does not necessarily translate into happiness.&lt;/p>
&lt;p>This might seem like a valid argument at first sight, but it&amp;rsquo;s not. Economic decline doesn&amp;rsquo;t &amp;ldquo;necessarily&amp;rdquo; translate into happiness either.&lt;/p>
&lt;p>The truth is that there is no way to reliably know what does or does not increase happiness, given there is no way to reliably measure happiness in the first place.&lt;/p>
&lt;p>Self-reporting, which is often used by studies supposedly &amp;ldquo;measuring&amp;rdquo; happiness, is very much prone to cultural standards.&lt;/p>
&lt;p>Finland, often cited by studies supposedly measuring happiness as one of the happiest countries in the world, has anecdotally also &lt;a href="https://web.archive.org/web/20231017045526/https://www.washingtonpost.com/wp-srv/world/suiciderate.html">a relatively high suicide rate&lt;/a>. One would expect happy people to not kill themselves, and yet&amp;hellip;&lt;/p>
&lt;p>Different cultures have different definitions of happiness, and within these cultures, definitions of happiness vary too. What happiness may mean for Degrowth proponents may not be what it means for me.&lt;/p>
&lt;p>A hedonist may define happiness as finding pleasure in the little things, while a Buddhist may define it as being at peace. Because the definitions for happiness vary so much, it&amp;rsquo;s incredibly hard, if not impossible, to create a system that optimizes for happiness.&lt;/p>
&lt;p>The conclusion is simple: happiness is not a valid argument in this debate.&lt;/p>
&lt;p>However, what is a valid argument, is that there is &lt;a href="https://web.archive.org/web/20240503182345/https://twitter.com/arjunkhemani/status/1786327595786875311">there is absolutely no virtue in poverty&lt;/a> and that it inevitably leads to unhappiness.&lt;/p>
&lt;hr>
&lt;figure>
&lt;img src="https://maxdesalle.com/hoover-dam.jpeg" alt="" />
&lt;figcaption style="font-size: 75%">Picture taken during the construction of the &lt;a href="https://en.wikipedia.org/wiki/Hoover_Dam">Hoover Dam&lt;/a> in the 1930s.&lt;/figcaption>
&lt;/figure>
&lt;hr>
&lt;h2 id="the-overpopulation-myth">The overpopulation myth&lt;/h2>
&lt;p>A popular meme in today&amp;rsquo;s society is that we are too many on the planet. This is apparently so-called &amp;ldquo;common sense&amp;rdquo;. The argument often used to defend this misconception is that there are supposedly not enough resources for everyone.&lt;/p>
&lt;p>But that misses the point. The issue isn&amp;rsquo;t a deficit of physical resources; it&amp;rsquo;s a shortage of knowledge.&lt;/p>
&lt;p>Consider Uranium, for instance. Before we understood its potential, it was just another raw material buried deep in the earth. The physical resource existed, but our ignorance rendered it useless.&lt;/p>
&lt;p>Then, science moved forward, technology evolved, and suddenly we found ourselves with a powerful source of energy. Just like that, Uranium was no longer an inert element but a real game-changer for the world.&lt;/p>
&lt;p>We&amp;rsquo;re not limited by what we have, we&amp;rsquo;re only limited by what we know.&lt;/p>
&lt;p>There&amp;rsquo;s a myriad of undiscovered methods to utilize existing resources to generate more energy, food, and other necessities. Similarly, there&amp;rsquo;s an abundance of untapped potential to enhance our present resource utilization strategies.&lt;/p>
&lt;p>This is where the population doom-mongers falter, assuming that our usage and efficiency of resources are static. But given the same physical resources we possess today, we can generate more food, water, energy, and so on tomorrow.&lt;/p>
&lt;p>In fact, a larger population would result in more demand for food, water, energy, and other basic needs, resulting in an increased incentive to invent new ways to solve these problems (or improve current ones). The market adapts itself to supply and demand in real time, one of the beautiful aspects of our capitalistic system.&lt;/p>
&lt;p>More people on the planet means more humans who get the chance of experiencing the beauty of life, more creative minds, more inventions, more technological breakthroughs, etc. This a net positive for the world! It&amp;rsquo;s wonderful.&lt;/p>
&lt;blockquote>
