table of contents
Stellar Consensus Protocol and Federated Byzantine Agreement Fundamentals Core Principles of FBA and SCP How SCP Reaches Consensus Comparison with Other Consensus Mechanisms How Pi Network Adapts SCP Transaction Processing and Performance Security Characteristics and Guarantees Limitations and Critiques Conclusion Source: FAQ
pi network‘s Stellar Consensus Protocol This is a topic that has been covered in many publications. But do many people still really understand what it actually means, as some pioneers consider it the protocol’s blockchain consensus mechanism?Simply put, the Pi Network is not running its own new consensus system.
Its blockchain uses an adapted version of the Stellar Consensus Protocol (SCP). It is based on a formally defined model. Federal Byzantine Agreement (FBA). The long and important answer lies in how SCP works, why SCP is different from proof-of-work and proof-of-stake, and how Pi Network modifies SCP to support mobile-first, identity-driven networks.
This article will explain the technology from first principles. We focus on how consensus is reached, what the SCP guarantees, and how Pi Network’s implementation diverges from Stellar’s original design. As always, the goal is to clarify the mechanism, not to promote the outcome or speculate about its significance. Pi Blockchain in 2026 And beyond that.
Fundamentals of Stellar Consensus Protocol and Federated Byzantine Agreements
As already established, the Pi Network’s consensus mechanism is based on the SCP of the Stellar blockchain, which was introduced in 2015. SCP was designed by computer scientists at Stanford. david maziere is implemented in Stella network. Rather than relying on mining or economic interests, SCP uses agreements between nodes to explicitly decide who to trust.
At the core of SCP is FBA. Traditional Byzantine fault tolerance systems such as PBFT assume a fixed list of validators. This assumption limits openness and makes global participation difficult. FBA removes fixed membership requirements. Each node independently selects its own quorum slice, which is a subset of the other nodes that it considers sufficient to reach consensus. A quorum is a set of nodes with at least one quorum slice in which all members are completely contained within the set.
Consensus emerges when these slices overlap enough to form a quorum. Safety depends on quorum crossing. That is, any two quorums must share at least one honest node. Vitality depends on whether the network can form a quorum even if some nodes fail.
This model allows for open participation while tolerating Byzantine failures. In practice, SCP can handle any faulty behavior as long as quorum crossing is maintained after the faulty node is removed.
Basic principles of FBA and SCP
Federated Byzantine agreements generalize classical Byzantine fault tolerance without assuming a fixed set of validators. Each node defines trust locally rather than inheriting trust from global rules.
first, quorum slice. Nodes decide for themselves which other nodes they depend on. These slices are not uniform throughout the network. These reflect social, organizational, or operational trust.
The second one is whose intersection. For the protocol to be secure, all quorums that can form must intersect, even after removing a faulty node. If the intersection fails, the network risks inconsistent decisions.
The third is Concept of intact and failed nodes. An intact node is one that continues to function properly after the faulty node is removed. Although the failed node is technically healthy, it loses vigor because it relies on the failed node for progression.
The fourth one is disposable set. The SCP formal model defines a set of nodes that can be removed while maintaining quorum intersection and availability. This allows the protocol to make accurate inferences about fault tolerance without using strict numerical thresholds.
By combining these properties, SCPs achieve what designers call optimal safety. Matching is guaranteed as far as theoretically possible under asynchronous network conditions.
How SCPs reach consensus
SCP reaches consensus in two different phases for each slot. A slot represents a block or set of transactions.
The nomination phase selects candidate values. Nodes nominate transaction sets using federated voting. To avoid confusion, candidates are prioritized using a cryptographic hash function. Over time, intact nodes converge to the same composite value, usually a valid combination of transactions.
Once the nominations are received, the protocol moves to the voting phase. Here, nodes vote on ballots defined as counters and values. When progress is stagnant, the counter increases. A node performs prepare, commit, and externalize steps. Once the value is confirmed by the quorum, it is externalized and the decision becomes final.
All messages are signed with a cryptographic key. Hash functions are used to both prioritize and combine values. These mechanisms prevent forgery and replay attacks.
In production networks, SCP typically reaches finality within 3 to 5 seconds. There is no probabilistic settlement window like proof of work. Once a value is externalized, it cannot be restored without violating quorum intersection.
