Download SORA Blockchain L1
[Latest] Version: v3.112.15
The Quantum- and ASIC- Resistant Cryptographic Hash Function SORA2, developed by Satoshi is SHA256 (SS256) - which also serves as the cryptography division of this project - has now been integrated into the SORA L1 blockchain testnet.
You can check the hash values via the "sora2hash" command from the Debug window.
And, starting from version 3.102.15, we have begun integrating the quantum-resistant hash function SORA2 into the system.
Download: mainnet / testnet
Windows 11 / 10 / 8.1 / 8 / 7
>> DOWNLOAD
Download: only testnet
Windows 11 / 10 / 8.1 / 8 / 7
>> DOWNLOAD
Usage
We have released two versions: the standard edition and the dedicated testnet edition. the testnet version includes both PQC and our quantum and ASIC-resistant hash function.
Note: Since the regular client requires the “-testnet” flag to launch the testnet, we are also providing a dedicated testnet build that removes this requirement.
The dedicated testnet edition starts the testnet automatically. Simply double-click the application and you're ready to go. No advanced configuration is required.
After downloading the ZIP file, extract it. You can also open it directly and copy the files to any folder you prefer.
Once extracted, double-click the executable file (SorachanCoin.exe).
A dialog will appear asking where to create the data folder. Just click OK to proceed.
The command sora2mining is used for CPU mining. By entering this command, you can start and control CPU mining.
Open “Menu” → Help → Debug window → Console.
The mining algorithm uses the quantum and ASIC-resistant hash function SORA2.
sora2mining start
Starts CPU mining.
sora2mining stop
Stops CPU mining.
sora2mining status
Displays the current CPU mining status.
sora2mining algo
Shows the name of the mining algorithm.
This section provides PQC options, supporting up to 256 types. Below is an explanation of each option from top to bottom.
Open the “Receive Coins” tab, then click the “New Address” button at the bottom.
ECDSA:
The traditional cryptographic key.
It is vulnerable to quantum attacks such as Shor’s algorithm.
Quantum and AI resistance:
A PQC-based, quantum-resistant cryptographic key.
Quantum and AI resistance / Schnorr agg-sig (5000 keys):
A PQC key combined with Schnorr aggregated signatures using 5000 keys in a multisig structure.
This is the strongest option available.
Eth Style Address:
An ECDSA key hashed with Keccak, displayed in 0x format.
Its security level is equivalent to ECDSA (also vulnerable to quantum attacks such as Shor’s algorithm).
Enter your desired passphrase in both the upper and lower fields, then click OK. Your wallet will now be encrypted.
Open “Settings” → “Wallet Security” → “Encrypt Wallet.”
All transactions can be managed freely from the tabs at the top.
In principle, you simply send or receive coins using the addresses you generate. The coins required for sending are created exclusively through mining. The mechanism is extremely straightforward.
That said, blockchains rely heavily on hash processing, and all of these hash operations are public information. Because of this, the structure has always been inherently vulnerable to quantum Grover-type attacks - that is how it is now being interpreted.
Satoshi is SHA256 Website
This is a cryptocurrency project focused on cryptographic development and uncovering the secret imprint embedded within SHA-256. The whitepaper, titled "", has been published on platforms such as Publish0x.
https://satoshi-is-sha256.org/