Keeta Network
  • Introduction
  • Architecture
    • Data Structure
    • Consensus
      • Voting Power
      • Votes
      • Vote Stapling
  • Components
    • Ledger
    • Blocks
    • Nodes
      • Ledger Pruning
    • Accounts
      • Permissions
    • Key Pairs
      • Storing Key Pairs
    • Certificates
      • Creating and Attaching Certificates
  • Security
    • Digital Signatures
    • Post Quantum Readiness
    • Data Integrity
    • Protection From Common Attacks
  • Scalability
    • Benchmarks and Performance Metrics
    • Seperating Nodes from Hardware
    • Eliminating Mempools
  • Features
    • Identity Profiles
      • Utilizing Identity Profiles
    • Native Tokenization
      • Creating Tokens
      • Built-in Rules Engine
    • Anchors
      • Creating an Anchor
  • Applications
    • Public Network
    • Private Sub Network
  • Industry Comparison
    • Keeta Network's Advantage
    • Resolving the Blockchain Trilemma
  • Other Documentation
    • Official Links
    • Tokenomics
Powered by GitBook
On this page
  1. Applications

Public Network

Keeta Network is available to any party, serving as a hub for innovation and collaboration. The team continues to built the ecosystem with additional tools and protocols to aid participants in taking asset transfers to a new level. With unprecedented performance, interoperability, and real-world applicability, Keeta has set itself up to become an industry leader over the existing public layer-1 blockchain networks.

Keeta's use of dPoS as a consensus mechanism provides decentralization by giving all token holders the ability to have an input on the consensus of the network. As the network's participation grows, it becomes more decentralized. Once a transaction is completed, it is broadcasted publicly to the network so any participant can read or audit and transaction. Any person or entity can join the network, and we encourage everyone to do so.

PreviousCreating an AnchorNextPrivate Sub Network

Last updated 3 months ago