Wallets offer a gateway to private decentralised transactions and communications. They allow you to hold, secure and trade Loki with peers. Download an official Loki wallet today and start taking back control of your online privacy.
To learn more about wallets, click here.
Confused with which wallet to use? Check out the "Which wallet to use?" guide.
Mining on the Loki Network is the process of solving a difficult computational puzzle through a Proof-of-Work(PoW) protocol and compiling newly created transactions into a block. Miners do this in order to earn money from the Block Reward and the fees associated from the transactions they include in each block.
The Loki cryptocurrency can be mined using the CryptoNight Heavy hashing algorithm, which is designed to be ASIC Resistant.
To learn more about mining, click here.
Loki utilises a network of Service Nodes which are paid to propagate the blockchain and process transactions. Service Nodes require a collateral of Loki to be active, and this creates a built-in market-based Sybil resistance by forcing actors to incur a large cost in attempting any form of temporal analysis on the network.
In addition, by rewarding the Service Nodes, the Service Nodes can be leveraged to maintain the Lokinet by routing traffic, and the Loki Services by handling special off-chain activities, as seen in the Loki Messenger.
To learn more about Service Nodes, click here.
Lokinet is a mixnet that uses market-based Sybil attack resistance and onion routing to create a new way to privately access the internet. Users of Lokinet will be able to access normal websites and SNApps without revealing their IP address.
SNApps are traditional web applications that sit inside Lokinet and are hidden from the rest of the internet. The host’s IP is never revealed, therefore SNApps provide great protection for the development of censorship resistant social media, marketplaces, information sharing sites, and other apps that depend on user and server anonymity.
To learn more about Lokinet, click here.
Loki Services are back-end user-facing applications, such as the Loki Messenger and Blink. Off-chain networking and/or storage activities for these services are handled by swarms, groups of Service Nodes, who query each other to enforce each other's honesty. This creates a trustless environment where no centralised leader can enforce censorship on any of the off-chain activities conducted on the Loki Network.
To learn more about Loki Services, click here.
Learn more about Loki by browsing through the Advanced section. Topics that are covered are: Technical Specs, Loki's Cryptoeconomics, Sybil Resistance, Dynamic Block Size and the CryptoNote Elements used by Loki.
If you have a question, chances are other developers/community members have asked it.
Check out our "Frequently Asked Questions" page. If the information you are looking for is not there, please join one of our community chat groups, such as our telegram or discord channel, and ask one of our community managers.
Want to contribute to the Loki-Docs page? Have a look at the "How to Contribute to Loki-Docs Guide".
Have you found a security vulnerability in Loki's Code? Have a look at Loki's Vulnerabiity Response Disclosure and get in contact with us.