Powered by Gemini
sg

Your trusted source for all things crypto.

Powered by Gemini
cryptopedia-trademark-logo
search

Explore

#

0x

The 0x protocol is an open standard for building decentralized exchanges (DEXs) on the Ethereum blockchain. Launched in 2018, 0x enables developers to incorporate peer-to-peer (P2P) digital asset exchange into platforms and decentralized apps (dApps). 0x’s native token is ZRX, which gives holders participation rights in 0x platform governance.

1inch

The 1inch liquidity protocol is an automated market maker (AMM) that is designed to increase liquidity and make use of virtual balances in order to decrease impermanent loss. Users can benefit from providing tokens as liquidity on the 1inch platform through a process that’s called “liquidity mining” — whereby traders provide assets like ether (ETH) to a specific pool, lock it in, and earn 1INCH, the native token of the 1inch platform, as interest. This model is similar to native exchange tokens like Uniswap’s UNI, and incentivizes community-based liquidity provision.

3D Model Rendering

3D model rendering is the process of creating a virtual image or animation by using varying digital texture, color, and lighting software. The modeling process uses data points to represent objects in three-dimensional space, which is then rendered from 3D models into 2D images through a computationally heavy process.

401(k) Plan

In the U.S., a 401(k) is an employer-sponsored, government-supported pension savings plan for employees. 401(k) plans allow companies to sponsor eligible employees in saving and investing towards retirement by contributing a portion of their income to the plan on a tax-deferred basis. These contributions are often incentivized by employer matching. 401(k) plans are typically defined by contribution limits, tax advantages, and early withdrawal penalties.

51% Attack

A 51% attack is a scenario in which more than 50% of a blockchain network's nodes fall under the control of a single group. In such a circumstance, the consensus of the network may no longer be sufficiently decentralized enough to be viable, leaving the blockchain open to manipulation. Attackers with greater than 50% control of a blockchain may be able to stop, reverse, and duplicate new transactions, a catastrophic condition for any blockchain. Notably, a 51% attack becomes more difficult and expensive as a network grows more sizable, decentralized, and valuable.


A

Aave

Aave is a decentralized lending and borrowing platform on Ethereum. Aave users can take out loans by providing collateral in the form of crypto assets. Lenders who provide collateral to Aave receive aTokens in return, which automatically pay interest to the holder with funds earned from platform trading fees. Aave has pioneered the technology of ‘flash loans,’ which allow for the uncollateralized lending of funds, so long as the principal is repaid within the same Ethereum transaction block.

AAVE Token

The AAVE token is an Ethereum-based ERC-20 asset used as the governance token of the Aave blockchain protocol. AAVE token holders have the ability to propose changes and vote to approve or deny new proposals to the Aave protocol. With significant enough distribution, AAVE tokens are intended to eventually accommodate the autonomous and decentralized governance of the Aave platform.

Acala USD Stablecoin (aUSD)

The Acala USD stablecoin (aUSD) is a stablecoin that is pegged to the U.S. dollar on a 1:1 ratio that operates on the Acala Network blockchain. aUSD facilitates the Acala Network's operation and is essential to the Acala decentralized finance (DeFi) platform. Users can borrow aUSD after they deposit cryptocurrency assets such as bitcoin (BTC), ether (ETH), or polkadot (DOT) through a Collateralized Debt Position (CDP) from the Honzon stablecoin protocol.

Account Abstraction Layer (AAL)

The Account Abstraction Layer (AAL) is the technical infrastructure that makes smart contract development possible on the Qtum blockchain. The foundational layer of Qtum follows the UTXO model used on blockchains such as Bitcoin. The AAL on Qtum allows the accounts model used on Ethereum to be “abstracted” or transferred in order to work on top of the UTXO model. Qtum’s AAL is the computing go-between that allows the UTXO and accounts models to interact.

Account Model

The account model is a blockchain architecture that features direct information and value transfer. Smart contract platforms such as Ethereum use the account model as opposed to the UTXO model used by the Bitcoin network, which limits the capabilities of smart contracts. One potential downside of the account model architecture is difficulty in scaling transactions per second (TPS).

Account-Checker Tool

An account checker is a script or program that takes a list of usernames and passwords — known as a combolist — and tests them against a set of target websites. Account-checker tools substantially increase the speed and efficiency with which an attacker can test a large volume of credentials on a broad range of websites and service providers. These tools are generally used by malicious actors looking to capitalize and commit fraud or identity theft against the account holders from whom they have stolen access.

Accredited Investor

An accredited investor is an investor who meets specific criteria pertaining to income, net worth, and qualifications. While such requirements can vary from country to country, generally accredited investors can include high-net-worth individuals (HNWIs), financial institutions, banks, and large corporations. Accredited investors are often able to access complex investments that other investors might not have access to — including venture capital firms, hedge funds, and angel investment enterprises. Accredited investors can also benefit from high returns and increased diversification, although the types of investments that are limited to accredited investors can also be subject to higher risk, high minimum investment amounts, low liquidity, and higher fees.

Acquirer Node (Crypto.com)

On the Crypto.com blockchain network, Acquirer Nodes facilitate the settlement of transactions between merchant and customer. There are two main types of Acquirer Nodes: Customer and Merchant Acquirer Nodes. The two node types communicate to verify merchant verification, perform settlement for users, and provide an escrow service that enables Crypto.com's wallet and debit card products.

Adaptive Information Dispersal Algorithm (Harmony)

Harmony’s Adaptive Information Dispersal Algorithm is used for segmenting shards of data on Harmony’s blockchain to allow for the faster propagation of blocks together with RaptorQ erasure encoding and other technology. The methodology is a critical component of Harmony’s adaptive state sharding solution.

Adaptive State Sharding (Elrond Network)

Adaptive State Sharding technology allows the Elrond Network to make use of parallel processing by combining three standardized sharding types (state, network, and transaction sharding) into one balanced high-performance system. The result is a secure blockchain with blazing fast scalability and transaction times. This enables shard merging and shard splitting to allow the network to operate more efficiently, thus improving overall network performance.

Admin Key

An admin key holds special access to make changes to a project's protocol or smart contract. It is typically held by a project's founders or core team. Proponents of decentralization argue that holding admin keys goes against decentralized governance practices and poses security risks, while many projects have stated their intention to eliminate them from practice.

Advanced Research Projects Agency Network (ARPANET)

Advanced Research Projects Agency Network (ARPANET) is an early version of the internet. ARPANET was created by the U.S. Department of Defense and used two technical foundations of the modern internet: a packet switching network with distributed control and TCP/IP.

Aeternity Blockchain

The Aeternity blockchain is known for its platform-specific Sofia smart contracts, Fate Virtual Machine (VM) framework, state channel scaling technology, as well as its own decentralized oracle and governance structure. Aeternity is designed for decentralized finance (DeFi), document, contract, invoice, and receipt management, payments, loans, blockchain-based identity, Internet of Things (IoT) blockchain identities and hardware, gaming, fungible and non-fungible tokens (NFTs), and other uses. Aeternity was conceptualized in 2016, raised funding through a token offering in 2017, and launched its mainnet in 2018.

Airdrop

An airdrop is a token distribution method in which assets are directly transmitted to user wallets for free. Airdrop recipients do not pay for tokens received. Typically used as a marketing tactic to create awareness around a project, airdrops can also result after a chain fork, token upgrade, or as part of a fundraising mechanism.

Airnode (API3)

An airnode is an oracle node designed to be easily deployable by application programming interface (API) providers that want to participate in the API3 blockchain protocol and bring their data feeds on-chain. Airnode enables API providers to run their own node with little-to-no maintenance, allowing them to interface their API data feeds with smart contract platforms. When an API provider uses an airnode, they become a first-party oracle that directly provides data to the blockchain without the involvement of intermediary nodes.

Alameda Research

Founded in 2017, Alameda Research is a quantitative trading firm that was founded by Sam Bankman-Fried. Alameda Research is one of the top liquidity providers in the cryptocurrency space.

Algorand Smart Contract (ASC1)

Algorand Smart Contracts (ASC1s) are smart contracts that operate on Layer 1 of the Algorand protocol. ASC1s generally represent relatively small smart contracts, with larger smart contracts being reserved for Layer 2. ASC1s are written in an Assembly-like programming language called Transaction Execution Approval Language (TEAL), which is then interpreted by Algorand nodes.

Algorand Standard Asset (ASA)

Algorand Standard Assets (ASAs) are on-chain assets native to the Algorand blockchain protocol. As on-chain assets, ASAs enjoy the same speed and security as Algorand’s consensus protocol itself. ASAs can be fungible or non-fungible, representing items as varied as stablecoins, in-game points, or a deed to a house. ASAs must essentially adhere to several parameters determined by Algorand, though they also allow developers some customizability.

Algorithmic Stablecoin

Algorithmic stablecoins do not use fiat or cryptocurrency as collateral. Instead, price stability results from the use of algorithms and smart contracts that manage the supply of tokens in circulation. In this model, the stablecoin’s algorithm automatically expands or contracts the number of tokens in circulation in order to meet a specific price target.

Algorithmic Trading

Algorithmic trading (also known as algo trading) is a modern method of market trading that utilizes computer software coded to follow a particularly defined set of mathematical instructions — an algorithm — to place one or many trades simultaneously. The formulas compute against price, timing, quantity, and other mathematical models to follow specific strategies. Algorithmic trading models execute thousands of trades to generate profits at a speed, frequency, and consistency impossible for a human trader. Algorithmic trading technology gives markets more liquidity and higher profitability, while also potentially eliminating human emotion and error that can negatively impact trading decisions.

All-Time High (ATH)

All-time high (ATH) is a term that denotes the highest price of an asset ever recorded on an exchange or market. ATH is the opposite of the all-time low (ATL), which conversely represents the lowest price at which an asset has ever traded. ATHs are generally set by assets during bull market uptrends in the blockchain and cryptocurrency market, when assets may experience periods of extreme growth in value.

All-Time Low (ATL)

All-time low (ATL) is a term that denotes the lowest price of an asset ever recorded on an exchange or market. ATL is the opposite of the all-time high (ATH), which conversely represents the highest price at which an asset has ever traded. ATLs are generally set by assets during harsh bear market downturns in the blockchain and cryptocurrency market, when assets have dropped substantially from previous ATH bull market prices.

Allocated Gold

According to the London Good Delivery set of regulatory and compliance standards, gold can be bought in two distinct forms: allocated or unallocated. When a customer purchases allocated gold, they have ownership over the gold and can choose to store it on their own, or in a vault at a London Bullion Market Association (LBMA) facility. Unallocated gold does not feature direct ownership over specific gold bars, but instead holds entitlement to a certain amount of gold.

Allocation

An allocation is an allotment of tokens or equity that is purchased, earned, or reserved for a specific investor, team, organization, or corresponding entity. Blockchain startups must determine their initial token allocation to facilitate the long-term viability of their business model, with various allocations for marketing, software development, and operational costs. Many blockchain projects also have their own treasuries and foundations which typically possess a specific token allocation as well. It is also common for blockchain startups to give early team members a specific token allocation, with the stipulation that they cannot sell their tokens for several years.

Alpha Coefficient

In a traditional financial context, alpha is a measure of the active return on an investment compared to a market index. For example, an alpha of 10% signifies that an investment’s return over a specific time frame performed 10% better than the average market return during the same period, while a negative alpha denotes that the investment underperformed the market. In contrast, beta measures the volatility of an investment and is an indication of its relative risk. Alpha and beta are two key coefficients that make up the capital pricing model that is utilized in modern portfolio theory.

Alpha Homora

Alpha Homora is a service-based protocol built by Alpha Finance Labs designed to allow users to earn interest on their crypto deposits through standardized yield farming and leveraged derivative yield farming. Initially, Alpha Homora V1 is built for Ethereum and BNB Chain and allows users to participate as yield farmers, liquidity providers, ether (ETH) and BNB lenders, bounty hunters, and liquidators. Alpha Homora V2, which will be built initially for Ethereum, hopes to expand these capabilities by allowing for leveraged yield farming and the simultaneous use of multiple assets.

Alpha Lending

Alpha Lending is a decentralized, permissionless pool-based lending and borrowing protocol that makes use of algorithmic autonomous interest rates. Designed to run on BNB Chain and Ethereum, Alpha Lending is designed to facilitate the use of cross-chain assets and to help maximize the return of investment for lenders and borrowers. The platform makes use of interest-bearing alTokens that represent the user’s share of their deposit (such as alBNB if BNB is deposited). Lending pool contracts on Alpha help facilitate the use of deposits, withdrawals, repayments, liquidations, and assets that are borrowed by users on the platform.

Alpha Version (Software Release)

The alpha version is one of many stages in the software release lifecycle needed to ultimately become a finalized production version. The cycle usually begins with the release of the pre-alpha, then the alpha, beta, release candidate (gamma and delta), release to manufacturing (RTM), general availability (GA) and finally the production or live release, in that order. An alpha version, like a beta version, represents an early version of a software implementation or blockchain network that must undergo several further stages of development to become a production version.

AlphaX (Alpha Finance)

AlphaX is a decentralized, non-orderbook perpetual swap trading marketplace that brings to decentralized finance (DeFi), a new trading product that was previously unavailable on-chain. AlphaX will also allow Alpha Homora users to hedge leveraged yield farming/liquidity providing positions and make use of a market-neutral leveraged position. AlphaX is specifically designed to minimize downside risk and makes use of three unique features that help set it apart from competitors, including: a funding rate that is baked into the price, the use of tokenized leveraged long and short positions, and minimized slippage through the dynamic k algorithmic model.

Altcoin

An altcoin is an “alternative coin,” or any cryptocurrency launched after Bitcoin. It refers to any cryptocurrency that is not bitcoin (BTC). Examples of altcoins include ether (ETH), dogecoin (DOGE), and litecoin (LTC).

alToken (Alpha Finance)

When an Alpha Lending Protocol user deposits an asset (like BNB), they in turn mint an alALPHA token (like alBNB) which is an interest-bearing asset that represents their initial deposit. The initial deposit is transferred into a smart contract that aggregates the total liquidity of each asset into a pooled fund that is available for borrowing. Then the interest borrowers pay is divided proportionally amongst liquidity providers.

alUSD (Alchemix)

The synthetic protocol token alUSD is used on the Alchemix decentralized finance (DeFi) lending platform. Alchemix users can deposit DAI in order to mint alUSD — a stablecoin that tokenizes a user’s future yield in Yearn.Finance vaults. In doing so, alUSD is the mechanism by which Alchemix offers automatically repaying stablecoin-backed loans.

Amazon Simple Storage Service (S3)

Amazon Simple Storage Service (S3) is a proprietary service offered by Amazon Web Services (AWS) that was launched in 2006 with the purpose of giving customers access to object storage via a specialized web interface. Amazon S3 utilizes the same storage architecture as its global ecommerce enterprise, and can be leveraged to store nearly any type of object like internet applications, data archives, backup and recovery, disaster recovery, analytics, hybrid cloud storage, and more.

Amazon Web Services (AWS)

Amazon Web Services (AWS) is a subsidiary of American ecommerce giant Amazon. AWS has become well known for providing on-demand cloud computing services to enterprises, individuals, and governments through a pay-as-you-go model. AWS also provides cloud server configuration and hosting, data storage and transfer, content delivery, networking, analytics, application services, and various distributed computing building blocks and tools. AWS offers its clients Amazon Elastic Compute Cloud (EC2) which allows users to make use of a virtual cluster of computers that emulates the attributes of a real computer and complex cloud computing systems all-in-one service.

Amazon Web Services (AWS) Lambda

Amazon Web Services (AWS) Lambda is a serverless computing service designed to let you run programs without having to run your own servers or do any code administration. By uploading your code as an image or ZIP file, AWS Lambda will automatically dedicate the amount of computational power necessary to run the code request. You can trigger the code to run automatically over hundreds of AWS and Software-as-a-Service (SaaS) applications, or control its execution directly from an online app. Lambda applications can scale to meet a program’s associated traffic and can be written in numerous programming languages.

