Welcome to the Tron Nile testnet, which is very stable, just like the Nile river, a steady stream and never roll back!
Non-mandatory upgrade
All jar files available in this release are signed via this GPG key:
From the download listings below you should see links to the downloadable jar files as well as sig signature files. To verify the authenticity of any jar file, grab the jar and sig files with the same prefix name and then execute the verification process:
Mac OS:
brew install gpg
On Debian, Ubuntu and other Linux distributions:
sudo apt install gpg
gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys BBA2FC19D5F0B54AB1EE072BCA92A5501765E1EC
gpg --verify FullNode-Nile-4.7.6.jar.sig FullNode-Nile-4.7.6.jar
If the signature verification is passed, the following will be returned:
gpg: Signature made Tue 08 Oct 2024 11:00:02 AM UTC using RSA key ID 1765E1EC gpg: Good signature from "build_nileex (build_nileex)<build@nileex.io>" gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: BBA2 FC19 D5F0 B54A B1EE 072B CA92 A550 1765 E1EC
Mandatory upgrade
All jar files available in this release are signed via this GPG key:
From the download listings below you should see links to the downloadable jar files as well as sig signature files. To verify the authenticity of any jar file, grab the jar and sig files with the same prefix name and then execute the verification process:
Mac OS:
brew install gpg
On Debian, Ubuntu and other Linux distributions:
sudo apt install gpg
gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys BBA2FC19D5F0B54AB1EE072BCA92A5501765E1EC
gpg --verify FullNode-Nile-4.7.5.jar.sig FullNode-Nile-4.7.5.jar
If the signature verification is passed, the following will be returned:
gpg: Signature made Tue 11 Jun 2024 03:19:35 AM UTC using RSA key ID 1765E1EC gpg: Good signature from "build_nileex (build_nileex)<build@nileex.io>" gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: BBA2 FC19 D5F0 B54A B1EE 072B CA92 A550 1765 E1EC
Mandatory upgrade
For a full rundown of the changes please consult the GreatVoyage-v4.7.4(Bias) release milestone.
All jar files available in this release are signed via this GPG key:
From the download listings below you should see links to the downloadable jar files as well as sig signature files. To verify the authenticity of any jar file, grab the jar and sig files with the same prefix name and then execute the verification process:
Mac OS:
brew install gpg
On Debian, Ubuntu and other Linux distributions:
sudo apt install gpg
gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys BBA2FC19D5F0B54AB1EE072BCA92A5501765E1EC
gpg --verify FullNode-Nile-4.7.4.jar.sig FullNode-Nile-4.7.4.jar
If the signature verification is passed, the following will be returned:
gpg: Signature made Mon 25 Mar 2024 03:38:00 AM UTC using RSA key ID 1765E1EC gpg: Good signature from "build_nileex (build_nileex) <build@nileex.io>" gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: BBA2 FC19 D5F0 B54A B1EE 072B CA92 A550 1765 E1EC
Non-mandatory upgrade
All jar files available in this release are signed via this GPG key:
From the download listings below you should see links to the downloadable jar files as well as sig signature files. To verify the authenticity of any jar file, grab the jar and sig files with the same prefix name and then execute the verification process:
Mac OS:
brew install gpg
On Debian, Ubuntu and other Linux distributions:
sudo apt install gpg
gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys BBA2FC19D5F0B54AB1EE072BCA92A5501765E1EC
gpg --verify FullNode-Nile-4.7.3.1.jar.sig FullNode-Nile-4.7.3.1.jar
If the signature verification is passed, the following will be returned:
gpg: Signature made Mon 15 Jan 2024 11:18:11 AM UTC using RSA key ID 1765E1EC gpg: Good signature from "build_nileex (build_nileex) <build@nileex.io>" gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: BBA2 FC19 D5F0 B54A B1EE 072B CA92 A550 1765 E1EC
Non-mandatory upgrade
All jar files available in this release are signed via this GPG key:
From the download listings below you should see links to the downloadable jar files as well as sig signature files. To verify the authenticity of any jar file, grab the jar and sig files with the same prefix name and then execute the verification process:
Mac OS:
brew install gpg
On Debian, Ubuntu and other Linux distributions:
sudo apt install gpg
gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys 1B294EAB63D3384EBC9E7A4A56B72CE5300161A6
gpg --verify FullNode-Nile-4.7.3.jar.sig FullNode-Nile-4.7.3.jar
If the signature verification is passed, the following will be returned:
gpg: Signature made 2023/12/13 17:29:45 gpg: using RSA key 56B72CE5300161A6 gpg: Good signature from "build_nileex (build_nileex) <build@nileex.io>" [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: 1B29 4EAB 63D3 384E BC9E 7A4A 56B7 2CE5 3001 61A6
Mandatory upgrade
Non-mandatory upgrade
Mandatory upgrade
Mandatory upgrade
Non-mandatory upgrade
Mandatory upgrade
Non-mandatory upgrade
Non-mandatory upgrade
Non-mandatory upgrade
Mandatory upgrade
Mandatory upgrade
Mandatory upgrade
Non-mandatory upgrade
Mandatory upgrade
Non-mandatory upgrade
Mandatory upgrade
Mandatory upgrade
Release 4.0 has implemented the shielded TRC-20 contract, which can hide the source address, destination address, and the token amount for TRC-20 transactions and provide users with better privacy. The shielded TRC-20 contract has three core functions: mint, transfer and burn. mint is used to transform the public TRC-20 token to shielded token; transfer is used for shielded token transactions; burn is used to transform the shielded token back to the public TRC-20 token. To support the shielded TRC-20 contract, four new zero-knowledge instructions (verifyMintProof, verifyTransferProof, verifyBurnProof and pedersenHash) are added in TVM, which make it convenient to provide privacy for arbitrary TRC-20 contract.
Mandatory upgrade
rpc CreateShieldedContractParameters (PrivateShieldedTRC20Parameters) returns (ShieldedTRC20Parameters) {}
rpc CreateShieldedContractParametersWithoutAsk (PrivateShieldedTRC20ParametersWithoutAsk) returns (ShieldedTRC20Parameters) {}
rpc ScanShieldedTRC20NotesByIvk (IvkDecryptTRC20Parameters) returns (DecryptNotesTRC20) {}
rpc ScanShieldedTRC20NotesByOvk (OvkDecryptTRC20Parameters) returns (DecryptNotesTRC20) {}
rpc IsShieldedTRC20ContractNoteSpent (NfTRC20Parameters) returns (NullifierResult) {}
rpc GetTriggerInputForShieldedTRC20Contract (ShieldedTRC20TriggerContractParameters) returns (BytesMessage) {}
Non-mandatory upgrade
Mandatory upgrade
Mandatory upgrade