
Configure Your Own
Privacy-Enabled Blockchain
Get a custom blockchain without hiring a dedicated team or spending years in development. We partner with companies who need the benefits of blockchain without the trade-offs
Why SELF CHAIN exists
Building a blockchain is seriously hard
If you need your own rules and governance, typical choices force painful tradeoffs.
Build from scratch
- Years and a specialized team
- Hard to validate security and correctness
- Operational complexity forever
Use a shared chain
- Limited control over rules and governance
- You don't own the system behavior
- Upgrades and roadmap aren't yours
Fork an existing chain
- Inherit legacy assumptions
- Still requires deep protocol expertise
- You maintain the fork indefinitely
There's a better way
Deploy a Constellation: a dedicated chain with your configuration and economics, built on technology that's reviewable and already running in production (SELF App).
Our Difference
Why SELF Stands Out
A fundamentally new approach to blockchain infrastructure.
No mining hardware
CPU-first consensus — expensive GPUs not required
No gas fee anxiety
Fair transaction selection ensures all transactions get processed
Instant participation
No complex setup, no waiting periods to start validating
True self-custody
Keys can stay on user devices with zero-knowledge architecture
Real decentralization
No trusted validators or centralized sequencers
Fully verifiable
Anyone can audit the chain and validate transactions
Data sovereignty
Users and enterprises own their data, encrypted on-chain
No single point of failure
Distributed architecture can't be shut down
Transparent rules
Code is law, not corporate policy that changes
Industry Solutions
Use Cases
Constellations can be tailored to a specific domain with custom economics, governance, and validation rules. Below are illustrative examples, there's no limit to the number of industries that would benefit from a Constellation of SELF Chain.
Deployment model
A dedicated chain for your use case
If you need authentication, verification, immutability, and sovereign identity primitives, you need a system you can control. We call each dedicated deployment a Constellation. It's an independent chain with your branding, governance, and economics, backed by the Proof-of-AI core.
Dedicated Layer-1 Blockchain
Custom genesis configuration, governance, and economic parameters
Flexible Validator Architecture
Server nodes, browser-based validators, or hybrid — your choice
Browser-based validators
Participation without per-user infrastructure requirements
Managed coordination
Coordinator services organize rounds and reference blocks (deployment-dependent)
SELF Chain
Shared coordination layer + Proof-of-AI implementation
Main network
• Reference implementation
• Ecosystem foundation
Constellation deployment
- • Custom genesis
- • Custom economics
Constellation (live)
- • Browser participation
- • Prize draw rewards
Any number of chains
- • Different governance
- • Different reward models
- • Different validator sets
One shared technology layer supports any number of constellations.
Zero-Cost Entry
Constellations can subsidize validator bonds for their users. This means anyone can become a validator without upfront capital.
The bond serves as Sybil resistance—proving you're a real participant. But you don't have to pay it yourself.
Constellation sets bond requirement (e.g., 100 tokens)
Constellation subsidizes bonds for authenticated users
User becomes validator at zero cost, with equal voting power
Traditional PoS
SELF Chain
Unbonding includes a configurable delay to prevent rapid entry/exit attacks
Server Validators
Traditional server-based nodes for enterprise infrastructure with full control.
Browser Validators
Every user becomes a validator — nodes run directly in the browser via WebRTC.
Hybrid Architecture
Combine server reliability with browser decentralization for maximum flexibility.
Not Just Marketing
True Decentralization
Most blockchains claim decentralization but concentrate power. SELF Chain is mathematically designed for equality.
Equal Voting Power
Other consensus mechanisms concentrate power. SELF Chain gives every validator exactly equal voting weight.
Proof-of-Work
More compute = more power
Proof-of-Stake
More stake = more power
Proof-of-AI
Equal voice for all
One validator, one vote. Unlike Proof-of-Stake and Proof-of-Work, more money doesn't mean more influence.
Open Competition
No single proposer is selected. Every eligible participant competes to build the most efficient block.
Build
All builders create candidate blocks from the same mempool
Compare
Efficiency scores compared against reference block
Vote
Validators vote for the best block — highest efficiency wins
Result
Best block wins — anyone can win any round
Consensus Mechanism
Proof-of-AI
A novel consensus mechanism where AI algorithms compete to build the most efficient blocks, validated through cryptographic color markers. CPU-first—no GPUs required.
How PoAI Reaches Consensus
Competition-based block selection in four phases
Block Builder Competition
AI Block Builders compete to create the most efficient block from the mempool using the 20/20/50/10 algorithm—balancing high-fee, low-fee, average, and oldest transactions for fairness.