&lt;p>Let&amp;rsquo;s not forget &lt;a href="https://web.archive.org/web/20240205185228/https://waitbutwhy.com/2015/03/7-3-billion-people-one-building.html">we could theoretically store the entire human population in a cube of side 1.07km&lt;/a>, there is a lot of room on the planet.&lt;/p>
&lt;/blockquote>
&lt;h2 id="capitalism-isnt-burning-the-planet">Capitalism isn&amp;rsquo;t burning the planet&lt;/h2>
&lt;p>Capitalism cannot burn the planet, it&amp;rsquo;s an economic system. Nor is the planet burning, the climate is changing.&lt;/p>
&lt;p>The argument often used against Capitalism in this situation is the fact that it creates incentives for people to care about their benefit in the short-term, but at a long-term detriment for the climate.&lt;/p>
&lt;p>That may be right, but by that same argument, it should also incentivize people to build technologies that will counter climate change nowadays, as there is demand for it. That&amp;rsquo;s also what is happening. Tesla and hundreds of climate tech companies being an example of that.&lt;/p>
&lt;p>Too often, people also forget that Capitalism led to the creation of nuclear power plants, one of the best solutions to prevent climate change. Except the left has for decades been fully against it, citing irrational safety risks.&lt;/p>
&lt;blockquote>
&lt;p>Those citing the Chernobyl and Fukushima disasters to justify the safety risks actually prove the opposite: in both cases, bad human decision making was the cause. The plant operators at Chernobyl &lt;a href="https://web.archive.org/web/20240627154011/https://world-nuclear.org/information-library/appendices/chernobyl-accident-appendix-1-sequence-of-events">violated safety protocols&lt;/a>, leading to a catastrophic explosion.&lt;/p>
&lt;p>As for Fukushima, the plant &lt;a href="https://web.archive.org/web/20240527220923/https://carnegieendowment.org/research/2012/03/why-fukushima-was-preventable?lang=en">was built in a region at risk of tsunamis&lt;/a>, making the accident entirely preventable. Also worth noting both power plants were built in the early 70s, over fifty years ago. The technology has evolved tremendously since then.&lt;/p>
&lt;p>As for nuclear waste, there has been a lot of exaggeration regarding how problematic it is. &lt;a href="https://web.archive.org/web/20240602064457/https://www.energy.gov/ne/articles/5-fast-facts-about-spent-nuclear-fuel">You could store all of the nuclear waste generated by the US on a yearly basis, in less than half the volume of an Olympic-sized swimming pool&lt;/a>. The nuclear plants generating that waste power 70 million homes in the US.&lt;/p>
&lt;p>It&amp;rsquo;s objectively a reasonable tradeoff. And while we currently have no idea on how to recycle the most toxic nuclear waste, we will inevitably eventually find out how to do so. There isn&amp;rsquo;t a law of physics preventing it, after all.&lt;/p>
&lt;/blockquote>
&lt;p>Due to the paranoia of &amp;ldquo;environmentalists&amp;rdquo; against nuclear energy, governments made it incredibly hard to build new power plants, &lt;a href="https://web.archive.org/web/20240514052525/https://www.cnbc.com/2023/04/18/germany-shuts-down-last-nuclear-power-plants-some-scientists-aghast.html">even closing ones which functioned perfectly well&lt;/a>.&lt;/p>
&lt;p>&lt;a href="https://web.archive.org/web/20240619051942/https://ifp.org/web/20240619051942/https://ifp.org/nuclear-power-plant-construction-costs/">It&amp;rsquo;s now so expensive to build a nuclear power plant due to all the bureaucratic processes surrounding it&lt;/a>, that it&amp;rsquo;s nearly not even profitable anymore, and takes a decade or more for it to start producing energy. &amp;ldquo;Environmentalists&amp;rdquo; are at fault here, not Capitalism.&lt;/p>
&lt;p>The irony being that the ones who created this terrible situation (&amp;ldquo;environmentalists&amp;rdquo;) are the ones now blaming the system that brought the solution (Capitalism) for causing climate change.&lt;/p>
&lt;p>Instead, &amp;ldquo;environmentalists&amp;rdquo; have been pushing wind and solar energy, which only work when there is wind and sun respectively. What happens at night, when there is no wind? No electricity?&lt;/p>
&lt;p>Also worth mentioning that &lt;a href="https://web.archive.org/web/20240221111727/https://en.wikipedia.org/wiki/Aral_Sea#/media/File:AralSea1989_2014.jpg">communism wasn&amp;rsquo;t kind towards the environment either&lt;/a>, to say the least.&lt;/p>