Amortizing

Amortizing refers to the spreading of an initial or overhead cost across time or between parties. On the Orchid network, transaction costs are kept low by amortizing the fees across transactions and users. Transaction fees are slowly paid off or broken into increments that are then shared across a large network to reduce individual user costs.

Amp (AMP)

AMP is the digital collateral token of the Flexa network, a payment system that allows users to spend certain cryptocurrencies with select retailers at their brick and mortar locations. AMP is an ERC-20 token used as collateral to guarantee retail payments while blockchain transactions remain unconfirmed. The AMP token is the replacement for Flexacoin (FXC). Gemini Exchange is the first market to support the AMP token.

Anchor Protocol

Anchor Protocol is a savings protocol built to run directly on top of the Terra stablecoin ecommerce payment platform. It allows users to earn yield powered block rewards by lending out Terra deposits to borrowers who allocate liquid-stake Proof-of-Stake (PoS) assets from PoS blockchain protocols as collateral, in the form of bonded assets (bAssets). Anchor Savings employs no minimum deposits, account freezes, or sign-up requirements, and can be used by practically anyone in the world with access to the Internet. The Anchor ecosystem makes use of its main utility token (ANC) and other asset types designed specifically for use within Terra’s decentralized finance (DeFi) ecosystem.

Andre Cronje

Andre Cronje is the founder and lead developer of Yearn.Finance. He built most of the original Yearn products, then relinquished personal control of the protocol by launching the YFI governance token in 2020. Cronje remains an active figure and builder in the Yearn community and decentralized finance (DeFi) ecosystem.

Angel Investor

An angel investor, also known as a seed investor or private investor, is an individual who looks for new opportunities to fund start-ups with potential for growth. Angel investors typically lend new companies capital, sometimes in exchange for a certain percentage of ownership in the company. Angel investing can also include mentoring, business advice, marketing and advertising strategies, and connection facilitation to further the chances of the startup's success. Within the blockchain space, angel investors often participate in private sales or pre-sales that precede public funding rounds like Initial Coin Offerings (ICOs).

Ankr ETH (aETH)

Ankr ETH (aETH) is a synthetic asset that can be staked on the Ankr Network in place of staking ether (ETH). When a user deposits ETH in an Ankr deposit contract they receive aETH in return, thus lowering the barrier to entry for investors who wish to stake ETH without owning the minimum 32 ETH coins needed to stake on the Ethereum Consensus Layer (formerly known as Ethereum 2.0) to receive a yearly APY. When a user deposits ETH and receives aETH in return, their investment remains locked in for as long as the time required by users who stake 32 ETH on the Ethereum network.

Ankr Governors

Anyone who holds ANKR in a private, supported wallet is considered part of the platform's governance. These users can vote on proposals that influence where the project is heading.

Ankr Providers

Ankr providers provide the computing power that supports Ankr ”sidecars" running on an Ethereum Consensus Layer node, each of which holds up to a 32 ether (ETH) stake. Providers can use their hardware or deploy a node on Ankr. Providers also submit insurance, in ANKR or ETH, thereby helping to protect the network against poor node performance or unexpected fund withdrawals. If ANKR is the insurance, the equivalent of 2 ETH worth of ANKR is necessary to submit insurance. Rewards for an ANKR-funded node are issued in ANKR at the end of the staking period. The purpose of this guaranteed amount is to mitigate potential losses that stakers might incur.

Ankr Staking

Ankr staking (previously known as Stkr) is a system that employs assets such as aETH — Ankr’s version of Ethereum’s ETH, or ether — to address the current liquidity and accessibility hurdles associated with staking on the Ethereum Consensus Layer (formerly known as Ethereum 2.0). Normally, would-be validators must stake a minimum of 32 ETH to earn yearly staking rewards. In response, Ankr developed a unique model that improves the accessibility and liquidity of staking on Ethereum by allowing stakers to stake a smaller fractional amount of ETH via Ankr’s aETH (essentially creating a staking pool).

Annual Percentage Rate (APR)

An annual percentage rate (APR) on a loan is the amount of interest a borrower must pay each year. The APR is expressed as an annual percentage of the outstanding loan balance, and represents the annual cost of borrowing.

Annual Percentage Yield (APY)

The annual percentage yield (APY) refers to the rate of return earned on a deposit over one year. APY takes into account compounding interest, which is calculated on a periodic basis and added to the balance.

Anti-Malware

Anti-malware is a category of software designed to prevent, detect, and remove malware. Malware refers to any type of 'malicious software' that is specifically designed to cause damage to computers and computer systems. Examples of malware include viruses, trojan horses, and ransomware among others.

Anti-Money Laundering (AML)

Anti-Money Laundering (AML) is a comprehensive set of processes, regulations, and rules that combat money laundering, terrorism funding, and financial crimes like cyber theft and fraud. AML procedures require financial firms to monitor transactions to ensure that funds are not part of criminal activities, circumventing tax laws, or violating any other regulations. An AML check is often required to access financial services in the blockchain industry.

Antivirus

Antivirus is a category of software that is designed to prevent, detect, and remove computer viruses. Computer viruses are malicious computer programs that are designed to replicate themselves and cause damage to computers and computer systems.

Anyswap

Anyswap is a cross-chain protocol that allows you to deposit coins and convert them into wrapped tokens; via cross-chain swap you can also send or convert assets between compatible blockchains. Anyswap is compatible with coins that use either the Elliptic Curve Digital Signature Algorithm (ECDSA) or the Edwards-curve Digital Signature Algorithm (EdDSA). These coins include bitcoin (BTC), ether (ETH), cardano (ADA), litecoin (LTC), bitcoin cash (BCH), stellar lumens (XLM), and many more.

Aping In

This refers to a crypto investor taking a significant portion of their net worth and investing it in a relatively unknown coin or token in a reckless manner. When you “ape in,” you tend to buy a project upon its release, conduct little-to-no research, and buy more than you can afford to lose (if the price falls). Aping in is done in the hopes of experiencing stratospheric gains; while this occasionally happens, those who “ape in” often experience heavy losses — sometimes losing their entire investment.

Application Binary Interface (ABI)

An application binary interface (ABI) is a standardized method for engaging with smart contracts in a blockchain ecosystem. ABIs allow smart contracts to engage with external data, as well as with other contracts internal to the blockchain platform. ABIs are similar to application programming interfaces (APIs) in that they enable separate software systems to communicate and interact with each other.

Application Blockchain Interface (ABCI)

The Application Blockchain Interface (ABCI) is a specialized application programming interface (API) built by Tendermint, the company that created the Cosmos blockchain. The ABCI is designed to operate as a middle layer that allows blockchain-based replication engines present on several computers and a deterministic state machine (the application) present on a single computer to communicate. In simpler terms, the ABCI allows a blockchain protocol to communicate with an application to enable application development and other related purposes.

Application Layer

The application layer is made up of the user interface (UI) that is responsible for customer interaction, often via a mobile or desktop application. The application layer also consists of business logic, which is responsible for exchanging certain algorithmic data so that applications are able to function optimally and make use of smart contracts and other mechanisms. The application layer is considered the client-layer or front-end of the system, with the opposite end of the system known as the bank-end or data access layer (DAL).

Application Programming Interface (API)

An application programming interface (API) is a set of protocols and codes that determine how different software platforms communicate and share information. APIs define different types of requests and calls that can be made, the data types that can be used, and how to make these requests. It serves as an intermediary between different software systems. A developer can use an API to incorporate features of an external application into their own software. By allowing different platforms to communicate, APIs enhance interoperability across the web.

Approved Address

For a wallet, exchange, or blockchain-based financial services platform, an approved address refers to a list of addresses permissioned for transactions on an account. Addresses not included on the list are prohibited from certain transactions. An approved address is typically implemented for security and compliance reasons.

AR Token (Arweave)

AR is the native token of the Arweave protocol. It allows users to pay for storage and is used to reward miners for storing data.

Aragon Client

The Aragon client is a decentralized application (dApp) designed for Aragon One, and is used for creating and managing decentralized autonomous (DAOs) built on the Aragon network. This process works by running Aragon apps inside the client, instantly giving Aragon application developers the capability to perform sandboxing, transaction pathing, application listing, and human readable transactions. Further, it allows notifications to be sent to a system's users. Basically, the Aragon client allows the complex DAO creation process to become simpler for application developers so they can focus on creating and managing new and existing DAOs.

Aragon Court

Aragon Court is a mechanism that allows organizations built on Aragon to solve disputes that they are unable to resolve themselves. When an organization escalates a dispute to the court system, they must first deposit collateral and pay fees. Then, jurors are randomly selected to review and rule on the dispute. After the jurors deliver their verdict by a majority vote, the parties involved can choose to appeal the decision, sending it to a larger pool of jurors for review. For the appeal to move forward, both parties in the dispute must deposit additional ANT as collateral.

Aragon Network Agreement

Holding ANT enables you to participate in the governance of the Aragon Network DAO and Aragon Court. More specifically, ANT holders can amend the Aragon Network Agreement, an agreement that contains the human-readable rules of the Aragon Network and is used to guide rulings in Aragon Court; alter the Aragon Network DAO and Aragon Court and their parameters; and govern a common funding pool.

Aragon Network DAO

The Aragon Network DAO is an organization that provides infrastructure and services to the Aragon Network and its users for the creation of decentralized autonomous organizations (DAOs), decentralized applications (dApps), and other blockchain infrastructure. In doing so, the Aragon Network DAO interacts with Aragon’s ANT token, Aragon Court, Aragon Client, aragonOS, Aragon Network Agreements, and other related technologies.

aragonOS

The aragonOS (Aragon Operating System) is a smart contract system designed to manage Aragon organizations and entities. AragonOS is used to help define stakeholders of the organization and outline their rights. Through aragonOS, organizations can also install apps, which allow them to integrate functions such as fundraising, voting, and payments. Anyone can develop an app, use it within their organization, and make it available for the Aragon ecosystem.

Arbitrage

To arbitrage is to exploit the price difference of an asset or security between two markets for profit. For example, if one bitcoin (BTC) is selling for USD 40,000 on exchange ABC and USD 40,015 on exchange XYZ, then an arbitrageur can generate a profit of USD 15 for every BTC they arbitrage between these exchanges. Arbitraging can be automated by utilizing sophisticated computer systems and software to monitor prices and conduct high-volume trades that take advantage of even slight differences in price. Arbitrage is a necessary financial mechanism that keeps prices consistent between different exchanges and other financial markets.

Arm Virtual Machine (Qtum)

ARM is Qtum’s Virtual Machine (VM), which was developed in Intel's x86 machine language. The x86 Virtual Machine allows developers to write smart contracts in a variety of programming languages including C, C++, Rust, and Python. Qtum previously utilized the Ethereum Virtual Machine (EVM), but created the x86 to expand on its capabilities. ARM is fully compatible with Solidity (the language built for, and used on the Ethereum network), allowing Ethereum developers to seamlessly build applications on the Qtum blockchain.

Artificial Intelligence (AI)

Artificial intelligence (AI) is a branch of computer science that is focused on building programs — or smart machines — that are able to perform decision-making and problem-solving tasks that normally require human intelligence. AI is used for self-driving car programs, financial trading tools, spam detection, and a host of other applications throughout different industries.

ASIC Miner (ASIC Mining)

An application-specific integrated circuit (ASIC) miner is a specialized type of computerized mining rig that is used to mine bitcoin (BTC) and other types of cryptocurrency. Originally, crypto mining rigs were designed to mine cryptocurrency using a central processing unit (CPU) on a laptop or personal computer, but eventually graphical processing unit (GPU) miners — and subsequently ASIC miners — surpassed the capabilities of this traditional model. ASIC miners are built specifically to complete the mining process much faster and efficiently than traditional computers and are quite expensive to design and manufacture.

ASIC-Resistance

ASIC-resistance is a design feature that has been implemented on some Proof-of-Work (PoW) blockchains to prevent them from being dominated by application-specific integrated circuit (ASIC) miners. The purpose is to help the mining on a chain be more equitable for retail miners while maintaining mining decentralization. This is generally done by using a bespoke mining algorithm or periodically changing the algorithm to prevent profitable ASIC miners from being developed. Despite some blockchains being designed to be ASIC-resistant, many have since become dominated by ASIC miners that have overcome the various ASIC-resistant designs and countermeasures.

Asset

An asset is anything of monetary value that can be owned or purchased. Within the context of investing, assets can refer to a variety of financial and physical instruments. Examples of assets include stocks, real estate, precious metals, and fiat currency (such as USD).

ASSETS (The Sandbox)

In The Sandbox game, ASSETS are tokens created by players who build user-generated content. ASSETS utilize the ERC-1155 standard.

Assets Under Management (AUM)

Assets under management (AUM) is a measurement used to signify the total market value of all assets being managed by a financial fund, institution, or portfolio manager. However, the exact definition of what AUM constitutes is ambiguous because not all institutions classify different types of assets in the same manner. The AUM value fluctuates due to regular market movements and because of money inflows and outflows to and from the fund.

Asymmetric Encryption

Asymmetric encryption is a cryptographic system that uses a public key for encryption and a private key for decryption. The public key can be shared with anyone, while the private key is meant to be kept secret to maintain security. Asymmetric encryption is considered more secure than symmetric encryption, which uses one key for both encryption and decryption. The Bitcoin network uses asymmetric encryption.

Asynchronous Byzantine Fault Tolerance (aBFT)

Asynchronous Byzantine Fault Tolerance (aBFT) is a consensus mechanism that improves on typical Byzantine Fault Tolerance (BFT) consensus by solving the Byzantine General’s Fault problem in a unique way. Through aBFT, nodes are able to reach consensus independently by making use of a two-stage block confirmation process using a two-thirds supermajority. The first stage proposes a last irreversible block (LIB), while the second stage finalizes the proposed LIB to make the block irreversible. ABFT consensus is considered leaderless, with no independent leading node responsible for block creation and finalization, resulting in a faster and more secure network. The Fantom and Hedera Hashgraph protocols and other networks employ different variations of aBFT.

aToken (Aave)

An aToken is an ERC-20 token that represents an ownership claim on an underlying asset in the Aave protocol. When a user deposits assets into Aave liquidity pools, the platform automatically generates an aToken in return. For example, providing DAI to Aave would automatically mint aDAI. Holders of aTokens continuously earn interest on their deposits, the value of which is represented in the aToken.

Atomic Swap

An atomic swap is a peer-to-peer (P2P) exchange of crypto assets between two parties without the use of a trusted third party, such as a centralized exchange. Atomic swaps utilize smart contracts to exchange crypto assets between different blockchain networks through a process of locking, verifying, and unlocking.

Auction

An auction is a type of market that allows buyers and sellers to engage with each other through bidding. Auctions have the benefits of elevated liquidity and price discovery.

Audit (Blockchain or Smart Contract)

An audit is a process that involves the thorough analysis of a blockchain's codebase, or a particular application’s smart contracts, in order to identify errors in code, incorrect design, security issues, and other related inefficiencies. It is essential for blockchain protocols and applications to audit their entire codebase to ensure that the blockchain, and its interrelated applications and smart contracts, are not susceptible to attackers or other challenges. A typical audit often involves agreeing on certain audit specifications, executing tests, running symbolic execution tools, extensive code analysis, and the creation of a report to show the results.

Augmented Reality (AR)

Augmented reality (AR) is an interactive experience that enhances objects from the real world through computer-generated perceptual information, via various sensory mechanisms including sound, touch, smell, and sight. AR is typically defined as a system that makes use of three distinct features: the combination of the real and virtual worlds, real-time interaction, and accurate 3D registration of virtual and real objects. AR is different than virtual reality (VR) because it doesn’t replace the user’s real-world environment with a virtual one, it alters an individual's perception of the world by enhancing or changing how it interacts with the individual.

