User Documentation

Posting Rewards - Earn STEEM every time you post content valued by others.

Every post submitted to STEEM is voted upon by users with a vested interest in the long-term value of STEEM. The more votes a post receives the more money the poster makes. Posters are also rewarded anytime someone inspires others to create replies that also get up voted.

Curation Rewards - Earn STEEM by being the first to upvote popular content

Every post submitted to STEEM is voted upon by users. These votes help other users identify content that is worth their limited attention and bring significant value to the platform. Steem recognizes that sifting through the abundance of new submissions is work that deserves to be rewarded.

Commitment Rewards - Steem rewards long-term commitment!

STEEM is a token that serves as the fundamental unit of account. STEEM is required to transact on the network and gives users the power to vote on posts. Users who commit to STEEM for a year or more earn interest and are protected from dilution.

Savings Rewards - Steem Dollar rewards bring stability to you

STEEM Dollars (SBD) are a new approach to creating a robust, counter-party free, pegged currency. Holding SBD pays interest. SBD is always convertible to $1.00 worth of STEEM.

Mining Rewards - Earn STEEM by joining the peer-to-peer network and validating transactions.

Anyone with a good internet connection and some server skills can make money by helping the network produce blocks and secure them with proof of work. Steem uses a mining algorithm and process that should eliminate mining pools and reward hosting a full node with a low-latency connection to the rest of the network.

Market Maker Rewards - A free STEEM / SBD exchange that pays you to trade

The Steem blockchain provids a built-in exchange between STEEM and SBD (STEEM Backed Dollars). This decentralized exchange is designed to have the highest liquidity and lowest spread. This is achieved through free trades and subsidized liquidity providers.

Technical Documentation

How to build Steem - Step by step instructions for building Steem from the sources

How to start a test network - Step by step instructions to start a private testnet.

How to monitor an account for deposits - Step by step instructions for account monitoring

This guide shows how to monitor accounts and process deposits to a specific account via Python or JavaScript. It is also a useful introduction to the block, transaction, and operation structures used by Steem.

How to use wallet via JSON RPC - Step by step instructions to interact with wallet over JSON-RPC

This guide shows how to use the cli_wallet via JSON-RPC over HTTP. The curl command is used as an example.

How to mine STEEM - Step by step instructions to start mining.

Consensus Algorithm - Ensuring a robust, censorship resistant social media platform.

Consensus is the process by which a network of computers can reach an unambiguous agreement about who owns what. The goal of the consensus protocol is to make it difficult for anyone to create an alternative history, shut down the network, or censor individual users. Steem combines techniques used by Delegated Proof of Stake and Proof of Work mining to create a new protocol that is more robust and censorship resistant than any existing protocol.

High Performance and Scalability - Steem is capable of handling a larger userbase than Reddit.

In 2015 Reddit’s 8.7 million users generated an average of 23 comments per second, with an average of 83 comments per year per user. There were 73 million top-level posts, for an average of 2 new posts per second. There were about 7 billion up votes creating an average voting rate of 220 votes per second. All told, if Reddit were operating on a blockchain it would require an average of 250 transactions per second. Steem is capable of 1000's of transactions per second.

Dynamic Account Permissions - Management for the corporate environment

Steem designs permissions around people, rather than around cryptography, making it easy to use. Every account can be controlled by any weighted combination of other accounts and private keys. This creates a hierarchical structure that reflects how permissions are organized in real life, and makes multi-user control over funds easier than ever. Multi-user control is the single biggest contributor to security, and, when used properly, it can virtually eliminate the risk of theft due to hacking.