&lt;p>The point being that climate change isn&amp;rsquo;t an unsolvable problem. It&amp;rsquo;s a technological challenge, and we&amp;rsquo;re fully capable of tackling it. We already have several tools at our disposal like nuclear energy, and in the meantime, hundreds of new solutions are being developed to help prevent and counter it.&lt;/p>
&lt;hr>
&lt;figure>
&lt;img src="https://maxdesalle.com/first-helicopter.jpg" alt="" />
&lt;figcaption style="font-size: 75%">Early prototype of the &lt;a href="https://en.wikipedia.org/wiki/Vought-Sikorsky_VS-300">Vought-Sikorsky VS-300&lt;/a> in 1939, the first viable American helicopter, which pioneered the rotor configuration used by most helicopters today.&lt;/figcaption>
&lt;/figure>
&lt;hr>
&lt;h2 id="wealth-inequality-isnt-a-problem">Wealth inequality isn&amp;rsquo;t a problem&lt;/h2>
&lt;p>Another point that Degrowth proponents like to bring into light is the rising wealth inequality, which they attribute to our growth-oriented economy.&lt;/p>
&lt;p>However, wealth inequality is not a problem. Wealth equality is a synonym for equality of outcome, which on top of having communistic undertone to it, is simply evil. If someone works both harder and smarter than I do, creating more wealth for society, it&amp;rsquo;s only fair that they should earn more.&lt;/p>
&lt;p>The real problem is not wealth inequality, it&amp;rsquo;s inequality of opportunity. And that problem is independent of whether or not a society is growing or declining. Or is it?&lt;/p>
&lt;p>There is in fact an argument to be made that growth and technological innovation are the solution for the opportunity inequality problem.&lt;/p>
&lt;p>The printing press revolutionized how knowledge was disseminated, transforming it from a privilege to a right. The advent of the internet took that democratization a step further, making information ubiquitously accessible and enabling global communication. It birthed the era of remote work.&lt;/p>
&lt;p>The rise of crypto will equalize the playing field in the financial world, massively reducing financial inequality of opportunity. Someone in Africa can use the same crypto lending protocol to have access to cash like a hedge fund manager can in Switzerland.&lt;/p>
&lt;p>As for AR/VR, it is dissolving the constraints of physical location. As these developments continue, we get closer and closer to a world where an individual in India will have an equal shot at the same job opportunities as their counterpart in the US. Bit by bit, technology is breaking down barriers and creating a more equitable landscape.&lt;/p>
&lt;p>And the issue of wealth inequality, even if we were to accept it as a legitimate problem, has been progressively diminishing over the past several centuries.&lt;/p>
&lt;p>Just compare the average peasant&amp;rsquo;s life during Louis XIV&amp;rsquo;s reign, which was made out of hardship and poverty, to the opulence of the royal court at Versailles.&lt;/p>
&lt;p>Peasants (the majority of the population) &lt;a href="https://web.archive.org/web/20200225002946/http://www.fiatlux-day.org/euro/period_2/chapter_18/reading_18-6.html">mostly ate bread, about 40% owned little to not land&lt;/a>, and they typically lived in &lt;a href="https://web.archive.org/web/20240225073756/https://sites.udel.edu/britlitwiki/social-and-family-life-in-the-late17th-early-18th-centuries/">one or two room houses&lt;/a> in rural areas and their lifestyle was mostly agrarian. They sometimes shared their living space with their animals, and faced starvation in case of a poor harvest. Parents and children slept in the same room.&lt;/p>
&lt;p>In contrast, Louis XIV ordered the construction of the Palais de Versailles, with hundreds of luxurious rooms, magnificent gardens with fountains, and countless paintings and statues. He had jewelry, clothing made out of delicate fabrics like silk and velvet, without forgetting the wigs of course. He had access to the finest meats, fruits, vegetables, wines, etc. And he could travel anywhere he wanted across France with the most comfortable carriages and the best horses.&lt;/p>
&lt;p>The average peasant, meaning the vast majority of the population, had none of that. And that&amp;rsquo;s without mentioning the nearly &lt;a href="https://web.archive.org/web/20240301145339/https://ourworldindata.org/child-mortality">48% risk of infant mortality at that time&lt;/a>. If you had ten children, about five would die before reaching age 15.&lt;/p>