Augur Decentralized Oracle System

The Augur Decentralized Oracle System is Augur’s proprietary oracle system, which was built to help data from the physical world and the blockchain world communicate. Augur’s oracle system helps the prediction market platform reach a consensus regarding outcomes by aggregating continuous real-time price feed data from the internet (through sources like CoinMarketCap, CoinGecko, and Binance) to achieve the most accurate live price data on an ongoing basis. Typically, market outcomes rely strongly on market price feed validation. The Augur Decentralized Oracle System works by using a Designated Reporter who stakes REP tokens to report on the outcome of events across different markets.

Authentication

Authentication is a procedure that verifies the identity of a user before access is granted. To gain access — to an account, platform, private space — the user provides login credentials like passwords, SMS codes, and fingerprints. Authentication generally comes before authorization, which is a verification of a user’s level of access.

Authority Masternode (AM) (VeChain)

Authority Masternodes (AMs) maintain network consensus and the security of the VeChainThor blockchain. AMs are responsible for block propagation on the platform and enable VeChainThor's Proof-of-Authority (PoA) consensus methodology. In order to host an AM, the user must hold 25 million VeChain tokens (VET) and go through a rigorous authentication process. AMs are the most powerful nodes in VeChain's nodal hierarchy, and are very limited in number.

Authorization

Authorization is a procedure that verifies a user’s degree of access. It determines a user’s permission and access to content or resources. Authorization generally comes after successful authentication, or verification of identity.

Automated Clearing House (ACH)

An automated clearing house (ACH) is an electronic network that processes financial transactions in the U.S. An ACH payment pulls funds directly from a user’s bank account and deposits them into the recipient's account. A common type of ACH transaction is a direct deposit payment from an employer.

Automated Market Maker (AMM)

An automated market maker (AMM) is a fully automated decentralized exchange (DEX) where trades are made against a pool of tokens called a liquidity pool. An algorithm regulates the values and prices of the tokens in the liquidity pools. Since AMMs do not rely on an active market of buyers and sellers, trades can occur at any time. Examples of popular AMMs include Uniswap, Curve, and Balancer.

Autonomous Economic Agent (AEA) (Fetch.ai)

An autonomous economic agent (AEA) is a software entity capable of performing actions without external control or input. Once created and given a directive, AEAs can operate on their own behalf — possessing a type of agency. On the Fetch.ai platform, AEAs contain a unique identifier as part of each agent’s wallet, which allows the AEA to transact with the network’s native FET tokens. Among other forms, AEAs may exist purely as software, as an application programming interface (API), or be paired to hardware in the real world (like a thermometer or other type of sensor).

Ava Labs

Ava Labs is the blockchain development company responsible for the creation and design of the Avalanche blockchain protocol and ecosystem. Ava Labs was founded in New York state by Cornell professor and Avalanche CEO, Emin Gün Sirer, and several other founders. Ava Labs is also responsible for the creation of other projects, including Ryval.

Avalanche Virtual Machine (AVM)

The Avalanche Virtual Machine (AVM) is the native virtual machine that helps developers establish and deploy new blockchains that run on the Avalanche platform. To help facilitate this process, the system makes a copy of the AVM and deploys it to operate on a new blockchain or subnetwork within the Avalanche ecosystem. The main AVM is also designed to help the system create various smart contracts and decentralized applications (dApps) for decentralized finance (DeFi) use, enterprise use, and other uses.

Average Directional Index (ADX)

The average directional index (ADX) is a technical indicator used to quantify the strength of a trend in a market. The ADX is calculated based on the moving averages of prices and is represented by a number ranging from 1 to 100, with a higher number indicating a stronger trend.

Axie Infinity

A blockchain-based gaming metaverse in which players collect and breed digital pets called Axies that can be used to compete in a turn-based card game. Axies can also be bred and sold.

Axie Infinity Shards (AXS)

Axie Infinity Shards (AXS) is the governance token of Axie Infinity. It is an ERC-20 token that was sold in public and private sales in 2020. The token can be used to vote on changes to Axie Infinity and can be staked to earn rewards.


B

BABE Consensus Mechanism (Polkadot)

The Blind Assignment for Blockchain Extension (BABE) is one of the two central components of the hybrid consensus mechanism that Polkadot utilizes to secure and maintain its network. BABE is a mechanism for producing blocks, while its counterpart, GHOST-based Recursive Ancestor Deriving Prefix Agreement (GRANDPA), is a mechanism for finalizing the state of the blockchain.

Back End (Computing Architecture)

The back end of a computer system or network refers to the portion of the system that is not displayed on the user’s screen, or front end. Back-end developers normally make use of various programming languages like JavaScript, C, C++, and WebAssembly (WASM) along with other tools to create the back end, or data access layer (DAL), of a computer system. In contrast, the front end is the portion of the website or system that the user interacts with on the screen, also commonly known as the screen or graphical user interface (GUI).

Back-End Software Development

Back-end software development is the process of creating computerized systems that are not displayed on the user’s screen, or front end. Back-end developers use various programming languages — such as JavaScript, C, C++, WebAssembly (WASM), and others — along with other tools to create back-end portions of the computer system, or data access layer (DAL). In contrast, front-end software development is the process of developing the portion of websites that users directly interact with, like the screen or graphical user interface (GUI), which is often called the front end.

Backdoor

A backdoor refers to any method that can circumnavigate regular authentication and authorization procedures to gain root or high-level access to a system, computer, application, or network. Backdoors are commonly installed through remote file inclusion (RFI), which identifies a weak component in an application or a network. This type of channel allows direct control over an infected device to manipulate data, deploy more malware, or create a zombie network of infected computers for criminal activity.

Backtesting

Backtesting is the simulation of a trading strategy based on historical data. Traders use backtesting to prove that their trading system works based on historical results. In trading and investing, past performance does not guarantee future results, which means a strategy that performs well in backtesting may not perform as well going forward.

Backwards Compatibility

Backwards compatibility is a characteristic of software that means updates to the software do not make old versions of the software unusable.

Bag

Bag is a slang term that refers to particular crypto asset holding — typically referring to a higher-than-average quantity of the asset. While there is no specific universal threshold of exactly how many tokens or coins constitutes a bag, the expression generally distinguishes the different types of tokens or coins that are present in an investor’s portfolio. An investor may also refer to a relatively large holding of a cryptocurrency as a 'heavy bag.'

Baiting

Baiting is a form of social engineering that exploits victims with false promises of financial gain. Malicious actors, bots, or online ads 'bait' victims with quick payouts and riches in exchange, while the process to obtain it involves providing personal information or downloading software infected with malware.

Bakers (Tezos)

On the Tezos network, Bakers are nodes with the responsibility of producing new blocks, and are incentivized for their work with rewards in XTZ. Bakers are Tezos community members who possess a minimum amount of XTZ, and enough hardware and software expertise to run a baking node within the Tezos Proof-of-Stake network. Through a process of token staked delegation, bakers may also produce blocks and earn rewards on behalf of non-Bakers within the Tezos ecosystem.

Baking

Akin to the process of staking in many Proof-of-Stake models, baking is the process of adding new blocks to the Tezos blockchain. The baking process involves adding, signing, and verifying new blocks, and depositing a specified amount of XTZ as collateral to guarantee honest behavior.

BAL Token

The BAL token is the governance token for the Balancer protocol. BAL tokens are earned by liquidity providers who supply tokens to Balancer pools. BAL holders can propose and vote on changes to the protocol.

Balance Freeze Functionality

On the Ripple network, balance freeze is the function through which Ripple gateways freeze or halt transactions in order to prevent any abuse of the system for illicit activity. Balance freeze functionality is a powerful security feature that can only be applied to currencies issued on the Ripple network, and not on the XRP token itself.

Balancer

Balancer is a non-custodial portfolio manager and automated market maker (AMM) built on Ethereum that pools up to eight different tokens for users to trade. These Balancer pools are self-balancing weighted portfolios with specific parameters. The Balancer protocol allows all Ethereum accounts to add tokens to existing public pools or create their own private pools.

Bancor Network Token (BNT)

The Bancor network token (BNT) is the default reserve currency that powers the Bancor protocol. The Bancor network is a decentralized exchange (DEX) platform that uses pools of tokens called liquidity pools to facilitate peer-to-peer (P2P) trading. Bancor liquidity pools must hold BNT, which acts as the intermediary token for every trade. For example: in order to trade DAI for ether (ETH) on Bancor, the protocol first exchanges DAI for BNT, then exchanges BNT for ETH.

BandChain

BandChain is the name of the main network that allows the Band Protocol oracle system to operate. The BandChain allows entities to request data from application programming interfaces (APIs) or other traditional web services, facilitating the transfer of real-world data to a blockchain system’s online environment. BandChain is built to be compatible with most blockchain and smart contract development frameworks. BandChain pulls data from external sources, aggregates their data, and packages them into a format that can be used and verified efficiently across a multitude of blockchain types.

Bandwidth

Bandwidth is the amount of data capacity available for transactional throughput on a network. It is normally measured by the number of megabytes or gigabytes per second. If a network's bandwidth limit is reached, the flow of data will become inadequate to handle the volume, and connections will slow down.

Bank for International Settlements (BIS)

The Bank for International Settlements (BIS) is an international financial institution based in Basel, Switzerland that is owned by numerous global and central banking stakeholders. Its purpose is to guide international monetary policy and administer financial cooperation, alongside serving as a bank for central banks and other international organizations.

Banking as a Service (BaaS)

Banking as a Service (BaaS) is a type of software platform that provides financial services. BaaS provides infrastructure for legacy banking systems to connect and share data with third-party financial service providers to create new products. BaaS can be thought of as the ‘middleware’ between legacy financial institutions and financial technology (FinTech) start-ups.

BarnBridge

BarnBridge is a decentralized finance (DeFi) platform for tokenizing risks. By tokenizing risk exposure, BarnBridge can increase volatility for traders, or decrease it for more conservative investors. BarnBridge seeks to lessen the risk involved with joining the DeFi industry by supplying more predictability, thereby attracting a wider range of participants.

Base Currency

A base currency is the currency against which an exchange rate is quoted. It is the first currency referenced in a currency pair. In the BTC/USD currency pair, which references the price of bitcoin (BTC) in terms of USD, the base currency would be BTC, and the quoted currency would be USD.

Basic Attention Token (BAT)

The Basic Attention Token (BAT) was created to provide a more effective, fair, and transparent mechanism for connecting and rewarding internet users, advertisers, and publishers. In this digital advertising system, users are rewarded with BAT for their attention, publishers receive BAT based on user attention, and advertisers achieve higher return on investment (ROI) and better targeting. BAT was created by the team behind the Brave web browser and is integrated into the Brave ecosystem.

Basket of Currencies

A basket of currencies (as they relate to blockchain) can be a pool of tokenized real-world assets such as commodities, bonds, securities, and stablecoins that represent fiat currencies. Additionally, a basket of currencies can also consist of bitcoin (BTC), ether (ETH), and other large cap cryptocurrencies. In traditional finance, a basket of currencies is simply a collection of multiple stocks or securities that are often from the same — or a similar — asset class. These baskets can be used for derivatives trading and for the function of financial instruments, and they are often managed by institutional investment funds, hedge funds, mutual funds, and exchange-traded funds (ETFs).

Beacon Chain

The Beacon Chain is the first stage of the launch of the Ethereum Consensus Layer (formerly known as Ethereum 2.0), an upgrade to the Ethereum network. The Beacon Chain introduces the Proof-of-Stake (PoS) consensus mechanism to the network and allows ether (ETH) holders to stake their ETH and become network validators. The Beacon Chain was designed to be the primary mechanism for coordinating data, users, and assets across the upgraded Ethereum network. It was launched on December 1, 2020.

Bear Flag (Technical Formation)

A bear flag is a technical charting pattern shaped like a flag that often signals bearish momentum and a decrease in price. Bear flags mimic the structure of a bull flag, only inverted. With a bear flag, the flagpole is formed during a significant drop in price that traders are often not expecting, while the flag itself is formed during a brief period of consolidation that usually signals a downward continuation in price. Bear flags, like all technical formations, can sometimes be negated and fail to produce the results they may have originally indicated.

Bear Market

A bear market occurs when the market experiences price declines, typically when prices fall 20% or more from recent highs. A bear market is the opposite of a bull market.

Bear Trap

A bear trap is a form of market manipulation that can be carried out by wealthy investors working together to manipulate the price of an asset. By arranging to sell a large amount of an asset, like a cryptocurrency, at roughly the same time, a significant price drop occurs. This is intended to persuade other market participants to sell the same asset, resulting in a further price decline. Shortly afterwards, the initial sellers buy back in at a lower price, boosting the price upwards, only to then potentially sell the asset once again for more profit.

Beeple

Michael Winkelmann, famously known as Beeple, is an American animator and graphic designer. In early 2020, Winkelmann began selling his non-fungible tokens (NFTs), which often sell for hundreds of thousands of dollars per piece (or more). His most expensive NFT to date, Everydays: the First 5000 Days, sold in February 2020 for nearly USD 70 million through a Christie’s auction.

Behavior-Based Detection Method

Behavior-based detection methods are used by advanced malware protection programs to identify suspicious activity. The protection programs analyze and review code for potentially harmful behavior, network attacks, and the installation of rootkits and malware.

Benchmark Index

A benchmark index refers to a preeminent index security used as a measure, or benchmark, against which one can track performance of the wider market. Common benchmark indexes include the S&P 500, Nasdaq Composite, and Russell 3000.

BEP-2 Tokenization Standard

BEP-2 is the tokenization standard which is used to facilitate the transfer of BNB Beacon Chain (previously Binance Chain) assets operating on the BNB chain. All BNB Beacon Chain addresses begin with bnb as the first three letters (paying tribute to the symbol for Binance’s main coin BNB). BNB Beacon Chain is one of two main blockchain networks built and designed by Binance — the other being BNB Smart Chain (formerly known as Binance Smart Chain).

BEP-20 Tokenization Standard

BEP-20 is the tokenization standard used to facilitate transfer of BNB Smart Chain tokens (previously Binance Smart Chain) operating on the BNB Smart Chain. BEP-20 addresses are nearly identical to their Ethereum ERC-20 address counterparts, meaning that BNB Smart Chain tokens are interoperable with the Ethereum network. This is an important feature that allows for the transfer of tokenized assets and other data between Ethereum, BNB Smart Chain, BNB Beacon Chain, and potentially other blockchain protocols like Cardano and Polkadot, furthering blockchain protocol interoperability.

Beta Coefficient

In a traditional financial context, beta measures the volatility of an investment and is an indication of its relative risk. In contrast, alpha is a measure of the active return on an investment compared to a market index. Alpha and beta are two key coefficients that make up the capital pricing model that is utilized in modern portfolio theory.

Beta Version (Software Release)

A beta version is a test version of a software product that is still undergoing development. A beta version is typically released to a select number of public users outside the company to undergo beta testing. Feedback from this testing allows developers to see how to fix product issues and improve the product’s user experience (UX). A blockchain network beta version — such as a testnet or devnet — is typically an early version that must go through several stages of development and improvement prior to the public release of the final blockchain protocol.

Bid-Ask Spread

A bid-ask spread is the difference between the bid (buy) and ask (sell) price of a particular asset on an exchange. The bid price can be thought of as representing demand, while the ask price represents supply. A large bid-ask spread is a sign of poor liquidity in a market.

Big Tech

Big Tech is the name given to the five largest companies in the information technology (IT) industry in the United States, and includes Meta (Facebook), Amazon, Apple, Google, and Microsoft. The members of Big Tech have become among the most valuable publicly traded companies in the world, with each having a market capitalization from USD 500 billion–2 trillion. Because Big Tech has so much power and international influence, concerns have repeatedly been raised that their monopolistic business practices are too centralized, focused on excessive profit, offer poor security and privacy, and feature widespread data theft.

Binance (Cryptocurrency Exchange)

Founded in 2017, Binance is a cryptocurrency exchange that offers spot trading, staking, lending, borrowing, a non-fungible token (NFT) marketplace, and numerous types of derivative trading solutions, among many other services. Binance also built and operates two distinct blockchains: BNB Smart Chain (formerly Binance Smart Chain) and BNB Beacon Chain (previously Binance Chain). Collectively, these two blockchains are referred to as simply BNB Chain.

