PRCY Coin
100% Private and Secure

PRCY is a privacy blockchain with a focus on security, scalability and total privacy.
The PRCY protocol has been built in a fully anonymous staking coin and payment system with a trustless governance structure, based upon the latest privacy technologies.

Get the latestWallet versionGet the latestWhitepaper
PRCY Coin On Stackofstake

Dear #PRCY Family, As of today we are listed on StackOfStake 🚀🚀🤑 StackOfStake is a Staking and Masternodes investment platform.So, from now you can Stake PRCY Coin in a pool, no minimum or maximum. and you don’t have to have…

PRCY Coin listed on Swapzone

Dear #PRCY Community PRCY Coin is now listed on Swapzone.io Our community where asking them to list us, and they listen )) For support or any other questions, please ask them in them Telegram chat (https://t.me/swapzoneio) Swapzone.io is a NON…

PRCY Coin new partner CCTIP.IO

Dear PRCY Family, we are so glad to announce our brand new partnership with Cctip.io What is CCTip ? CCTip is committed to create a safe, convenient and socialized wallet, providing with a best solution for simply sending and managing…

PRCYcoin on Newsbit

Check the latest article released by Newsbit.nl

Privacy first

Reliability

Big Partnerships

Usability

Our Cryptocurrency Vision

Cryptocurrencies are becoming a part of our everyday life; PRCY aims to provide the best tools to be able to keep and use funds in the best possible way, without losing your privacy. No one wants some prying eyes to have access to information such as: economic wealth, transactions, payment information, or any other private information for that matter.
Based on these ideas we created PRCY, a completely anonymous cryptocurrency. We invest heavily in the research and development of new functions and in the signing of new partnerships.
We believe that a winning project needs a solid community on which to rely, and from which new ideas emerge to improve our project everyday.

Whitepaper

Passive Earnings

PRCY offers several passive income options to choose from.

Passive Earnings

PRCY offers several passive incomes options to choose.

Roadmap

This timeline details our funding and
development goals.

  • October 2020

    Creation of the idea of
    Privacy project

  • November 2020

    Team organization

  • December 2020

    Build and launch of PRCY
    blockchain infrastructure
    Funding war chest

  • Late December 2020

    PRCY Retention Plan

  • Q1.2021

    Incentive program
    Open Community
    QT Wallet release
    Stex exchange listing
    Hotbit exchange listing
    SWFT exchange listing

  • Q2.2021

    QT UX/UI wallet improvements
    Web Wallet
    Mobile Wallet development
    WhitePaper
    Multicoin mobile wallet integration
    TxBit.io listing
    On-Boarding new Devs
    Partnerships development
    Wrapping coin on Ethereum smartchain
    Wrapping coin on Binance smartchain

  • Q3.2021

    Strong marketing campaign
    Trading competition
    Partnership development R&D(POS service provider, Tips system for messaging app)
    Native mobile wallet release

  • Q4.2021

    Wrapping to other chains

    • Polkadot
    • Ethereum

  • 2022

    Expanding privacy use case partnerships
    Tier 1 exchange listing
    Wrapping on multiple chains
    Smart contract on a full privacy coin (R&D)
    NFT on full privacy coin (R&D)

PRCY Coin (PRCY)
2.12%
$ 0.727956
$ 0.015433
⇣ 0.689172
18 Sep
⇡ 0.734864

Do you have question?

Take a look at our frequently updated Knowledge base.
You can find informations about our blockchain specifications, how to run masternodes, or setup your mobile or desktop wallet, run a PoA miner, choose the best exchange and so many other usefull informations.

3

Masternodes Services

10

Exchanges

14

Team Members

RingCT or “Ring Confidential Transaction” is a way of mixing in a real transaction with a predetermined number of fake transactions The Ring size determines the number of additional fake transactions that are added This means that the actual transaction is hidden within a mixture of fake transactions and thus the true transaction and its amount are much harder to discern.

Bulletproofs are short non interactive zero knowledge proofs that require no trusted setup A Bulletproof can be used to convince a verifier that an encrypted plaintext is well formed For example, prove that an encrypted number is in a given range, without  revealing anything else about the number Compared to SNARKs, Bulletproofs require no trusted setup However, verifying a  Bulletproof is more time consuming than verifying a SNARK proof.

PRCY uses a dual key system to provide stealth addresses to obfuscate addresses. A public address is derived from a private view spend key pair. A public address can contain optionally payment ID, which is usually used by exchanges.
PRCY uses the EC secp256k1 curve to derive public keys from corresponding private keys.

The short answer is that these 12 or 24 words are what you get when you translate from binary (the language computers use,  consisting of 1’s and 0’s) into the language that you can understand, recognize, and (perhaps most importantly) remember. Cryptocurrency is a purely digital fortress of math. It would be strange and difficult if you had to read, copy, or type a string of 256 ones and zeros as your private key to claim ownership of some amount of crypto.

To make things easier and safer for all users, a standard system was developed with security in mind, known as BIP-39, to  conveniently provide you with a set of words, called your mnemonic phrase or mnemonic seed (both names can be used  interchangeably).

Ring CT

RingCT or “Ring Confidential Transaction” is a way of mixing in a real transaction with a predetermined number of fake transactions The Ring size determines the number of additional fake transactions that are added This means that the actual transaction is hidden within a mixture of fake transactions and thus the true transaction and its amount are much harder to discern.

Bulletproofs

Bulletproofs are short non interactive zero knowledge proofs that require no trusted setup A Bulletproof can be used to convince a verifier that an encrypted plaintext is well formed For example, prove that an encrypted number is in a given range, without revealing anything else about the number Compared to SNARKs, Bulletproofs require no trusted setup However, verifying a Bulletproof is more time consuming than verifying a SNARK proof.

Dual Key System

PRCY uses a dual key system to provide stealth addresses to obfuscate addresses. A public address is derived from a private view spend key pair. A public address can contain optionally payment ID, which is usually used by exchanges.PRCY uses the EC secp256k1 curve to derive public keys from corresponding private keys.

BIP-39

The short answer is that these 12 or 24 words are what you get when you translate from binary (the language computers use, consisting of 1’s and 0’s) into the language that you can understand, recognize, and (perhaps most importantly) remember. Cryptocurrency is a purely digital fortress of math. It would be strange and difficult if you had to read, copy, or type a string of 256 ones and zeros as your private key to claim ownership of some amount of crypto.To make things easier and safer for all users, a standard system was developed with security in mind, known as BIP-39, to conveniently provide you with a set of words, called your mnemonic phrase or mnemonic seed (both names can be used interchangeably).