Comparison with other consensus mechanisms
SCP is fundamentally different from proof of work or proof of stake.
proof of work relies on computational power and assumes that most of the hashing power is honest. Finality is stochastic and has high energy consumption.
proof of stake Depends on economic interests. The agreement relies on assumptions about rational behavior and capital distribution.
In contrast, SCP relies on explicit trust relationships. It consumes no energy and does not consider the impact of stake size. Fault tolerance is determined by the quorum structure rather than token ownership. This makes SCP suitable for networks that prioritize low latency and predictable finality.
How Pi Network adapts SCP
The Pi Network did not invent a new consensus protocol. This adapts SCP to support large numbers of individual users rather than small groups of institutional validators. The project is built on Stellar’s open source code and changes the way trust is established and participation is rewarded.
The most visible adaptation is the use of security circles. We recommend that users add 3 to 5 trusted contacts. These circles are aggregated into a global trust graph. Nodes use this graph to inform their quorum slice configuration.
The purpose is to establish trust in real relationships, not in institutions. Verifying identity through a customer recognition process helps reduce Sybil attacks. In this model, trust flows from authenticated individuals through social connections.
Pi Network also defines roles for multiple participants. Pioneers are regular app users who check in daily. Contributors enhance the trust graph by adding contacts. Ambassadors recruit new users. Nodes run SCP software on desktops or laptops and participate directly in consensus. Some nodes operate with open ports and high availability, increasing their influence in forming a quorum.
Mining on the Pi Network is not mining in the proof-of-work sense. This is a planned distribution process coordinated by the SCP. Compensation is allocated based on role, activity, hours worked, and trust contribution. There are no mining pools or competing calculations.
Transaction processing and performance
Pi Network transactions are sent through the mobile application and forwarded to the nodes. A node verifies the signature and transaction history before including the transaction in the nominated set.
Consensus messages are lightweight and exchanged over standard networks. Blocks are generated approximately every 5 seconds. Initial network goals ranged from a few hundred to low thousands of transactions per second, depending on node participation and message overhead.
Transaction fees primarily serve as a prioritization mechanism rather than a source of income. The efficiency of this protocol comes from the lack of mining and the small message size required for federated voting.
Security characteristics and guarantees
From a technical perspective, Pi Network inherits SCP’s core security guarantees. These include deterministic finality, tolerance to Byzantine failures under quorum crossing, and message cryptographic integrity.
Adding a social layer creates new trade-offs. Security circles and KYC processes can reduce the prevalence of fake accounts, but they also create dependencies on verification systems and the structure of the trust graph. Quorum crossing can be weakened if trust becomes too centralized, or if many users rely on a small set of nodes.
SCP itself does not require trust to be global or uniform. Its security depends on the configuration choices made by the node operator. This places the onus on the network to promote diverse and well-connected slices.
limitations and criticism
Some criticisms of the Pi Network’s consensus implementation focus on decentralization and scale.
In the early stages, a limited number of core nodes played an important role in maintaining quorum crossing. This creates the impression of centralized control even if the underlying protocol supports decentralization.
Scalability is another concern. As the number of nodes increases, the complexity of the message also increases. While SCP has been proven in Stellar’s production environment, the Pi Network’s focus on individually operated nodes results in variable uptime and connectivity.
conclusion
Pi Network’s use of the Stellar Consensus Protocol represents an attempt to apply a well-researched consensus model to a mass-market, mobile-oriented environment. SCP provides rapid finality, low energy usage, and formal security guarantees through federal Byzantine agreements. Pi Network extends this framework by incorporating social trust and identity verification into quorum formation and reward distribution.
The result is a system that prioritizes accessibility and human participation while relying on established consensus research. Its strengths and weaknesses are not rooted in untested cryptography, but in configuration choices, network incentives, and governance. Understanding how these work is essential to evaluating Pi Network on technical grounds, rather than speculation or marketing narratives.
source:
- PI 2021 White Paper: Enabling mining on mobile phones
- Stellar Consensus Protocol: A federated model for Internet-level consensus
- Stella website: SCP consensus proof mechanism
- emergent mind: What is the Federal Byzantine Convention?