Binance Decentralized Exchange (DEX)

The Binance Decentralized Exchange (DEX) is a DEX built by Binance and designed to give traders and investors control of their private keys and investments without the need for a centralized intermediary. Binance’s BNB coin is often required to make use of the Binance DEX because most of the trading pairs on the exchange feature BNB.

Binance Labs

Binance Labs is a social impact fund and initiative built to incubate, invest in, and facilitate the widespread adoption of various blockchain and cryptocurrency start-ups, projects, and entrepreneurs. The mission of Binance Labs is to contribute to social impact causes around the globe and help grow the blockchain space by developing the knowledge base and skill sets of existing experts in the industry. It also intends to increase the number of developers and technologists involved in the blockchain and crypto industry to further the adoption of blockchain technology.

Binance Launchpad

Binance Launchpad is a token launch platform owned by the Binance crypto exchange. The platform helps blockchain projects raise funds by selling their tokens to Binance’s users.

Binance USD (BUSD)

Binance USD (BUSD) is the stablecoin developed and employed by the Binance exchange platform. BUSD is pegged at a 1:1 ratio to the U.S. dollar and was initially deployed on the BNB Chain. BUSD is also interoperable with other blockchains such as Ethereum, and can be used for various decentralized finance (DeFi) applications and value transfers between blockchains. BUSD is one of the largest USD-pegged stablecoins in the world with a market cap of approximately USD 18 billion (as of June 2022).

Binary Code

Binary code is a representation of text, computer processor instructions, or any other type of data using a two-symbol system, usually “0” and “1” from the binary number system. Binary code is used to assign a pattern of binary digits, or bits, to each character or instructional format, such as a binary string of eight bits which can denote any of the 256 possible values to represent a far-ranging variety of diverse items. Binary codes are typically used for different ways of encoding data from one format to another, such as from character strings to bit strings.

Bitcoin

Bitcoin is a blockchain network with a native cryptocurrency, also called bitcoin (BTC). It is the first blockchain and cryptocurrency, hence its dominant presence within the broader crypto ecosystem. Bitcoin was established in 2009 and pioneered Proof of Work (PoW), a technology for reaching consensus on a decentralized network.

bitcoin (BTC)

Bitcoin (BTC) is a cryptocurrency that can be directly transmitted between users on the Bitcoin network. It is spelled with a lowercase B, as compared to the Bitcoin network, which is denoted with an uppercase B.

Bitcoin Cash

Bitcoin Cash is a hard fork of the Bitcoin network that serves as an electronic cash payment system. Its cryptocurrency, bitcoin cash (BCH), was designed to be a more practical cryptocurrency for everyday transactions than bitcoin (BTC). The Bitcoin Cash protocol’s larger block size encourages use as a payment system due to its cheaper transaction fees (when compared to Bitcoin).

Bitcoin Core

Bitcoin Core is the main implementation of the software that allows users to interact with the Bitcoin blockchain. Bitcoin Core was initially created by Satoshi Nakamoto, but is not owned by any single entity, business, or organization. Nevertheless, it is updated, maintained, and reviewed by a global community of software engineers and computer scientists. By running the Bitcoin Core code, a user acts as a node on the network that can independently verify both the validity of block creation on the network and the transactions sent by network users.

Bitcoin Dominance (BTCD)

Bitcoin dominance (BTCD) is a metric that measures the market cap of bitcoin (BTC) — the world's largest cryptocurrency — in relation to the total market cap of all other cryptocurrencies combined. BTCD is often perceived to have a correlation to the performance of Ethereum and all other alternative cryptocurrencies, or altcoins. Generally, when BTCD decreases, the value of other cryptocurrencies increase in what is sometimes referred to as an "alt season." However, when BTCD increases, BTC tends to outpace other cryptocurrencies.

Bitcoin Genesis Block

The first block mined on the Bitcoin blockchain, called the genesis block, was mined on January 3, 2009 by Satoshi Nakomoto, the creator of Bitcoin. Satoshi also encoded a message in the genesis block that read, “The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.” This is a reference to the global financial crisis of 2007–2009. It is hypothesized that Bitcoin was created to avoid the exploitation of the global banking system.

Bitcoin Improvement Proposal (BIP)

A Bitcoin Improvement Proposal (BIP) is a code change introduced to improve the Bitcoin protocol. A BIP can be submitted by anyone to be evaluated and reviewed. Significant BIPs include BIP 32, BIP 39, and BIP 44.

Bitcoin Improvement Proposal (BIP) 32

Bitcoin Improvement Proposal (BIP) 32 established the standard for hierarchical-deterministic (HD) wallets, a technical improvement over earlier wallets that only had random key pairs. BIP 32 allowed for the creation of a hierarchical tree-like wallet structure with more advanced cryptographic security mechanisms. HD wallets are defined by a master key pair at the top of the hierarchy that “determines” all the private key and key pair access codes below it in the access hierarchy.

Bitcoin Improvement Proposal (BIP) 38

Bitcoin Improvement Proposal (BIP) 38 enabled wallet holders to encrypt Bitcoin private keys with a password to offer an extra layer of protection. An encrypted private key requires that a user hold both the private key and the password in order to access wallet funds. This makes private key management a critically important step, where BIP 38 is commonly used for paper wallets and other analog devices for security purposes.

Bitcoin Improvement Proposal (BIP) 39

Bitcoin Improvement Proposal (BIP) 39 allows for the generation of a human-readable 12–24 word recovery phrase for hierarchical-deterministic (HD) wallets. With the recovery phrase, users can regenerate an HD wallet that has become lost or damaged. Because they hold such access, BIP 39-enabled recovery phrases should be kept secret and stored securely.

Bitcoin Improvement Proposal (BIP) 44

Bitcoin Improvement Proposal (BIP) 44 improves on BIP 32’s hierarchical-deterministic (HD) wallet structure by creating a specific hierarchy that allows for multiple accounts to be held on the same wallet. BIP 44 allows two or more separate accounts on the same wallet to hold the same cryptocurrencies in different amounts. These separate accounts can be used for different purposes and coexist in a way similar to checking, business, and savings accounts at legacy banks.

Bitcoin Network

The Bitcoin network is a peer-to-peer (P2P), decentralized network that allows users to send units of value to each other without any intermediary or bank. The term “Bitcoin” with a capital B denotes the network, while the term "bitcoin" with a lowercase b denotes the network's native cryptocurrency BTC.

Bitcoin Next Generation (Bitcoin-NG)

Bitcoin Next Generation (Bitcoin-NG) is a Byzantine Fault Tolerant (BFT) blockchain protocol proposed and built by the founder of Ava Labs, Emin Gün Sirer, and several other leading computer scientists in an attempt to combat the perceived scalability and block size inefficiencies of the original Bitcoin network. Distinct versions of Bitcoin-NG have been implemented into the Waves and Aeternity blockchain protocols, but the Bitcoin-NG network has not released its own cryptocurrency.

Bitcoiner

A Bitcoiner is a Bitcoin enthusiast who also typically owns some bitcoin (BTC) and is an active proponent and enthusiast of the Bitcoin network. Bitcoiners often believe that the Bitcoin protocol’s BTC coin is the most important and significant digital asset available.

Bitcointalk

Bitcointalk is an internet message forum that was launched by pseudonymous Bitcoin creator Satoshi Nakamoto in 2009 to host discussions about Bitcoin, blockchain, and cryptocurrency. It became the meeting point for the embryonic blockchain industry, and was the site of the first bitcoin (BTC) purchase: 10,000 BTC in exchange for two pizzas. Bitcointalk is still in operation today, fostering discussion and community between 450,000+ developers, investors, miners, programmers, and enthusiasts.

BitLicense

The BitLicense is a business license for virtual currency activity that crypto enterprises must obtain before operating in the state of New York. BitLicenses are issued by the New York Department of Financial Services (NYDFS), and primarily regulate the commercial receipt, storage, and transfer of digital assets. Only 25 have been granted as of 2020, while recipients include Circle, Coinbase, Robinhood, and Square. Businesses chartered under New York banking law such as Gemini are not required to hold BitLicenses.

Bitstream

A bitstream is a stream of data (bits). A bitstream may refer to the transmission — or storage — of this data. The term bitstream is commonly used to describe the data loaded on a field-programmable gate array (FPGA). A bitstream for an FPGA miner configures the FPGA to mine the coin or algorithm it was designed to mine. By downloading a different bitstream, it’s possible to reconfigure the coin or algorithm the FPGA miner is optimized for.

BitTorrent

BitTorrent is a peer-to-peer (P2P) file-sharing protocol that enables users to freely share data and large files over the internet, such as movies, programs, and audio files.

BitTorrent Token (BTT)

BitTorrent token (BTT) is a TRC-10 token that is used to incentivize file seeding in the BitTorrent speed client of the BitTorrent protocol, a peer-to-peer (P2P) file-sharing protocol that enables users to freely share data and large files over the internet.

Black Hat Hacker

A black hat hacker is a computer hacker who works in a malicious manner. Typically, black hat hackers steal data, commit fraud, or perform other illegal activity online. Black hat hackers can work for themselves or with other groups of hackers to accomplish their goals. Black hat attacks can occur in the crypto industry and are generally focused on stealing crypto through various means (such as hacking into user exchange accounts and wallets). Black hat hackers are the opposite of white hat hackers, who are normally hired to perform various tasks that prevent unethical behavior online.

Black Swan Event

A black swan event is a large-scale global event that cannot be predicted, occurs suddenly, and typically has a drastic negative impact on the global economy. Examples of black swan events include the attack on the World Trade Center on September 11th, 2001, as well as the COVID-19 pandemic. When markets are affected by black swan events, it can take a significant amount of time for them to recover.

Blake-256 (Decred)

Blake-256 is a specific algorithmic hashing function (a mechanism to create and upload new blocks of data onto a blockchain in a secure manner) used by the Decred blockchain. Blake-256 makes use of the hash iterative framework (HAIFA) as well as the local "wide-pipe" structure introduced by the LAKE hash function and other complex cryptographic hashing mechanisms that help the Decred protocol operate.

Block

On a blockchain, a block is the data record of all transaction information made during a specific time frame on a blockchain network. Blocks are added sequentially to a network's chain of data, which in turn make up the public ledger known as a blockchain. For example: A Bitcoin block contains information about the date, time, and number of transactions, as well as signature information regarding the origin and destination of the transfer. Blocks must be confirmed by the network via a process of consensus before a chain can continue transacting and creating new blocks.

Block Difficulty

Block difficulty refers to the complexity of computation required to mine new blocks in a Proof-of-Work (PoW) blockchain environment. Block difficulty is a configurable aspect of a blockchain protocol, and can be used as a mechanism to stabilize block production times in accommodating challenges like transaction speeds and network capacity.

Block Explorer

A block explorer is a software interface that enables users to access real-time blockchain information like transactions, blocks, addresses, nodes, and balances on a particular network. Operating as web browsers for blockchains, the many free-to-use and open-source block explorers provide global transparency and democratized access to blockchain networks.

Block Header

A block header is a mechanism that is used to identify individual blocks that have been created within a blockchain network, with each block having its own individualized header to help keep track of changes in the protocol. Blocks are layered in sequential order beginning with the genesis block and each block header contains three sets of block metadata and other individualized components.

Block Height

Block height is a measurement of the number of blocks that came before a particular block in a blockchain network. Every block possesses a unique block height value — essentially a number that marks its chronological order in the blockchain. The genesis block (the very first block ever created on a blockchain network) has a block height of zero, meaning that no blocks were created before it. Block height is a critical measurement of the rate that new blocks are added to a blockchain and also acts as an identifier for each individual block in the network.

Block Lattice (Nano)

Block lattice is the Directed Acyclic Graph (DAG)-based data structure and consensus mechanism that the Nano protocol makes use of. Nano’s block lattice structure allows individual accounts on the Nano protocol to control their own blockchain and for blocks to be added very quickly to help enable extremely fast, feeless network confirmations.

Block Producer

On most Proof-of-Stake (PoS) blockchains, a block producer is an individual or group whose hardware is chosen to validate a block's transactions and initiate the next block. The term originated within blockchain ecosystems that utilize Delegated Proof of Stake (DPoS), where users elect block producers to validate and add blocks. Other names for block producers are 'delegates' or 'witnesses.'

Block Reward

A block reward is the payment awarded for successfully validating a new block. Typically paid out in the native coin of a network at a fixed, but regressive rate, block rewards are often the only source of new currency creation. They provide a key element of the incentive structure that keeps blockchain networks operating and secure. In Proof-of-Work (PoW) blockchains like Bitcoin, block validation and block rewards are the remit of miners. For blockchains that utilized Proof-of-Stake (PoS) consensus models (Cardano, Algorand, Ethereum Consensus Layer), the block reward is paid to those that stake the native network cryptocurrency.

Block Size

Blockchain network protocols are made up of blocks of data that are processed in a perpetually updating chain-like structure — hence the term "blockchain." Each block stores transactions sent on the network of a specific size or specific time-period as set by the governance of the particular blockchain.

Block Space

Block space refers to the amount of space available within a specific blockchain’s block and is typically measured in megabytes (MBs). The amount of block space available depends on the specific block’s initial block size, which can vary widely (from 1–32MB, or more). It also depends on the amount of block space that is already taken up. An absence of available block space can lead to increased fees and delayed transactions.

Block Time

Block time refers to the amount of time it takes for a new block to be added to a blockchain. In theory, each blockchain network defines its own expected block time, which can vary from several seconds to minutes. Bitcoin, for example, aims to have a block time of 10 minutes. In reality, block times can vary from their predetermined goals. If a network is producing blocks faster or slower than its expected block rate, the block difficulty can be adjusted in an effort to recalibrate the system.

Block Trade

A block trade is a large purchase or sale of securities executed outside of an open marketplace. Because the size of the transactions are quite large, block trading is typically done by institutions and hedge funds. The private nature of block trading makes them similar to over-the-counter (OTC) trading.

Blockchain

A blockchain is a public ledger of transactions that is maintained and verified by a decentralized, peer-to-peer (P2P) network of computers that adhere to a consensus mechanism to confirm data. Each computer in a blockchain network maintains its own copy of the shared record, making it nearly impossible for a single computer to alter past transactions or for malicious actors to overwhelm the network. Sufficiently decentralized blockchains do not rely on centralized authorities or intermediaries to transact globally, securely, verifiably, and quickly, making technology like cryptocurrency possible.

Blockchain Bridge

A blockchain bridge — also known as a cross-chain bridge — allows independent blockchains to communicate with each other. This allows you to transfer crypto assets from one blockchain to another, including coins/tokens, wrapped cryptocurrencies, and even non-fungible tokens (NFTs). These bridges can vary and be either: custodial or non-custodial, one-way or bidirectional, or be two-chain or multi-chain compatible. Different bridge protocols offer a host of various features and interoperability tools.

Blockchain Transmission Protocol (BTP) (ICON Network)

The Blockchain Transmission Protocol (BTP) is ICON network’s proprietary interoperability framework. It allows independent blockchain networks to connect and exchange data. BTP facilitates the transfer of information and tokenized assets between ICON and external blockchain systems.

Blockchain Trilemma

The Blockchain Trilemma refers to the challenge in achieving a balance between scalability, decentralization, and security in a blockchain network. While scalability refers to the speed and volume of transactions, decentralization refers to the distribution of network nodes, and security refers to the integrity of the system from compromise. The Blockchain Trilemma states that an equal prioritization of all three factors at once is impossible — so a trade-off must be made with one. It remains an ambition of blockchain technologists and entrepreneurs to solve the trilemma with greater effectiveness in the design of any network, update, or application.

Blockweave (Arweave)

Created by the team behind Arweave, the blockweave is a blockchain-like data structure. Each block in a blockchain is linked to the block that preceded it. In a blockweave, each block is linked to both the block that preceded it and a recall block — a block from the earlier history of the blockweave.

