Welcome to Gauss
These docs are periodically updated, enhanced, and improved. They are subject to change.
The Gauss Ecosystem is a Curated Layer 1 Blockchain designed to change the global perception of blockchain technology. Gauss recognizes the importance of cryptocurrency as it exists today and its untapped potential and addresses three prevalent issues with crypto:
- Pervasive Fraud
- A Lack Of Widespread Token Adoption
- Inauthentic Engagement Between Users And Brands
In order to tackle these challenges, we are creating a process that provides both users and consumers top notch integrity and security while operating on and within the Gauss ecosystem. This includes taking certain steps to research and analyze projects that want to operate inside the ecosystem.
These docs will introduce you to the Gauss ecosystem. You'll find links to valuable resources and websites that will bring you up to speed on building both on Gauss but also on general blockchain application development.
- Speed: The Gauss Ecosystem uses a high-throughput blockchain utilizing the IBFT 2.0 Proof of Authority Consensus algorithm. The PoA consensus algorithm is ideal for applications that require real-time processing, such as payment systems, supply chain management, and gaming platforms. The high-speed processing of transactions also ensures that users can quickly and efficiently complete transactions, providing a seamless user experience.
- Scalability: The Gauss Chain achieves a hypothetical transaction speed of fewer than 2 seconds on a single sidechain. As we grow we will spawn multiple sidechains which will help the network to handle millions of transactions per second. This mechanism (already demonstrated by the Polygon Matic Chain) combined with our EVM compatibility, allows the Gauss Ecosystem to scale easily.
- Security: A Curated and permissioned blockchain is a secure platform that offers a high level of security for participants. It is designed to prevent fraudulent activities and provide a controlled environment for blockchain transactions. Only authorized participants can operate nodes and validate transactions, ensuring that the network is protected against malicious activities. Regular security audits and the use of advanced access control protocols further enhance the security of the curated and permissioned blockchain.