&lt;p>Today, Jeff Bezos may be stratospherically wealthier than you in terms of nominal wealth, the digits showing up in your bank account. But when it comes to material wealth, the disparity isn&amp;rsquo;t so wide.&lt;/p>
&lt;p>You probably have a smartphone, just like Bezos has. You probably have a car, just like Bezos has. You probably have heating in your home, just like Bezos&amp;rsquo; has. You probably don&amp;rsquo;t have a yacht yet, like he has, or a private jet, but these will come in due time as the costs of these technologies go down. He will likely also get a better healthcare experience if he catches a disease, but the core treatment will probably be very similar to what you would get if you caught that disease.&lt;/p>
&lt;p>Some will point towards developing countries where there is still extreme poverty. But the problem in that case is extreme poverty, a form of inequality of opportunity, not wealth inequality. You could have more wealth inequality, with no extreme poverty.&lt;/p>
&lt;h2 id="degrowth-is-very-dangerous-geopolitically">Degrowth is very dangerous geopolitically&lt;/h2>
&lt;p>Something which is rarely (never) covered by Degrowth advocates is the geopolitical risks that it brings to the table.&lt;/p>
&lt;p>This is where the naivety of some of the Degrowth advocates really comes into light, as they propose the idea of slowing down the economies of first-world countries to allow third-world countries to continue growing.&lt;/p>
&lt;p>But if a foreign power doesn&amp;rsquo;t limit its growth, while your country does, that foreign power&amp;rsquo;s military will grow stronger compared to yours, posing a risk to national security.&lt;/p>
&lt;p>While it&amp;rsquo;s been a while, thankfully, since the West has been at actual war (leaving the proxy wars and cold wars aside for a minute), this isn&amp;rsquo;t a fairy tale world.&lt;/p>
&lt;p>Forget ‘harmony’, ‘well-being’, and ‘sustainability’. The iron rule of history is the rule of violence. The only logic tyrants understand is the logic of violence, and without a strong defense, the West would get immediately invaded.&lt;/p>
&lt;p>Additionally, being a pacifist doesn&amp;rsquo;t mean that you shouldn&amp;rsquo;t defend yourself against the enemy, on the contrary. It&amp;rsquo;s not about being &amp;ldquo;peaceful&amp;rdquo;, it&amp;rsquo;s about protecting peace. If that requires violence because others threaten peace, then so be it.&lt;/p>
&lt;p>Having a strong defense also unironically acts as a war deterrent, as the enemy will be less likely to attack you. We should invest more in defense, not less.&lt;/p>
&lt;hr>
&lt;figure>
&lt;img src="https://maxdesalle.com/eniac-first-computer.jpg" alt="" />
&lt;figcaption style="font-size: 75%">Image taken around 1950 of &lt;a href="https://en.wikipedia.org/wiki/ENIAC">ENIAC&lt;/a>, the first programmable, electronic, general-purpose digital computer.&lt;/figcaption>
&lt;/figure>
&lt;hr>
&lt;h2 id="communist-theres-nothing-stopping-you">Communist? There&amp;rsquo;s nothing stopping you&lt;/h2>
&lt;p>Contrary to communism, where you are forced to conform and cannot be a Capitalist, there is nothing stopping you from being a communist in a Capitalist country.&lt;/p>
&lt;p>The hypocrisy of the extreme left on that front is unbearable to say the least. If you are communist, embody that ideology and live in a commune. Have some skin in the game.&lt;/p>
&lt;p>It&amp;rsquo;s bad ethics to criticize a system and state that it&amp;rsquo;s the root of all evil, while simulataneously profiting from it and keep participating in it. You have the choice. If Capitalism is really that bad, go live in a commune.&lt;/p>
&lt;p>People have done it in the past, though, and weirdly enough (please pardon my irony), they no longer do. &lt;a href="https://web.archive.org/web/20240424123045/https://en.wikipedia.org/wiki/Kibbutz">The Kibbutzim&lt;/a> are an example of that. Up until the 1970s, &lt;a href="https://web.archive.org/web/20240424123045/https://en.wikipedia.org/wiki/Kibbutz#Communal_life">they were essentially communist&lt;/a>.&lt;/p>