Bloomberg

Bloomberg L.P., which is headquartered in New York City, is one of the largest financial services enterprises in the United States. Bloomberg offers numerous products and services to its customers in a variety of industries including financial markets, politics, radio, news, television, tax, law, data and analytics, and more. Bloomberg was founded in 1981 by businessman and former New York City mayor Michael Bloomberg and three of his associates. The company has offices in more than 160 countries worldwide and has about 19,000 employees globally.

Bloomberg Tradebook

Bloomberg Tradebook, which is a division of the globally known U.S.-based financial firm Bloomberg L.P., is a trading and investment platform that makes use of analytics, an order management system, and quantitative data to optimize trading execution and trading fees. The system is directly affiliated with U.S. banking giant Goldman Sachs and their related trading products and services, and is typically used only by large institutional investment firms with large amounts of capital.

Bluesky

Initiated in 2019, Bluesky is a project that hopes to develop a transparent and decentralized social media standard that any social media platform can use. While Bluesky is an independent organization, Bluesky was launched and funded by Twitter. According to Twitter CEO Jack Dorsey, one of his goals is to eventually migrate Twitter to Bluesky’s decentralized protocol.

BNB (Build and Build)

BNB (Build and Build) is the native cryptocurrency of the Binance blockchain ecosystem and a top cryptocurrency by market capitalization. On the Binance exchange, users can pay for exchange fees like transactions, withdrawals, and listings in BNB and receive a discounted rate. BNB can also be used to participate in token sales on Binance Launchpad, its platform for hosting third-party Initial Exchange Offerings (IEOs). BNB is also utilized on Binance’s blockchain ecosystem called BNB Chain, which is composed of two distinct blockchains: BNB Smart Chain and BNB Beacon Chain.

BNB Beacon Chain

Formerly known as Binance Chain (BC), BNB Beacon Chain was the first blockchain created by the Binance crypto exchange. BNB Beacon Chain supports the BEP-2 tokenization standard, helping to transfer BEP-2 assets between BNB Beacon Chain addresses. This is one of two blockchain protocols built by Binance, with the other being BNB Smart Chain, previously known as Binance Smart Chain (BSC). Collectively, these protocols are known as BNB Chain and are designed to interoperate with each other, ensure the transfer of assets between chains, and facilitate the operation of Binance products and services.

BNB Smart Chain

Formerly known as Binance Smart Chain (BSC), BNB Smart Chain is a blockchain network built by Binance. It runs parallel to Binance’s other protocol, BNB Beacon Chain (formerly Binance Chain), and makes use of the Proof of Staked Authority (PoSA) consensus mechanism. The BNB Smart Chain is designed to transfer and exchange value with assets that use the BEP-20 tokenization standard, instead of the BEP-2 tokenization standard that operates on BNB Beacon Chain. BNB Smart Chain is interoperable with other major blockchain networks and is characterized as being fast and secure.

Bollinger Bands

Bollinger Bands are a technical analysis device created by trader John Bollinger in 1983 that have become one of the most popular tools used by traders today. Bollinger Bands use moving averages and standard deviation to create a range of price movements. On a trading chart, Bollinger Bands are visually represented by a centerline based on a moving average, with a band below and above the centerline based on standard deviation. Bollinger Bands can help indicate if prices have moved outside of the range of historical deviation, and can be used to identify a number of market scenarios in real time.

Bonding

Bonding is a process nearly identical to staking on a Proof-of-Stake (PoS) network where a user locks a predefined amount of the network’s underlying token or coin into a node to help the network maintain consensus. By bonding, users signify to the network that they are trusted participants that accept the rules and regulations of the network. Some consider the only difference between bonding and staking to be that ”staked” coins and tokens are susceptible to penalization from the network should they act in a malicious manner, while others consider the processes to be exactly identical.

Bonding Curve

Bonding curve smart contracts represent a method for nurturing balanced supply and demand. A bonding curve is a mathematical concept used to explain the relationship between the price and supply of an asset. Bonding-curve smart contracts allow selling to investors by calculating the token/coin price in an asset such as bitcoin (BTC) and issuing the asset after payment, while also allowing investors to retain the ability to buy the asset back. Through a bonding curve contract, when a user purchases an asset that is limited in quantity, each subsequent buyer must pay slightly more for the asset.

Boneh–Lynn–Shacham (BLS) Signature

A Boneh–Lynn–Shacham (BLS) signature is a cryptographic signature mechanism that allows a user to verify that a signer is legitimate. BLS signatures make use of a bilinear pairing for verification, and its elliptic curve group properties help defend against specific attack types such as index calculus attacks, thus allowing for shorter signatures than Full Domain Hash (FDH) signatures with a comparable level of security.

Bootstrapping

Bootstrapping generally refers to how some startups build their business from the ground up, often with a small amount of capital supplied by the company’s founder. In a blockchain context, bootstrapping often entails the process of building the blockchain protocol, creating the ecosystem’s cryptoeconomic and governance structure, as well as planning a coin/token sale or other fundraising to meet capital requirements. The term bootstrapping comes from an early 19th-century expression "pulling up by one’s own bootstraps," implying an impossible feat. It later became a metaphor for achieving success without outside assistance.

Bor Nodes

Bor Nodes facilitate block production on sidechains while simultaneously maintaining connection to the Ethereum Virtual Machine (EVM). Bor Nodes are also periodically shuffled via committee selection using Heimdall Nodes (a large group of Ethereum validator nodes) in segments known as spans. Spans are specifically defined sets of blocks that have been chosen as a validator out of many potential validators. Each validator in a specific span contains voting power. The strength of that power determines block producer selection, with the more powerful spans having a higher probability of being chosen.

Borderless

The term borderless in a blockchain context refers to the industry and its underlying blockchain protocols being designed to provide services to a global user base. This means that no matter an individual's location, the services provided by blockchain networks are always available. Borderless blockchain technology provides users the freedom, accessibility, security, and privacy to transact from any geographical location.

Bored Ape Kennel Club (BAKC)

Bored Ape Kennel Club (BAKC) is a collection of canine-inspired non-fungible tokens (NFTs). Not for sale, these NFTs were given out for free to anyone who had a Bored Ape and claimed it during the weeklong “adoption drive” in June 2021.

Bored Ape Yacht Club (BAYC)

Bored Ape Yacht Club (BAYC) is a collection of 10,000 Ethereum-based non-fungible tokens (NFTs) that launched in 2021. Called “Bored Apes,” these Ape NFT caricatures feature various facial expressions, clothes, and unique elements. Wildly popular in both the crypto community and wider online culture, many of the Bored Apes that initially sold for hundreds of USD now sell for millions.

Botnet

A botnet is a collection of internet-connected devices that have been infected by malware, enabling malicious actors to control the devices. Infected devices are oftentimes controlled remotely and without the legitimate device owner's knowledge. Botnets are often composed of a variety of device types and used by cybercriminals to carry out a broad range of orchestrated online attacks such as credentials leaks, data theft, and Distributed Denial-of-Service (DDoS) attacks.

Bounty

A bounty is a reward or series of rewards advertised by a blockchain project to incentivize community participation to promote the project. Bounties are marketing strategies that give community participants coins/tokens in exchange for fulfilling specific predetermined tasks. Most commonly carried out during a startup’s inception, bounties can also occur at a later time in a project's development. Crypto bounties are used to reward social media promotion campaigns, content creation campaigns, translation campaigns, as well as bug auditing, among other tasks.

Brain Wallet

A brain wallet refers to a crypto private key or seed phrase that has been memorized by its owner. Although memorized accounts are immune to online hacks and physical theft, they are susceptible to being forgotten, or lost upon the holder’s death. Brain wallets are not recommended as a secure crypto wallet option.

Brave Browser

The Brave browser is an open-source, privacy-focused web browser developed by the same team that created the Basic Attention Token (BAT). It is the first web browser to implement the BAT system. The Brave browser, in combination with BAT, rewards users for viewing advertisements in a transparent relationship between advertiser, publisher, and user.

BRD

BRD is a cryptocurrency wallet and financial services platform that aims to accelerate mainstream adoption of cryptocurrencies by simplifying the processes of purchase, conversion, and storage. On BRD's mobile app, users can purchase leading cryptocurrencies, along with BRD tokens (BRD), a native asset that receives rewards and discounts that improve according to a user's BRD holdings.

Bread Rewards

The Bread Rewards program provides incentives to Bread platform users for engaging in network-beneficial activity like maintaining a wallet balance above a certain threshold, or posting on social media. Bread Rewards was one of the first customer loyalty programs in the cryptocurrency wallet space.

Breakdown

A breakdown is a trading pattern that follows a downward move in an asset’s price, often through an identifiable level of support and further below. A breakdown is characterized by heavy volume, a rapid decline, and severe magnitude. Breakdowns can be identified by technical indicators like charting patterns, trendlines, and moving averages.

Breakout

In technical analysis (TA), a breakout is a technical pattern that forms on a chart when an asset moves above a resistance level or below a support level. The price of an asset will often continue trending in the direction of the breakout. When a breakout is accompanied by high trading volume, it signifies a higher chance the asset will continue trending in the same direction, as opposed to a breakout with low trading volume. A price breakout sometimes occurs as a result of a channel, range, or pattern such as a flag, wedge, triangle, or head and shoulders.

Broadcaster (Livepeer)

On the Livepeer network, Broadcasters are nodes that send video streams to the network for transcoding.

Brokerage Account

A brokerage account is a financial service created and managed by a licensed brokerage firm on behalf of an investor to interact with assets and markets. Account holders can either make trades themselves, or the firm can make them on behalf of account holders. In all cases, the assets purchased through the brokerage account belong to the account holder.

Brute Force Attack

In a brute force attack, an attacker attempts to gain access to an account by systematically trying all possible combinations of passwords and passphrases that may apply to the account, with the goal of eventually guessing the correct credentials. While brute force attacks can be computationally intensive, time-consuming, and difficult to pull off, they can correctly guess a weak password within a few seconds. A strong password can deter most brute force attacks.

Bubble

A bubble occurs when an asset rises to extremely inflated prices and then comes crashing down, settling at a level that’s far less than its original price — typically a drop of 75% or more. It is usually possible to identify a bubble only after it has burst, and the price recedes. A speculative bubble is characterized by both the rise and fall occurring within a very short period.

Bug Bounty

A bug bounty, sometimes called a vulnerability rewards program (VRP), is an initiative that blockchain or software development enterprises may offer to external developers to incentivize the proper reporting of potential problems in the computer code that makes up their network protocol or platform. Bug bounties typically offer financial rewards to successful auditors of computer code. In the blockchain field, these rewards often come in the form of the network’s underlying cryptocurrency asset or token.

BUIDL (Build)

BUIDL is a slang term for 'build,' that was derived similarly to the slang word for 'hold,' HODL. BUIDL is a call to arms to members of the blockchain and crypto community to help improve widespread adoption of the technology by contributing to the construction of blockchain infrastructure. BUIDLing can be in the form of protocol or application development, writing blockchain-related content, sharing blockchain content on social media, using smart contracts, trading on exchanges, making use of wallets, playing blockchain games, or any activity that contributes to the long-term expansion of the blockchain ecosystem.

Bull Flag (Technical Formation)

A bull flag is a technical charting pattern shaped like a flag that often signals further bullish momentum and an increase in price. With a bull flag, the flagpole is formed during a significant rise in price where buyers significantly outperform sellers, while the flag itself is formed during a consolidation period that usually signals a continued price increase. Bull flags, like all technical formations, can sometimes be negated and fail to produce the results they may have originally indicated.

Bull Market

A bull market refers to an upward trend in prices for an extended period of time. As of 2020, bitcoin (BTC) has undergone three bull markets. The opposite of a bull market is a bear market.

Bull Run

A bull run is a specific time period in a financial market cycle during which asset prices can experience a significant upward trend. A bull run is similar to a bull market, while the opposite of a bull market is a bear market, during which assets can experience a substantial drop in price.

Bull Trap

A bull trap is a market signal that signifies an initial recovery in the price of a declining asset, followed by a further decline. Bull traps are sometimes carried out by investors with substantial amounts of capital who open a short position prior to selling a large amount of the asset so it drops in price on purpose, thus giving the investors a substantial profit as a result. This scenario could be an example of a type of market manipulation.

Bullish

The term "bullish" can be used to describe how positive or optimistic a person feels about a particular asset. Someone who is bullish on bitcoin (BTC) believes the price of BTC will increase. A person who is bullish on bitcoin may also be referred to as a "bitcoin bull."

Burn/Burning

The process of “burning” coins/tokens is employed by many blockchain networks to incentivize network users to buy and invest in protocol-specific assets. Usually intended as a counter-inflationary mechanism, burning decreases the total crypto supply, potentially increasing the value of the remaining crypto supply.

Business as a Service (BaaS)

Business as a Service (BaaS) is defined as the third-party creation and management of cloud-based network infrastructure for enterprises that want to create and run customized business applications. Business as a Service in the blockchain space is sometimes called Blockchain as a Service (BaaS), meaning that the customized software and computing structure of the business is specifically designed for enterprises building blockchain applications. Blockchain as a Service functions similar to a web host running the back-end operations for a blockchain-based application or platform.

Business Logic Layer (BLL)

Within a programming context, the business logic layer (BLL) determines how data a software program interacts with can be created, altered, and stored. The business logic layer coordinates data between the program’s user interface (UI) and data access layer (DAL), although in some programs the UI interacts directly with the DAL.

Business to Business (B2B)

Business to business (B2B) is a model that refers to enterprises that do business between with each other, often in the form of value or information exchange. The B2B model can be leveraged in a traditional brick and mortar context, but is often used on the internet for ecommerce and e-business purposes. B2B, whether carried out online or traditionally, is one of four main business models alongside business to consumer (B2C), consumer to business (C2B), and consumer to consumer (C2C).

Business to Consumer (B2C)

Business to consumer (B2C) is a model utilized by enterprises that provide products and services directly to their customers. The B2C model can be leveraged in a traditional brick and mortar context, but is often used on the internet for ecommerce or e-business purposes. B2C, whether carried out online or traditionally, is one of four main business models alongside business to business (B2B), consumer to business (C2B), and consumer to consumer (C2C).

Buy Side/Sell Side

Buy side and sell side refers to the buyers and sellers in a market who are connected by an order management system (OMS). The buy side is typically fund managers whose job is to pick high-alpha securities for their portfolios. The sell side is typically trading floors at investment banks. Rapid and concurrent trades between the buy side and sell side are facilitated by advanced OMS technology protocols.

Buy the Dip

‘Buy the dip’ or ‘buying the dip’ is an expression that is used in the cryptocurrency space to signify that a price dip is occurring or about to occur, and that it represents a buying opportunity. In this sense, a dip is seen as a short-lived flash sale or discounted price that should be taken advantage of. Buying the dip is often regarded as a strategy for investors who are holding an asset over the long term with the hopes of reducing their average entry price through dollar-cost averaging (DCA).

Buy Wall

A buy wall occurs when a large limit order is placed at a specific price level to buy a large amount of an asset. When a buy wall is placed, the result is often a strongly maintained price equilibrium that doesn't drop below the targeted price. Buy walls, like sell walls, can be used to manipulate the price of markets. Buy walls can be implemented to prop up the price of an asset to make it appear healthier than it actually is, with the purpose often focused on manipulating the behavior of retail investors.

Byron Phase (Cardano)

Named after poet and politician George Gordon Byron, the Byron Phase is the first of five phases in Cardano’s developmental roadmap. After two years of development, the Cardano blockchain mainnet went live in September 2017 and allowed users to buy and sell its native ADA coin.

Byzantine Fault Tolerance (BFT)

Byzantine Fault Tolerance (BFT) refers to a blockchain network's ability to reach consensus and continue operating even if some of the nodes in the network fail to respond or respond with incorrect information. A network that is Byzantine Fault Tolerant solves the Byzantine Generals' Problem, a situation in which all parties must agree but one or more parties are unreliable. Most actively used blockchain consensus mechanisms are Byzantine Fault Tolerant.

