Saito is a layer-1 blockchain that scales by fixing incentive misalignments in the consensus layers of all other blockchains. You can use Saito today to run web3 applications directly in your browser. If you are new to Saito you can also check out our development roadmap, or start down the Saito rabbit-hole with the Saito whitepaper.
This wiki is intended as a community-editable resource and knowledge repository. Please feel welcome to contribute by flagging problems or editing pages to include more information that you think might be helpful.
All pages are stored in markdown in our Saito Wiki Github Repository. Submit edits by making a push request with your proposed changes or emailing us at email@example.com. In order to help organize the site, we've divided the content into three main categories:
Saito Consensus includes details on the consensus mechanism that Saito uses to power its blockchain network. It includes discussions of the incentive problems that Saito fixes and explains why solving them requires paying for fee-collection rather than other gameable forms of work like mining and staking.
In cybersecurity, an attack vector is a method of achieving unauthorized network access to launch a cyber attack. Attack vectors allow cybercriminals to exploit system vulnerabilities to gain access to sensitive data, personally identifiable information (PII), and other valuable information accessible after a data breach.
Saito is secure against classes of attack which have no defense mechanisms in other chains. This page explains how these mechanisms work
Our community section includes links to our Telegram and Discord channels, non-English community resources, and information on community-led projects and ways to help the network. We also have information on some ongoing public development efforts and ways you can help out.
This section is for developers. It includes instructions on installing Saito, API guides and reference materials for those interested in building applications on the network, as well as more detailed explanations of the network architecture.