A magician doesn’t normally reveal their tricks. But Saito is less magic than science. In this post we’re going to open the curtains and explain how it fixes the fundamental security problem in blockchain. Are you watching closely? Problem: Relying…
Red Imperium is an open source space-civilization game that uses the base mechanics from the utterly-epic 16-hour boardgame Twilight Imperium. As you can see from the screenshot below, the game has entirely new graphics (we think they look great!) a…
Given all the growth lately at the Saito Arcade (https://saito.io/arcade), which is doing more transaction volume than most other chains, by itself, I thought I’d share a quick update about recent improvements to the game engine that are making things…
The double-spend attack is not the same as the 51 percent attack. It is strange to have to make this point in 2020, but it is true: while having 51 percent control of a blockchain makes double-spend attacks free, that…
Today we are pleased to announce the launch of a blockchain-powered procurement system for Covid-19 medical equipment developed in partnership with DHB Global under the auspices of the World Economic Forum COVID Taskforce. This post briefly introduces the blockchain solution…
The Saito Arcade has had a massive month to bring up its first year. We set up the Arcade to showcase Saito’s potential and its ability to support complex, cryptographically-sophisticated applications. The Arcade has outstripped these objectives and become a…
Saito Network – Policy and Status What is the Saito Network The Saito Network is a clean instantiation of the Saito protocol, incorporating improvements and fixes from the Saito TESTNET (2019-01-01 ~ 2019-12-31). saito.io – a showcase of what can…
The Saito team has been a bit quiet recently. This is because of a combination of Christmas, New Years, Spring Festival and Corona Virus. With Beijing, like most major Chinese cities, in lockdown, international missions recommending against non-essential presence in…
Adding cryptographic signatures to Saito transactions eliminates the 50 percent attack, but increases the size of transactions. Given that adding a single hop to a routing path is around 135kb, we can see how transaction size grows with routing length:…
When people talk about the “difficulty” of attacking proof-of-work and proof-of-stake networks they are really talking about cost. This is because both the proof-of-work and proof-of-stake consensus mechanisms have difficulty functions that depend on the availability of some resource in…