Byzantine Fault Tolerance Delegated Proof of Stake (BFT-DPoS)

Byzantine Fault Tolerance Delegated Proof of Stake (BFT-DPoS) is the primary consensus mechanism that runs the EOSIO and ICON blockchain ecosystems. BFT-DPoS is a highly-performant consensus mechanism that makes use of data passing between parties without an intermediary. It is composed of the two main layers that work together: Asynchronous Byzantine Fault Tolerance (aBFT) to propagate and validate block production, and Delegated Proof of Stake (DPoS) for block producer voting and scheduling.

Byzantine Generals' Problem

The Byzantine Generals' Problem is a term used in computing to describe a situation in which all parties or components within a system must agree on a single consensus-based strategy in order to avoid complete network failure. Failure can be caused when one of the nodes or other architectural components within the network are unreliable. A network that is able to solve the Byzantine Generals’ Problem is considered Byzantine Fault Tolerant (BFT). Most actively used blockchain consensus mechanisms are Byzantine Fault Tolerant.


C

C++ Programming Language

C++ is a widely used, general-purpose programming language. An extension of the C programming language, C++ is commonly used as a compiled language (as opposed to an interpreted language) and can be used on many different platforms.

Call Option

A call option contract gives an investor the right, but not the obligation, to purchase an underlying security at a specified price within a defined period of time. When the option expires, the investor can choose to buy the underlying security or let the options contract become void. Call options are traded on exchanges as a derivative, and can be used for speculation, income, or trading strategies like hedging.

Call Provision

A call provision on a bond or other fixed-income investment product is an option allowing the issuer to repurchase and retire the bond. The call may be triggered by a set price, or may be limited by a specific time period. A bond with a call provision pays a higher interest rate than a noncallable bond.

Candlestick

Candlesticks are part of a charting methodology employed by stock and cryptocurrency investors that shows historical and real-time prices of a specific asset. Candlesticks are designed to display the open, high, low, and closing (OHLC) prices of an asset for specific time periods (usually by the minute, hour, day, week, and month). Typically, green candlesticks denote a bullish increase in price, while red candlesticks signify a bearish decrease in price. Candlesticks are generally thought of as the most well known technical indicator that investors use.

Candlestick Body

A candlestick body, or real body, is the widest portion of a Japanese candlestick that covers the area between the opening price and the closing price during a specific time frame, usually the minute, hour, day, week, month, or year. Generally, if the candlestick is red, the closing price is below the opening price, while a green candlestick signifies that the closing price is above the opening price. The candlestick also has a thin line-like portion called the candlestick wick (which appears above or below the body), that, like the body, is used to gauge price action and market sentiment.

Candlestick Wick

A candlestick wick, or shadow, is the line on a Japanese candlestick that is used to indicate where the price of an asset has changed compared to its opening and closing prices. Wicks indicate the highest and lowest prices that an asset has traded over a specific time frame, usually by the minute, hour, day, week, month, or year. The candlestick also has a wide portion called the candlestick body that, like the wick, is used to gauge price action and market sentiment, along with several technical and fundamental indicators.

Canister (DFINITY)

In DFINITY’s Internet Computer, a software canister is an evolved smart contract that features enhanced scalability and includes computational units. A software canister is comparable to a container used by other blockchain systems, because both are deployed as a software unit that is made up of compiled code and a mechanism for an application or service. Containerization allows applications to be separated from the main blockchain environment, enabling simple and reliable deployment. However, a canister is different from a container because it also stores data about the current software state with a record of numerous previous events and user interactions.

CAP Theorem (CAP)

As it relates to theoretical computer science, CAP theorem is a theory that was developed by computer scientist Eric Brewer that states that it is impossible for a distributed data network to at the same time provide more than 2 out of 3 guarantees: consistency, availability, and partition tolerance (which stands for the acronym CAP). The theory was used as the basis for the Blockchain Trilemma theory which states that it is impossible to build and operate a blockchain protocol that is: decentralized, scalable, and secure.

Capitulation

Capitulation refers to a drastic market downturn characterized by a period of strong selling activity, whereby investors might sell their holdings at an unprecedented rate to avoid further financial losses. Capitulation is sometimes referred to as panic selling. An example of capitulation on a longer time-frame in the crypto market is selling that took place after the price of bitcoin (BTC) reached an all-time high (ATH) of $20,000 USD in December of 2017 and subsequently crashed to $6,500 three months later. Shorter capitulations may be followed by an uptrend reversal in value.

Cardano (ADA)

Cardano is a Proof-of-Stake blockchain platform with smart contract functionality. In particular, Cardano is noted for its focus on academic research, high transactions-per-second (TPS) throughput, and an energy-efficient consensus mechanism called Ouroboros. ADA, the native coin of the Cardano network, is used to facilitate transactions and smart contract execution.

Casascius Coins

Casascius Coins were physical bitcoin products sold until 2013. Made of metal, Casascius Coins had a tamper-resistant sticker concealing the private key and could be physically exchanged. The coins came preloaded with fixed amounts of 1, 10, 25, 100, and 1000 bitcoin (BTC). Unredeemed versions of Casascius Coins are highly valued on the collector’s market and sell for a large premium.

CashFusion

CashFusion is a privacy tool for concealing Bitcoin Cash transactions. It is an improvement on the CashShuffle tool with enhanced privacy characteristics. Improvements include a higher max amount that can be shuffled, the ability to “shuffle” or “fuse” different amounts than other participants, and more UTXO combinations, thus making transactions much more difficult to trace. Tor is also built into the CashFusion protocol to mask user IP addresses.

CashShuffle

CashShuffle is a privacy tool for concealing Bitcoin Cash transactions. The process involves many users combining their funds into one large transaction, which is then sent back to the users in a way that hides their transaction paths. CashShuffle is a version of CoinJoin that works on the Bitcoin Cash protocol.

Casper (Ethereum)

Casper is the Ethereum consensus mechanism that will transform the Ethereum network — based on a Proof-of-Work (PoW) consensus mechanism, and known as Ethereum Execution Layer (previously Ethereum 1.0) — into a Proof-of-Stake (PoS) system called Ethereum Consensus Layer (previously Ethereum 2.0). Casper is being rolled out as part of Ethereum’s Beacon Chain and will consist of several upgrades. As of March 2021, Casper has been co-developed with two main implementations for Ethereum, Casper CBC (Correct by Construction) and Casper FFG (Friendly Finality Gadget).

Casper Correct by Construction (CBC)

Casper Correct by Construction (CBC) is the consensus mechanism employed by the Casper Network. Casper CBC was initially developed by Vlad Zamfir, a well-known software engineer and technologist who helped create Ethereum. The Casper Network’s current consensus protocol, the Highway Protocol, is based on the original Casper CBC specification, with several improvements relating to block finality and network flexibility.

Casper Friendly Finality Gadget (CFFG)

Casper Friendly Finality Gadget (CFFG) is the hybrid Proof-of-Work (PoW) and Proof-of-Stake (PoS) protocol that enables Ethereum to transition to a PoS system. Through the CFFG, Ethereum’s blocks will still be mined using PoW, and only ~2% of blocks will be finalized by network validators using this system. CFFG is part of Ethereum’s multi-step transition to a full PoS system, and Ethereum’s final version will likely run on something more akin to Casper Correct by Construction (CBC).

CasperLabs

CasperLabs is the blockchain software development company responsible for the creation and development of the Casper Network blockchain protocol. The Casper Network is built to be decentralized, future-proof, fully upgradeable, scalable, and designed with an emphasis on enterprise blockchain use. According to CasperLabs CEO Mrinal Manohar, the CasperLabs team is focused on “decentralization above all else. It doesn’t just describe our platform, it’s the guiding ethos for what we build, and everything we do as an organization.”

Caspian (CSP)

Caspian (CSP) is a cryptocurrency trading platform designed for institutional traders. The platform provides users with an order and execution management system (OEMS), position management system (PMS), risk management system (RMS), and tools for compliance and reporting requirements. CSP is an ERC-20 token that can be staked to earn discounts on the Caspian platform.

Catalysts (The Sandbox)

In The Sandbox game, Catalysts are ERC-20 tokens that define the ‘tier’ and scarcity of assets created by users. Catalysts add ‘sockets’ to assets which can be filled with Gems, another ERC-20 token that defines the attributes of assets.

Cboe Options Exchange

The Cboe Options Exchange is the world’s largest exchange for futures and options trading. Established in 1973, Cboe offers derivative options related to several products, including equities, indexes, and funds. Exchange-traded funds (ETFs) and exchange-traded notes (ETNs) are also traded on the Cboe Options Exchange. Along with the Chicago Mercantile Exchange (CME), the Cboe Options Exchange launched Bitcoin futures trading in 2017.

Celo

Celo is a mobile-first blockchain payments platform that makes cryptocurrency and financial services accessible to anyone with a smartphone. Celo intends to build decentralized finance instruments that do not require the technical knowledge of many of today’s leading applications. Launched by Silicon Valley startup cLabs, Celo is a fork of the Ethereum blockchain that is specialized to create and distribute a suite of stablecoins backed by fiat currencies, particular localities, and even natural resources. Celo is governed by the holders of its native asset, CELO.

Censorship Resistance

Censorship resistance refers to a blockchain network’s ability to remain tamper-proof. A sufficiently decentralized blockchain network transparently distributes data across a wide range of computers, which makes censorship extremely difficult. The transparent and decentralized nature of blockchains makes them highly resistant to external modifications.

Central Bank

A central bank controls the monetary policy and currency of a nation-state. Central banks function as the bank of governments, and have the power to set interest rates and the money supply. The Federal Reserve is the central bank of the United States.

Central Bank Digital Currency (CBDC)

A central bank digital currency (CBDC) is a digital version of a country's fiat currency. Regulated by a country’s monetary authority, CBDCs are designed to replace traditional fiat and increase ease of use for those that deploy them. CBDCs can lower transaction costs and increase the speed of cross-border settlement, potentially increasing financial inclusion for many. Yet, unlike blockchains, CBDCs aren’t decentralized and don’t have a supply cap. Critics contend that CBDCs won’t limit inflationary money printing — and that government control of a nation’s money supply through a CBDC could have serious repercussions concerning financial privacy and censorship.

Central Limit Order Book (CLOB)

A central limit order book (CLOB) is a trading model used by asset trading exchanges. Central limit order books work by matching customer orders (bids) and make use of a ‘price time priority’ mechanism to ensure that orders with the highest bid are executed quickly. CLOBs are generally considered highly transparent, real-time anonymous (allowing customers to trade with each other anonymously), extremely fast, and cheaper to use than other alternatives.

Central Processing Unit (CPU)

A Central Processing Unit (CPU), or main processor, is the most powerful component of the electronic circuitry inside a computerized system. The CPU processes essential logic, arithmetic, and input and output operations specified by the instructions of the operating system of a computer.

Central Processing Unit (CPU) Miner

A central processing unit (CPU) miner is simply a CPU that is being used to mine cryptocurrency. A CPU is an electronic circuit that can process or run multiple tasks or programs on a device. Although being flexible and multi-purpose in nature, CPUs are generally not as efficient or cost-effective at mining cryptocurrency as purpose-built crypto miners. However, there are a variety of CPUs with differing price points and mining performance characteristics. Some coins/blockchains have been purposefully designed and optimized for CPU mining.

Centralization

Centralization refers to the consolidation of control, authority, and access by a person or group. In a blockchain context, centralization refers to the level of privilege and distribution of nodes verifying and managing the network. Blockchains relying on nodes concentrated in a limited geographical area are considered more centralized. Centralized blockchains may distribute profits to a select few rather than allowing all potential users of the system to participate. A centralized blockchain structure may also stifle equitable governance and decision-making processes and promote censorship and control of data.

Centralized Decentralized Finance (CeDeFi)

Centralized decentralized finance (CeDeFi) is a blockchain-based system that is a hybrid between decentralized finance (DeFi) and centralized finance (CeFi) meant to leverage the best of both models. CeDeFi was created to allow large CeFi organizations to make use of various DeFi financial instruments. CeDeFi was also designed to offer numerous types of financial products and services that are not normally available through traditional DeFi. CeDeFi blockchain protocols also help large enterprises better adhere to strict regulatory and compliance issues, allowing them to operate more smoothly.

Centralized Exchange (CEX)

A centralized exchange (CEX) is a centrally controlled platform used to trade crypto assets. Centralized exchanges act as intermediaries between buyers and sellers. These platforms are custodians of user data and funds.

Centralized Finance (CeFi)

Centralized Finance (CeFi) is often thought of as a bridge between traditional finance (TradFi) and modern financial applications like blockchain and financial technology (FinTech). CeFi enterprises generally operate using a centralized governing body that controls users' funds. Although numerous interpretations of what CeFi encompasses exist, centralized exchanges (CEXs), cryptocurrency asset custodians, and numerous FinTech applications like payment service providers are typically considered to be CeFi. CeFi service providers are often characterized as easy-to-use and heavily regulated with low fees. However, because they are centralized, they are potentially susceptible to a single point of failure.

CENTRE

Jointly launched by financial technology (FinTech) firm Circle and crypto exchange Coinbase, CENTRE is the creator of USD coin (USDC), a stablecoin backed by dollar-denominated assets held with regulated financial institutions in the U.S.

Cerber Ransomware

Cerber ransomware is a type of malware that locks and encrypts a victim’s files until a ransom is paid. Cerber ransomware became notorious for its ransomware-as-a-service model, which enables malware creators to sell their services to other cybercriminals in return for a cut of the profit earned via the attacks.

Certificate Authority (CA)

A certificate authority (CA) is a third-party entity that issues certificates and manages the public keys required to cryptographically verify digital certificates online. CAs play a critical role in securing much of the information that is exchanged on the internet, and they can be government-based or large multinational corporations. Digital certificates are often used to encrypt digital transactions and identity data to enable the secure exchange of information online. Certificates based on the Transport Layer Security (TLS) protocol and the Secure Sockets Layer (SSL) protocol allow users to securely send instant messages and emails.

Certificate of Deposit (CD)

A Certificate of Deposit (CD) is a type of savings account that holds a fixed amount of money for a fixed period of time in exchange for interest paid by the issuing bank. Common time periods for a CD are six months, one year, or five years.

Chain Key Technology (DFINITY)

DFINITY’s chain key technology is a 48-byte public chain key that allows DFINITY’s Internet Computer to finalize transactions. The mechanism is used to render old blocks within the system unnecessary, and enables the Internet Computer Protocol to operate at web-speed by finalizing transactions needed to update smart contract states within 1 to 2 seconds. Chain key technology is also responsible for the communication of different components within the Internet Computer (such as subnets, canisters, and the Network Nervous System (NNS)) and the network's consensus mechanism.

Chain Migration

A chain migration occurs when a blockchain project decides to operate on a different blockchain protocol. At this time, most decentralized finance (DeFi) projects are built on the Ethereum blockchain. An example of a chain migration would be a DeFi protocol on the Ethereum blockchain migrating — complete with all its product and service offerings — over to the BNB Smart Chain. Chain migrations occur for various reasons such as moving to a chain with lower fees or better throughput, changes in company direction, or desired changes in tokenization standards (e.g., from ERC-20 to BEP-20).

Chain Reorganization

Chain reorganizations, or chain reorgs, occur when blockchain network nodes broadcast two different blocks simultaneously. Since both blocks cannot become finalized, two versions of the blockchain proceed in parallel until one blockchain becomes longer than the other and is chosen to become the sole path forward. In order to ensure that network nodes all agree on the same version of a blockchain, chain reorganization takes place. If a node receives blocks that are part of a new longest chain, then it will essentially abandon the blocks in its old chain in favor of the new ones.

Chainlink (LINK)

Chainlink is a decentralized oracle network that provides real-world data to smart contracts on the blockchain. LINK is the digital asset token used to pay for services on the network.

Change Address

A crypto transaction has an input address, output address, and change output, which represents the information transacted. The change output is the difference between the input or output, or the “change” leftover. The change address is where the change output is sent.