Proposal Voting
Validators compare proposals against a reference block computed identically by all nodes. They vote for the highest-efficiency block. Each validator has equal voting power.
Color Marker Validation
A randomly selected validator (who didn't vote for the winner) verifies all transactions using HEX wallet colors—each wallet has a color that changes deterministically with every transaction.
Finalization & Rewards
The validated block is added to the chain. Rewards are distributed: 90% to the winning builder, 8% to voting validators, 1% to the color-checker, 1% to reserve.
Efficiency Over Wealth
Unlike PoS where the richest validators dominate, PoAI rewards algorithmic efficiency. The best block wins—not the biggest stake.
Consensus Flow
How blocks compete and get finalized
Color Marker System
Every wallet has a unique HEX color derived from its public key. Each transaction creates a new color through deterministic calculation—providing cryptographic proof of state and preventing double-spending.
State Tracking
Continuous representation of each wallet's transaction history
Double-Spend Prevention
Each transaction creates a unique color that can only occur once
Instant Verification
Any node can independently verify the color transition chain
Priority for urgent transactions
Ensures accessibility for all
Stable pricing for most users
No transaction left behind
The 20/20/50/10 algorithm prevents fee wars and ensures fair transaction inclusion
How PoAI Compares
Proof-of-Work
- Block SelectionHashrate
- Tx PriorityHighest fee
- HardwareASICs/GPUs
- ValidationHash difficulty
- EnergyWasteful
Proof-of-Stake
- Block SelectionStake-weighted
- Tx PriorityHighest fee
- HardwareServers
- ValidationSignatures
- EnergyModerate
Proof-of-AI
- Block SelectionEfficiency
- Tx Priority20/20/50/10
- HardwareAny CPU
- ValidationColor markers
- EnergyMinimal
Reward Distribution
Browser-Scale Architecture
Light Client Proofs
How can browsers validate without storing gigabytes of blockchain history? Sparse Merkle Tree proofs make it possible.
Inclusion Proofs
Verify that a key-value pair exists in the state tree without downloading the entire tree.
Non-Inclusion Proofs
Cryptographically prove that a key is absent—essential for preventing double-spends.
Update Proofs
Verify state commitments changed correctly between roots.
Checkpoint Sync
New participants bootstrap trust from recent checkpoints—no genesis download required.
Sparse Merkle Tree
Constant proof size — same whether 10 or 10 billion accounts
What This Enables
Browser Validators
Full verification capability in Chrome, Firefox, Safari—no extensions or plugins required.
Mobile Participation
Smartphones become validators. Proof verification uses minimal bandwidth and battery.
Global Scale
Millions of validators, not thousands. True decentralization through accessible participation.
Security
Hybrid cryptography + key isolation
The implementation includes classic cryptography and post-quantum options, designed to run in a hybrid mode. Master keys stay on user devices; derived validator keys cannot move funds.
Kyber-1024
Post-quantum key encapsulation option. Used alongside classic primitives in hybrid mode.
SPHINCS+
Hash-based signature option intended for post-quantum resilience.
Delegated key architecture
User's Master keys never leave their device. Their Validator keys can vote and validate, but cannot move funds.
Hybrid mode
Transition-friendly schemes combining classic (ECDSA, X25519, SHA3-256) with post-quantum options.
Color Marker Anti-Fraud
Unique cryptographic system preventing double-spending through deterministic color state transitions.
Audit status
Cryptographic audit is in progress with a third-party firm. Threat model details are available for serious evaluators.
Proven Production
SELF Chain is running in production today, powering SELF App—the first constellation. This isn't a whitepaper promise. It's working code.
Consensus, storage, networking, crypto
Consensus, networking, storage, crypto
Browser validators at global scale
Battle-Tested Components
Every critical path has comprehensive test coverage
Consensus
BFT rounds, vote aggregation, finality
Storage
RocksDB/wa-sqlite, SMT proofs, snapshots
Networking
libp2p, DHT, gossip, WebRTC
Cryptography
Ed25519, SHA-256, PQC options
Detailed Wire Formats
Complete protocol specification with canonical bincode encoding ensures consistent implementation across any client.
Test Vectors
Reference test vectors included for deterministic verification. Build alternative clients with confidence.
Ready to get started?
We'll walk through what's implemented in the repository today, what's proprietary, and what would be custom for your deployment.
Scope
Define your deployment requirements
Customize
Tune economics, governance, and integration
Deploy
Launch your Constellation and change the world