&lt;p>Needless to say the majority them since then have become privatized and are fully capitalistic nowadays. They had to, &lt;a href="https://web.archive.org/web/20240424123045/https://en.wikipedia.org/wiki/Kibbutz#Legal_reforms_after_privatisation">in order to prevent financial collapse&lt;/a>. It turns out that ignoring economic realities is unsustainable.&lt;/p>
&lt;p>If your alternative to the present system is really better, try it. Capitalism grants you that liberty.&lt;/p>
&lt;h2 id="the-us-isnt-proof-that-capitalism-doesnt-work">The US isn&amp;rsquo;t proof that Capitalism doesn&amp;rsquo;t work&lt;/h2>
&lt;p>When discussing the benefits of privatizing healthcare and education, critics often point to the issues in the US as evidence that privatization fails. However, the reality is that the US isn’t a true open market when it comes to both healthcare and education.&lt;/p>
&lt;p>Taking medication as an example, we&amp;rsquo;ve all heard the stories of certain drugs reaching absurd prices in the US, people having to start GoFundMe campaigns to pay for their healthcare procedures, etc.&lt;/p>
&lt;p>But if the market were truly open, wouldn’t a Mexican company, for example, step in to offer a similar drug at a lower price when an American company charges too much?&lt;/p>
&lt;p>The fact that this doesn’t happen is clear evidence that the US pharmaceutical and healthcare markets are not truly free markets. Instead, they are heavily (and badly) regulated, with big pharmaceutical companies shielded from fair competition by government policies.&lt;/p>
&lt;p>Regarding education, the absurdity of government tuition loans is another example. The government has always been poor at allocating capital because it lacks skin in the game.&lt;/p>
&lt;p>Unlike banks, which must carefully assess a student’s potential earnings after graduation and whether the student is likely to complete their studies, because the bank doesn’t want to go bankrupt, the government can lose money indefinitely.&lt;/p>
&lt;p>If necessary, it can simply print more money, effectively sneakily taxing the population through inflation. It’s no surprise that US universities charge outrageous tuition fees; the government will cover the costs anyway.&lt;/p>
&lt;p>Without government-backed tuition loans, universities would be forced to lower their prices as no one except the ultra rich would be able to afford attendance.&lt;/p>
&lt;p>In both cases, the inefficiencies in these markets aren’t due to Capitalism failing but rather due to government intervention.&lt;/p>
&lt;hr>
&lt;figure>
&lt;img src="https://maxdesalle.com/shinkansen.jpg" alt="" />
&lt;figcaption style="font-size: 75%">First full-length test ride in 1964 of the &lt;a href="https://web.archive.org/web/20140904052921/https://www.nytimes.com/2014/08/29/upshot/fifty-years-ago-and-today-japan-blazes-trails-with-trains.html">Shinkansen&lt;/a>, the world's first bullet train.&lt;/figcaption>
&lt;/figure>
&lt;hr>
&lt;h2 id="conclusion">Conclusion&lt;/h2>
&lt;p>Climate change is real, and it&amp;rsquo;s a problem we can&amp;rsquo;t ignore. But every problem that falls within the realm of physics has a solution. Degrowth isn&amp;rsquo;t that solution, though. It&amp;rsquo;s an attempt to sidestep the issue, to throw in the towel. It&amp;rsquo;s not a solution, it&amp;rsquo;s an admission of defeat.&lt;/p>
&lt;p>If Degrowth isn&amp;rsquo;t the solution to climate change, then what is? Growth.&lt;/p>
&lt;p>Limiting our growth, or even regressing, will only slow down technological progress which will ultimately prevent us from finding solutions to address climate change. Growth is the only way out.&lt;/p>
&lt;p>Instead of holding placards on the streets, start a company that pioneers new aeropropulsion systems that significantly cut carbon emissions. Or perhaps, devise an effective strategy to prevent forest fires. Or invent new technologies that safeguard people from the dangers caused by natural disasters.&lt;/p>
&lt;p>The real solution is in the realm of building, inventing, and innovating. It&amp;rsquo;s about embracing our human capacity for creativity and exceptionalism. It&amp;rsquo;s about facing the challenge of climate change head-on and conquering it, not with regression, but with progression.&lt;/p>
&lt;p>For, in the grand scheme of things, we are merely at the beginning of our journey towards infinity, and will always be. There are countless new problems waiting for us, regressing now is not an option.&lt;/p></description></item></channel></rss>