Changpeng Zhao (CZ)

Changpeng Zhao (CZ) is the founder and CEO of Binance, one of the world’s largest cryptocurrency exchanges. Zhao was raised in China and Vancouver, Canada, and later studied computer science at McGill University in Montreal. After graduating, CZ began working for the Tokyo Stock Exchange as a software developer and later worked for Bloomberg Tradebook in a similar role. Prior to founding Binance in 2017, CZ held several positions for blockchain enterprises such as the Chief Technology Officer (CTO) at OKCoin.

Channel (Technical Formation)

A channel is a charting pattern in technical analysis (TA) that is classified as an area where an asset is trading between two price trendlines (an upper and lower trendline). Channels generally form when an asset's price stays between a resistance level that it won’t break above, and a support level it won’t drop below. There are several types of channels that can form, including ascending channels and descending channels. Channels can be used by traders, in combination with several other TA metrics, to initiate opportunities to buy and sell an asset at certain price levels.

Charles Hoskinson

Charles Hoskinson is the founder of the Cardano blockchain project, as well as one of the former founders of Ethereum, among other blockchain-focused businesses. Hoskinson left Ethereum in mid-2014 and began developing Cardano during 2015, which was initially released when the network officially went live in 2017. Hoskinson maintains large roles in the ongoing development of Cardano and the Cardano Foundation, as well as serving as the CEO of tech company Input-Output Global (IOG), previously known as Input-Output Hong Kong (IOHK).

Chicago Mercantile Exchange (CME)

The Chicago Mercantile Exchange (CME) is a marketplace for derivative financial contracts. The Chicago-based exchange was founded in 1898 and is now one of the biggest global derivatives markets in the world. In 2017, the CME launched the trade of bitcoin futures contracts.

Childchain

A childchain is a scalable blockchain on the OMG Foundation which is anchored to Ethereum. OMG’s scaling solution optimizes the speed of the Ethereum network by moving transactions off of the Ethereum mainchain and onto childchains. The childchain does not hold users’ funds and it relies on the Ethereum blockchain and a decentralized network of watchers for its security. Childchains are different from sidechains in that sidechains have their own security mechanisms and custody users’ funds.

Chunk (Near Protocol)

In the NEAR protocol, a chunk is an aggregation of transactions from a shard.

Ciphertext

Ciphertext refers to encrypted text that is unreadable without authorized access. Plaintext is transformed into ciphertext via an encryption algorithm. Only those who are authorized to access the data should be able to decrypt the ciphertext back into readable plaintext.

Circle

Founded by Jeremy Allaire, Circle is a financial technology (FinTech) firm and the co-creator of USD coin (USDC), a USD-pegged stablecoin.

Circular Economy

A circular economy is an economic system that values a healthy economic structure with enhanced environmental sustainability. Circular economies prioritize the elimination of waste and the use of resources in a responsible manner — employing reuse, repair, recycling, repair, reimbursement, and sharing to create a closed-loop system that minimizes the creation of waste, pollution, and carbon emissions. The circular economy is designed to keep products, infrastructure, and equipment in use longer, to improve the productivity of all-import natural resources. The circular economic approach stands in contrast to a linear economy that employs an unsustainable "take, make, dispose" model of production.

Circulating Supply

The circulating supply is the total number of coins/tokens of a specific cryptocurrency that are available in the market. The circulating supply includes all crypto locked in decentralized applications (dApps), custodied on crypto exchanges, or held in personal crypto wallets. The circulating supply may be different from the total supply, which is the total amount that will ever be created.

Clearing

As it relates to the banking and finance industry, clearing is the process of settling a financial trade or purchase of an asset by correctly and efficiently transferring funds to the seller, and in return, by transferring the corresponding asset to the buyer. Typically, a specialized organization acts as an intermediary in the clearing process to both buyer and seller to ensure procedure and finalization. The interrelated processes of clearing and settlement are what make up the post-trade process.

Cleos Command Line Interface (CLI)

The Cleos Command Line Interface (CLI) utilizes lines of text to process commands on the EOSIO blockchain platform. Cleos simplifies the development process for software engineers by giving them access to specific developer tools to interact with EOSIO blockchains. The CLI is used for reading data from the blockchain, sending new transactions, and to test and deploy smart contracts. Cleos interacts with Keosd, Nodeos and other components of the EOSIO ecosystem.

Client-Server Model

The client-server model is the main architectural computing model that most of the internet is based off of, with the “client” being the front-end of the system, and the “server” being the back-end of the system. The client side of a computing system is the portion of the platform that the user interacts with directly through their screen or graphical user interface (GUI), and the server side is the portion that the user doesn't see that is responsible for the majority of the system’s operational efficiency. Client-server models in computing have been implemented since the beginning of the internet.

Close

The close, or closing price, is one of four main data points used for day trading on the stock market. The other three are called low, high, and open — and all four are collectively known as OHLC. Traditionally, stock market trading was carried out during regular market hours, often only between 9am and 4pm local time, with markets closed on weekends. Cryptocurrency markets are open 24/7, so even though there is theoretically no closing price for crypto assets, the OHLC is still included on most charting platforms to signify the closing time of the regular stock market each day.

Closed Loop Payment Network

Closed loop payment networks are those in which a consumer loads money into an account that can only be used with specific merchants, whereas open loop payment networks allow consumers to use money stored in a centralized wallet for multiple merchants. Closed loop networks cut out several middlemen in a payment's transaction, reducing transaction fees and speeding up settlement.

Cloud Computing

Cloud computing is the on-demand availability of specialized computer network resources — specifically of data storage and computing power that is not managed by a single entity. The term cloud computing generally describes a data center that is readily available to users around the world via the internet. Large, centralized cloud computing enterprises are predominantly available today, and often have their network infrastructure distributed over multiple locations. There are several different types of cloud computing models, including enterprise clouds, public clouds, hybrid clouds, and more. More recently, through blockchain technology, decentralized cloud computing infrastructure has become more readily available.

Cloud Mining

Cloud mining is the process of mining cryptocurrency through the use of a third-party provider by purchasing a cloud mining contract. It doesn’t require owning the associated hardware. You typically purchase a fixed amount of cloud computing power (measured in hashes per second) for a set period of time and receive the associated mining rewards associated with your contract. You can also lease the mining rigs themselves — usually application specific integrated circuit (ASIC) miners — which can give you more flexibility but generally includes setup and maintenance fees.

Code Repository

A code repository — also called a source-code repository or code “repo” — is a database where software code is stored. Typically used for collaborating with other programmers, a code repo also archives older software versions and gives users the ability to revert software changes. Code repos can either be public or private. A repository may also include a software product’s technical documents, project notes, and links to relevant and related web pages.

Coin Mixer

A coin mixer is a software or service that mixes the cryptocurrencies of many different users to preserve privacy and anonymity despite the public ledger of blockchain networks. Coin mixing increases the challenge of tracking transactions, and has been found evident in dark web activities and money laundering in addition to its legal uses.

Coin Swap (or Token Swap)

A coin swap or token swap is the process of exchanging one type of coin/token for another one. It could also refer to a platform replacing an existing coin/token with a significantly updated version.

Coinbase (Cryptocurrency Exchange)

Coinbase is one of the largest cryptocurrency exchanges in the world. Based in the U.S.A., it provides spot trading to retail U.S. investors and crypto custody services to institutional investment firms. Coinbase was founded by CEO Brian Armstrong in 2012 and completed an Initial Public Offering (IPO) via NASDAQ in April 2021.

Coinbase Transaction (Generation Transaction)

A generation transaction, or a coinbase transaction as it is commonly known, is the first transaction data contained in a block on the Bitcoin blockchain. The generation transaction is responsible for clearly delineating the recipient(s) of a particular block’s block reward. As opposed to traditional transactions which contain input and output data, generation transactions mint new bitcoin (BTC) from the protocol itself and therefore do not require input data.

CoinJoin

CoinJoin was originally developed as a privacy tool for concealing a user’s Bitcoin transactions. "CoinJoining" involves many users combining their funds into one large transaction, which is then sent back to them in a way that hides their transaction paths. CoinJoin is a non-custodial solution, which means users never lose control of their funds during the CoinJoining process. Different versions and variations of CoinJoin can now be found on multiple protocols outside of Bitcoin.

Cold Storage

Cold storage refers to the offline storage of crypto on a cryptocurrency wallet. "Offline" means that the wallet is disconnected from the internet, preventing hackers from accessing it. It could also refer to the transaction signing process being done “in-device” and offline prior to being broadcast to the blockchain network. Cold storage is considered to be the most secure way to hold crypto assets.

Cold Wallet

A cold wallet is a cryptocurrency wallet that is not connected to the internet, or not connected during the signing of a crypto transaction (which is done in-device). Cold wallets most often come in the form of hardware wallets, which are physical devices that store private keys. Cold wallets stand in contrast to hot wallets, which are connected to the internet.

Collateral

Collateral refers to an asset that is offered as security for repayment of a loan, to be forfeited in the event of a default (a situation in which an individual is unable to pay back a loan). When borrowing money on a decentralized finance (DeFi) lending platform, collateral in the form of a token must be locked. The collateral is returned upon repayment of the loan.

Collateral Factor

The collateral factor is the amount of collateral required to mint another asset or collateralize a loan. It sets the maximum borrowing amount. Also called the collateral ratio, it’s commonly used on over-collateralized decentralized finance (DeFi) loans. Although they vary, a typical collateral factor would be 1:2 (or 50%), meaning you could borrow $500 USD if the deposited collateral is worth $1000. When the value of a user’s collateral falls below the collateral factor (for example with a volatile asset), they must add more collateral or risk their collateral being liquidated to repay a portion of the loan.

Collateral Token

Collateral tokens are tokens employed for various blockchain use cases, acting as a collateralization method for users of the financial services provided by a blockchain network. This can include yield farming, borrowing, staking, lending, and other decentralized finance (DeFi) mechanisms. For example, stablecoins, bitcoin (BTC), ether (ETH), and other crypto assets are often used to maintain the stability of a specific asset type.

Collateralization

Collateralization is the use of one asset to back the value of another asset. With crypto, the process requires the storing and locking of the collateralized assets within a blockchain protocol.

Collateralized Debt Obligation (CDO)

A collateralized debt obligation (CDO) is a complex financial product that is typically backed by a pool of loans and different types of assets that are sold to institutional investors. CDOs are a specific type of derivative whose value is derived from other underlying assets, which become collateral if the initial loan defaults. CDOs can be risky in their own right, but are a practical tool for freeing up capital and reducing risk for investors.

Collateralized Debt Position (CDP)

On the Maker platform, a collateralized debt position (CDP) is created when a borrower provides cryptocurrency as collateral in order to mint or borrow the DAI stablecoin. The value of the collateral in a CDP must always remain above a certain minimum requirement or else risk liquidation. In the event of liquidation, the collateral in the CDP is sold in order to repay a portion of the DAI debt. The collateral in the CDP can be returned when the DAI is repaid by the borrower.

Collateralized Loan Obligation (CLO)

Collateralized loan obligations (CLOs) are complex debt instruments that consist of many loans bundled together and sold as a single investment. CLOs are organized according to their risk profiles. They are similar to collateralized debt obligations (CDOs) and collateralized mortgage obligations (CMOs).

Collateralized Mortgage Obligation (CMO)

A collateralized mortgage obligation (CMO) is a complex debt instrument that consists of many mortgages bundled together that are sold as a single investment. CMOs are organized according to their risk profiles. They are similar to collateralized debt obligations (CDOs) and are believed to be a contributing factor in the 2007-2009 global financial crisis.

Collator (Polkadot)

Collators are full nodes on the Polkadot Network that are present both on parachains and the main Relay Chain. Their main purpose is to maintain parachains (which are sovereign blockchains or specialized shards) by collecting parachain transactions and producing state transition proofs (essentially machine-driven progress reports) for validators on the Relay Chain. Collators can access all state transition information necessary for authoring new blocks and executing transactions — much like how miners provide value in a Proof-of-Work system. Collators are also used to send and receive messages from other parachains, facilitating communication through Cross-Chain Message Passing (XCMP).

Colored Coins

Developed in 2013, Colored Coins was a proposal that aimed to use the Bitcoin blockchain to issue “colored bitcoins” that could represent various “colors” (i.e., varieties) of assets — including currencies, stocks, and more. The project was an early attempt to create what we now refer to as tokens.

Combolist

A combolist is a text file which lists out usernames and passwords in a machine-readable format. The file is used as an input for an account-checker tool that can automate authentication requests to a website, online service provider, or application programming interface (API). Combolists are often created following an online data breach and packaged and sold by hackers to other malicious actors.

Command Line Interface (CLI)

A command line interface (CLI) is a system that utilizes lines of text to process commands for a specialized computer program. The interface used to execute command line instructions is called a command-line-processor or command-line-interpreter. Most applications utilize menu-driven or graphical user interfaces (GUIs), but some still use a command line — especially for software development and other technical processes.

Commit Chain

Commit chain is a generic term for Layer-2 scaling solutions built for the Ethereum blockchain or other blockchain protocols. Commit chains are also sometimes called non-custodial side chains and don’t utilize their own consensus mechanism, instead making use of their parent chain’s consensus framework. With commit chains, non-custodial third-parties often allow for the communication between transacting parties that share and verify user account balances via regular updates to the parent blockchain.

Commodities

Commodities are raw materials that are fungible or interchangeable for like-goods. Commodities range from agricultural goods like wheat and sugar to hard metals like gold, copper, and titanium. Gold is considered a highly fungible commodity because it can be easily exchanged regardless of the source or producer.

Commodity Exchange Act (CEA)

The Commodity Exchange Act (CEA) is a law and statutory framework that regulates commodity futures trading and investing in the United States. Commodities include metals, agricultural products, energy and technology instruments, and other global markets. The CEA was originally passed in 1936 and has been modified several times since then and has been upheld by the United States' Commodity Futures Trading Commission (CFTC) since 1974. The CEA was created to maintain the integrity of futures markets in the U.S. and to protect against market manipulation and fraudulent investing practices.

Commodity Futures Trading Commission (CFTC)

The Commodity Futures Trading Commission (CFTC) is a United States-based regulatory body responsible for regulating the U.S. derivatives market to foster open, transparent, competitive, financially sound markets. The CFTC aims to expand on practices first laid out in 1936 by the Commodity Exchange Act (CEA) to protect market participants from fraud, market manipulation, and other unethical practices. The CFTC works together with the Securities and Exchange Commission (SEC) and other regulatory bodies in the U.S. to achieve these common goals.

Commodity-Backed Stablecoin

Commodity-backed stablecoins are pegged to the value of underlying commodity assets like gold, silver, or real estate. Holders of these stablecoins have a claim to their underlying assets. The most popular commodity-backed stablecoins are backed by gold. For example, each PAX Gold (PAXG) token is pegged on a 1:1 ratio to one troy ounce (t oz) of a 400-ounce London Good Delivery gold bar.

Community Node (Crypto.com)

Within the Crypto.com blockchain ecosystem, Community Nodes are responsible for sending, verifying, and receiving transactions, as well as reading data on the protocol. Community Nodes can be accessed for use by any member of the Crypto.com community.

Community Representative Node (C-Rep) (ICON Network)

On the ICON Network, a Community Representative (C-Rep) represents one of the two main types of Peer nodes (the other being a P-Rep) that are responsible for maintaining network security and consensus. A C-Rep represents the community interests of enterprise and governmental constituents like hospitals, government entities, financial markets, and corporate entities.

COMP (Compound)

COMP is the governance token of the Compound protocol, a decentralized, blockchain-based protocol that allows users to lend and borrow crypto. A predetermined amount of COMP is distributed to all lenders and borrowers on the Compound protocol every day. Anyone who owns at least 1% of the total COMP supply can submit and vote on proposals to change the protocol.

Compiler

A compiler is a software implementation that translates, or compiles, computer code written in one software development language into another so that it can be used with different types of computing infrastructure. Among other functions, compilers are commonly used to translate computerized code from high-level programming languages into simpler assembly languages that are able to decipher machine-readable instructions.

