Private Zcash Wallet

With Shielded you can send private transactions, exchange and store your ZEC directly on your Android device.

Support has been deprecated

Shielded Guarda for ZCash

Shielded Guarda app brings the benefits of privacy and transactional security. It also gives you the opportunity to store your ZEС, send private transactions and exchange directly on your Android device.

Guarda shielded presentation Guarda shielded presentation Guarda shielded presentation Guarda shielded presentation Guarda shielded presentation

In collaboration with ZCash Foundation, Guarda Wallet team have created a lightweight, simple, open-source, and non-custodial Shielded Wallet especially for ZEC, supporting both t and z-addresses.

ZEC has two types of addresses: z-address and t-address. While the z-address uses Zero-knowledge proof and other ways to protect transfer data, the t-address is a public address (similar to the BTC address).

Make a Shielded Zcash transaction
Guarda Tutorial

Guarda Wallet team was the first to receive a ZCash Foundation grant to create an open-source wallet. Shielded App for android went live on the mainnet in June 2019, and has been tested and improved with the participation of Zcash community and Guarda developers.

Shielded Guarda interface has been designed to be as simple as possible because it was made especially for ZEC.

Get started

Store, send, receive, exchange and buy crypto with Guarda Wallet. Manage your assets staying in full control of the process.

Shielded Zcash Google Play

ZCash Technology

Some features migrated from the Bitcoin blockchain, while others were added by the developers of the ZEC project. ZEC encrypts the contents of secure transactions and uses the zk-SNARK cryptographic protocol for validation. It was developed by cryptocurrency creators based on zero-knowledge proof.

Learn more on Zcash Wallet.

zk-SNARK technology

Zk-SNARK technology is a way to verify transactions in ZCash. Information about all participants of the transfer, including the transfer amount is not stored in the blockchain.

zk-SNARK technology 1 zk-SNARK technology 2 zk-SNARK technology 3

The developers gave a simple explanation of the principles of this verification system. Here is a logical puzzle as an example:

  • Imagine a ring-shaped room, pictured above.
  • On the left is the entrance to the room. Near the entrance is an Observer (marked with the letter V).
  • On the opposite side of the entrance is a locked door. The observer standing near the entrance does not see this door.
  • The Verifiable enters the room (marked with the letter P). His task is to prove to the Observer that he is the owner of the door key.
  • The Verifiable must go through the room around the entire circumference: enter from one side and exit from the other. Only the key holder can do this because the door is closed. There is no need to show the key to the observer.

Now the Observer can be sure that the Verifiable has the key. But he doesn’t need to see the key by itself because this is not necessary. This is how a zero-knowledge proof zk-SNARK algorithm works.

It is considered top security level and the most anonymous of all cryptocurrencies, even in comparison with competitors such as Monero, Beam, or Dash.

The referral program is on! Don't miss out.