Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Quorum | 4,530 | 3 | 7 days ago | 210 | November 03, 2022 | 45 | lgpl-3.0 | Go | ||
A permissioned implementation of Ethereum supporting data privacy | ||||||||||
Meshbird | 3,446 | 8 months ago | January 30, 2016 | 12 | apache-2.0 | Go | ||||
Distributed private networking | ||||||||||
Zksync | 3,369 | 9 days ago | 55 | apache-2.0 | Rust | |||||
zkSync: trustless scaling and privacy engine for Ethereum | ||||||||||
Rotki | 2,326 | 20 hours ago | 347 | agpl-3.0 | Python | |||||
A portfolio tracking, analytics, accounting and management application that protects your privacy | ||||||||||
Aztec V1 | 628 | 9 months ago | n,ull | lgpl-3.0 | JavaScript | |||||
Public repository for the AZTEC V1 protocol. For the latest zkRollup release see here https://github.com/AztecProtocol/aztec-2-bug-bounty | ||||||||||
Blockchain Identity | 610 | 2 years ago | 27 | cc-by-4.0 | ||||||
Blockchain and Identity | ||||||||||
Firefly | 401 | 4 | 4 days ago | 50 | November 18, 2022 | 104 | apache-2.0 | Go | ||
Hyperledger FireFly is the first open source Supernode: a complete stack for enterprises to build and scale secure Web3 applications. The FireFly API for digital assets, data flows, and blockchain transactions makes it radically faster to build production-ready apps on popular chains and protocols. | ||||||||||
Umbra Protocol | 307 | 7 days ago | 3 | October 18, 2022 | 53 | mit | TypeScript | |||
🌕🌑 Privacy Preserving Shielded Payments On The Ethereum Blockchain | ||||||||||
Owshen | 274 | 3 hours ago | 2 | Solidity | ||||||
The Deep Sea | ||||||||||
Cicada | 262 | 7 days ago | 1 | agpl-3.0 | Solidity | |||||
A protocol for private on-chain voting, implemented in Solidity. |
GoQuorum is an Ethereum-based distributed ledger protocol with transaction/contract privacy and new consensus mechanisms.
GoQuorum is a fork of go-ethereum and is updated in line with go-ethereum releases.
Key enhancements over go-ethereum:
geth
, providing extensibility, flexibility, and distinct isolation of GoQuorum features.The above diagram is very high-level overview of component architecture used by GoQuorum. For more in-depth discussion of the components and how they interact, please refer to lifecycle of a private transaction.
The easiest way to get started is to use * quorum-dev-quickstart - a command line tool that allows users to set up a development GoQuorum network on their local machine in less than 2 minutes.
Check out some of the interesting projects we are actively working on:
The official docker containers can be found under https://hub.docker.com/u/quorumengineering/
The following GoQuorum-related libraries/applications have been created by Third Parties and as such are not specifically endorsed by J.P. Morgan. A big thanks to the developers for improving the tooling around GoQuorum!
GoQuorum is built on open source and we invite you to contribute enhancements. Upon review you will be required to complete a Contributor License Agreement (CLA) before we are able to merge. If you have any questions about the contribution process, please feel free to send an email to [email protected]. Please see the Contributors guide for more information about the process.
Security is part of our commitment to our users. At GoQuorum we have a close relationship with the security community, we understand the realm, and encourage security researchers to become part of our mission of building secure reliable software. This section explains how to submit security bugs, and what to expect in return.
All security bugs in GoQuorum and its ecosystem (Tessera, Cakeshop, ..etc) should be reported by email to [email protected]. Please use the prefix [security] in your subject. This email is delivered to GoQuorum security team. Your email will be acknowledged, and you'll receive a more detailed response to your email as soon as possible indicating the next steps in handling your report. After the initial reply to your report, the security team will endeavor to keep you informed of the progress being made towards a fix and full announcement.
If you have not received a reply to your email or you have not heard from the security team please contact any team member through GoQuorum slack security channel. Please note that GoQuorum discord channels are public discussion forum. When escalating to this medium, please do not disclose the details of the issue. Simply state that you're trying to reach a member of the security team.
GoQuorum project uses the following responsible disclosure process:
Note: This process can take some time. Every effort will be made to handle the security bug in as timely a manner as possible, however it's important that we follow the process described above to ensure that disclosures are handled consistently.
The best way to receive security announcements is to subscribe to the Quorum-announce mailing list/channel. Any messages pertaining to a security issue will be prefixed with [security].
Comments on This Policy If you have any suggestions to improve this policy, please send an email to [email protected] for discussion.
The go-ethereum library (i.e. all code outside of the cmd
directory) is licensed under the
GNU Lesser General Public License v3.0, also
included in our repository in the COPYING.LESSER
file.
The go-ethereum binaries (i.e. all code inside of the cmd
directory) is licensed under the
GNU General Public License v3.0, also included
in our repository in the COPYING
file.
Any project planning to use the crypto/secp256k1
sub-module must use the specific secp256k1 standalone library licensed under 3-clause BSD.