Centaurus Description

A deployed cluster, referred to as a constellation, is made up of a primary server, known as the alpha, along with 5 to 19 auditor servers. These servers are operated by different organizations or business entities, each of which publicly verifies its identity through a standard Stellar ed25519 public key. Since the organizations that comprise the constellation and their public keys are unlikely to change frequently, including these public keys in client software is advantageous for enabling direct signature verification on the client side. The funds collected from clients are held in a single Stellar account, known as the vault, which is secured by an M-of-N multi-signature scheme, where N represents the total number of independent servers in the constellation, and M is defined as the majority of votes (more than 50%) plus one. To execute any withdrawal, the majority of signatures from the quorum participants is required, a process safeguarded by the Stellar ledger's integrity. Transactions such as payments and trades are confirmed instantaneously, with a finality achieved within five seconds, thus ensuring a rapid and secure financial environment. This combination of technology and governance provides a robust framework for managing assets within the constellation.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Centaurus
Website:
github.com/centaurus-project/centaurus

Media

Centaurus Screenshot 1
Recommended Products
Build Securely on Azure with Proven Frameworks Icon
Build Securely on Azure with Proven Frameworks

Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now

Product Details

Platforms
Web-Based
Types of Training
Training Docs
Customer Support
Online Support

Centaurus Features and Options

Centaurus User Reviews

Write a Review
  • Previous
  • Next