Compliance

Compliance is the process of ensuring financial enterprises meet certain regulatory guidelines introduced by government bodies, such as the Securities and Exchange Commission (SEC) in the U.S. These guidelines seek to protect investors, ensure consumer confidence, and facilitate the transparency and efficiency of fair markets while reducing financial crime and system risk.

Composability

Composability is a design feature that accommodates for infrastructural elements of a system to be easily integrated with and utilized by other systems and third parties. Composable systems are often compared to “Lego blocks” because they are built of various parts that can be fit together to create new platforms.

Compound

Compound is a decentralized lending and borrowing platform for digital assets on Ethereum. Borrowers on Compound are required to provide a minimum amount of collateral to access a loan, while interest rates are determined by a crowdsourced token supply. Tokens locked in the Compound protocol automatically earn interest as they are lent out to borrowers.

Compound Annual Growth Rate (CAGR)

The Compound Annual Growth Rate (CAGR) is the rate of return of an investment over a specified period of time as denoted by using an annual percentage. The CAGR is expressed by using this formula: CAGR = (EB/BB)^(1/N) - 1

where: EB = Ending balance BB = Beginning balance N = Number of years

Computational Backlog

Computational backlog (or debt) is defined as a set of calculations that must be completed to bring a backlog on a computer system, network, or related system up to date. Computational backlog occurs when a computer system or a blockchain network accumulates too much computational debt. This is a highly undesirable situation for a blockchain because it can result in deteriorating system performance, including significant transaction time delays. Computational backlog must be managed efficiently to maintain the long-term health of a network.

Compute-To-Data

Compute-to-data is a relatively new and popular method of training artificial intelligence (AI) models characterized by running an algorithm where a set of data exists, rather than the traditional method of sending the data to where the algorithm runs. This model exists to preserve data security — by keeping data securely onsite — while still allowing third parties to use and benefit from the data. Compute-to-data is especially useful with data-intensive workloads, the likes of which are common with cutting-edge industries like AI.

Computer-Aided Design (CAD) Software

Computer-aided design (CAD) software is any type of software program that is built for creating digital designs of objects. CAD software has virtually unlimited use cases including manufacturing and product design, architecture and infrastructure design, vehicle design, electronics design, and much more. CAD software allows users to test objects in numerous distinct mediums using various real-world simulations to develop products that actually have utility. CAD programs are typically used on a tablet or computer to create three-dimensional objects in various mediums.

Concealment

Concealment is a category of malware that attacks computer systems by evading detection. Common types of concealment malware include Trojans, backdoors, and rootkits.

Confirmation Time

As it relates to blockchain and crypto, a confirmation is a measurement of how many blocks have been finalized since a transaction was sent from one address to another. As more confirmations take place, the security of the transaction increases until all block confirmations have been finalized and permanently become part of the ledger. The number of confirmations needed to successfully finalize a transaction may vary because different protocols operate differently.

Consensus Mechanism

A consensus mechanism is an algorithm that some participants in a blockchain network use to reach an agreement on the state of the blockchain ledger, including the order of transactions. Popular consensus algorithms include Proof of Work (PoW), Proof of Stake (PoS), and Delegated Proof of Stake (DPoS).

ConsenSys

ConsenSys is a large blockchain company based in New York City with a presence in more than 30 countries around the world. It was founded in 2015 by Joseph Lubin — whose early work included development of the Ethereum network and the Ethereum Foundation. ConsenSys is a decentralized blockchain production studio with more than 500 employees which primarily develops software and related solutions for the Ethereum blockchain ecosystem. The company also provides enterprise and government consulting, as well as software development services for large companies across the world.

Consortium Blockchain

A consortium blockchain is a private blockchain network managed by multiple entities, wherein each retains special privileges. Controlling entities typically participate in the consensus process as a transaction validator and have permissions to view certain types of data. Consortium blockchains are a less decentralized digital ledger technology that maintains some benefits of distributed systems for enterprise and government use cases.

Constant Product Formula

A constant product formula is an algorithm used to determine the price of tokens on an automated market maker (AMM) platform. The formula maintains that tokens in a liquidity pool must remain at a fixed relative value. The most well-known formula is x * y = k, pioneered by the Uniswap protocol, which maintains that a pair of tokens in a liquidity pool must remain at equal total values. By fixing the relative value of the tokens, the formula is able to automatically determine pricing.

Constant Reserve Rate (CRR)

The constant reserve rate (CRR) or constant reserve ratio, is the amount of cash that commercial banks must hold to protect their long-term viability in case a bank run occurs and customers rush to withdraw all their funds out of their accounts. The CRR takes into consideration the total amount of assets (including stocks, bonds, equities, derivatives, and other investment types) held by the bank. Commercial banks in the U.S. are regularly audited by the Federal Reserve to ensure their CRR is accurate and that they are operating in a fully compliant manner.

Consumer Price Index (CPI)

The Consumer Price Index (CPI) is a measurement designed to track the weighted average of a basket of consumer goods and services including transportation, food, medical care, and associated costs of living in a specific area. It is determined by aggregating the average prices of a basket of items, and is generally used to identify periods of inflation or deflation and the overall efficiency of a government's economic policies. The CPI typically involves statistics that cover those who are employed, self-employed, unemployed, retired, incarcerated, impoverished, and more.

Consumer to Business (C2B)

Consumer to business (C2B) is a model that is used by a consumer or end user to provide a product or service that benefits a company or related organization. With a C2B model, a customer is often incentivized to market a product or service via a website, blog, podcast, video, or social media account. In a C2B model, the business benefits from the marketing of the product, while the consumer often benefits from free or discounted products, payment, or other benefits. C2B is one of four main business models alongside business to consumer (B2C), business to business (B2B), and consumer to consumer (C2C).

Consumer to Consumer (C2C)

Consumer to consumer (C2C) is a business model that involves the sharing or sale of products and services between consumers. The C2C model is often facilitated by a third-party service provider or company and is usually conducted on the internet. Examples of C2C platforms include online auction platforms (e.g., eBay), exchange of goods and services platforms (e.g., Craigslist), and digital payment platforms (e.g., PayPal and Venmo). Amazon’s online marketplace also operates using both a business to consumer (B2C) and C2C model. C2C is one of four main business models alongside B2C, business to business (B2B), and consumer to business (C2B).

Content Delivery Network (CDN)

A content delivery network (CDN) allows specific decentralized applications (dApps) to enable the sharing of internet content such as web objects (like text, graphics, and scripts), downloadable objects (such as software, media files, and documents), streaming media, and social media websites.

Continuous Order Book

A continuous order book is a listing of parties interested in buying or selling an asset on a market. The list specifies the quantities and prices each buyer or seller is willing to accept for an exchange. A matching engine is concurrently used to pair the buyers and sellers, while the order book is updated in real time.

Contract for Difference (CFD)

A Contract for Difference (CFD) is a derivatives trading agreement that settles the difference between the open and closing prices of an asset in cash with no rewards in physical goods or other compensatory value. A CFD allows traders to bet against the anticipated direction of an asset price by using advanced trading techniques over a very short time period, often with extremely high leverage. CFDs are typically used by investors to trade forex (fx), crypto, commodities, and other markets.

Contract Separation

Contract separation is a key design logic that underpins the Gemini dollar (GUSD) smart contract. Instead of a single unifying smart contract, Gemini dollar contracts are separated into multiple layers, each with a specific function. Contact separation increases the security and robustness of smart contracts within GUSD’s protocol.

Convergence

In an investment context, convergence refers to the confluence of two data points, such as when the current price of an asset and its relative strength index (RSI) both increase. The opposite of convergence is divergence, where two technical indicators go in opposite directions. Convergence can also be classified as a process whereby the price of a futures contract gets closer to the spot price of an underlying commodity — thus converging — as the delivery date of the contract expires.

Cookie (Data Packet)

A cookie, sometimes called an internet cookie or HTTP cookie, is a packet of data that a computer receives (and sends back when needed) from a website while a user is browsing the internet. Cookies have various purposes including tracking and storing browsing history, keeping track of online purchases, and for user authentication of login credentials, among other tasks. Cookies are very important in facilitating the proper functionality of the internet as user and networking architecture would not functionally operate without them.

Coordinated Universal Time (UTC)

Coordinated Universal Time (UTC) is the primary time standard that the world uses to correctly regulate time and clocks. UTC makes use of extremely precise atomic clocks in conjunction with the Earth’s rotation, and is always within one second of mean solar time at 0° longitude and is not adjusted for daylight savings time. UTC, which was implemented on January 1, 1960, is the successor to Greenwich Mean Time (GMT). UTC time is a critical data point used by investors as a universal indicator of the times that different stock markets open and close across the globe.

Copy Trading

Copy trading, sometimes called mirror trading, is the process of utilizing algorithmic software to mimic the trading strategies and habits of another trader or group of traders. Many users pay for services that allow them to copy the trades that a real trader makes, with the hopes of obtaining higher levels of profitability. Copy trading can be utilized for most market types to trade any number of assets, and can be used via a mobile device, computer, or through more complex, expensive combinations of computing hardware and software (e.g., by an institutional investment firm).

Corporate Bond

A corporate bond is a debt security a company issues in order to raise capital that can be traded on the secondary market. Purchasers of corporate bonds effectively lend money to the issuing company in return for a series of interest payments. Rating agencies like Moody's, Standard & Poor's, and Fitch evaluate the creditworthiness of corporate bonds.

Correction

A correction, in a stock trading and crypto investing context, is an occurrence that signifies that the market, or a specific asset has just had a large drop in price from a recently higher price. The process usually results in the price returning to a level more established over the long term. Corrections are often followed by a recovery in price and a continued uptrend, but can sometimes indicate a prolonged long-term market downturn called a bear market.

Cosmos (ATOM)

Cosmos is a platform designed to connect independent blockchain networks. The platform facilitates data transfer between different blockchains to facilitate what is referred to as the ‘internet of blockchains.’ ATOM is the native token of the Cosmos network, and it is used for transaction payments, governance voting, and staking to secure the network.

Cosmos Gravity Bridge

The Cosmos Gravity Bridge is a specialized type of blockchain architecture that is designed to act as a bridge between the Cosmos Hub blockchain and the Ethereum network. Its main purpose is to facilitate the transfer of ERC-20 assets originating on Ethereum over to various Cosmos-based blockchains — and then back again to Ethereum if needed.

Cosmos Hub

The Cosmos Hub is the primary blockchain protocol used for connecting with other blockchains as part of the Cosmos Network's endeavor to facilitate an 'internet of blockchains.' The Cosmos Hub is a Proof-of-Stake blockchain built by the Ignite team. Its ATOM token is used to both secure the network through staking and vote on governance decisions.

Cosmos Software Development Kit (SDK)

The Cosmos Software Development Kit (SDK) is a framework that allows developers to build Proof-of-Stake (PoS) and Proof-of-Authority (PoA) blockchains. The framework is designed to construct application-specific blockchains rather than more generalized virtual machine-based blockchains. The Cosmos SDK is a scalable, open-source infrastructure, and is used to build blockchain platforms such as the Cosmos Hub.

CosmWasm

CosmWasm is a blockchain, decentralized application (dApp), and smart contract development framework created by Cosmos for developers building on the Cosmos Network. Leading blockchain ecosystems employing the use of CosmWasm include: Iris Network (IRIS), OKExChain (OKT), Persistence (XPRT), and others. CosmWasm is a WebAssembly-based (WASM) iteration designed to allow software engineers to easily build smart contracts in Rust, Go, or AssemblyScript on multiple chains through the Cosmos Inter-Blockchain Communication (IBC) Protocol interoperability solution. CosmWasm is built for easy integration with Cosmos SDK and as a mature tooling system for smart contract deployment and testing.

Cost Basis

The cost basis is the reported starting value of a particular asset such as a cryptocurrency that you own. The cost basis can be the price of the asset on either the date of purchase, or the date the asset was received. When the asset is sold, the cost basis is subtracted from the sale price to determine the monetary gain or loss.

Council Node (Crypto.com)

A Council Node is the most powerful and important node type within the Crypto.com blockchain system. They are responsible for maintaining network consensus and governance of the platform. Council nodes are used for settlement execution, ordering transactions and CRO rewards tracking, along with verifying, receiving, and sending all network transactions. Council Nodes also maintain a whitelist log for Council Node, Acquirer Node, and Community Node Identities.

Counter-Terrorist Financing (CTF)

An aspect of broader Anti-Money-Laundering (AML) protocols and initiatives, Counter-Terrorist Financing (CTF) standards are designed to prevent the flow of funds to terrorist networks. This is done by monitoring suspicious bank and business transactions — and other activities that may be related to money laundering. CTF policies are implemented by intergovernmental bodies such as the Financial Action Task Force (FATF), individual countries, and the CTF standards of financial institutions in the private sector.

Counterparty (Blockchain Protocol)

Counterparty is a protocol that is designed to allow the issuance of tokens on the Bitcoin blockchain.

Counterparty Risk

Counterparty risk refers to the possibility that a party involved in a transaction will fail to meet their obligations. Various measures can be put in place to mitigate counterparty risk. One blockchain-based solution is an automated smart contract that only executes once certain conditions have been met.

Coupon Payment

In a corporate bond, a coupon (or coupon payment) is the dollar amount of interest paid to an investor. It is calculated by multiplying the interest rate of the bond by its face value.

Credit Rating

A credit rating is an analysis of the credit risks associated with a financial entity. A credit rating may be assigned to any entity that seeks to borrow money — a corporation, individual, state authority, or sovereign government. Credit ratings assess the ability of a borrower to repay a loan — either in general, or for a particular debt or financial obligation.

Credit Risk

Credit risk refers to the loss potential of a borrower failing to repay a loan. In a fixed-income investment agreement, interest payments are meant as an incentive for an investor to assume credit risk. Higher interest rates tend to compensate for greater credit risk.

Cronos (CRO)

Cronos (CRO) is the foundational coin that drives Crypto.com’s ecosystem of payment, trading, and financial services. The CRO coin is utilized for on-chain transaction settlement, and to ensure the consensus and security of the platform. CRO is also designed to be used as an incentivization mechanism by providing rewards for users who engage with various services within the Crypto.com ecosystem.

Cross Margin (Derivatives Trading)

Cross margin, or spread margin, is a form of margin trading that uses the full amount of a user’s available account balance to avoid liquidations. By using cross-margin trading, any realized profit and loss (PNL) helps add margin on a losing position. Cross-margin trading is helpful for users that are hedging existing positions and also for arbitrageurs that want to limit their exposure to the losing side of a trade in the event of a liquidation. Cross-margin trading is the opposite of isolated margin trading, which only uses isolated portions of the account balance for each trade.

Cross-Chain Communication

Cross-chain communication is a process that allows for communication between different blockchain networks by enabling mutual interaction and value exchange — for example, in the form of token exchange and the sharing of multiple data types. Cross-chain communication is central to the concept of blockchain interoperability. There are many inefficiencies related to cross-chain communication, but as blockchain technology continues to advance, many experts predict that it will become increasingly more efficient to exchange data in more ways, such that one day full data sharing capabilities between hundreds or even thousands of networks may be possible.

Cross-Chain Message Passing (XCMP)

Cross-chain describes the transfer of data, tokenized assets, or other types of information from one independent blockchain network to another. On the Polkadot network, XCMP is a specialized mechanism used to send information between different blockchains linked together on Polkadot’s interoperable network. The XCMP system relies on Polkadot’s collator nodes to route messages between blockchains.

Crowdloan (Polkadot and Kusama)

A crowdloan is a process through which parachain teams building on Polkadot or Kusama enable outside investors to stake their DOT or KSM tokens within a parachain slot, for the purpose of increasing their allocated number of tokens — thereby strengthening the chances of winning a parachain slot auction. If successful, the project will be able to operate their parachain in the Polkadot Relay Chain or the Kusama Rococo Relay Chain for a period of 6 months to 2 years, with the possibility of extension prior to expiration. Winning teams are able to structure their crowdloan in numerous ways, rewarding their various contributors how they want.

CRV Token

The CRV token is the ERC-20 token that governs the Curve protocol. CRV token holders have the ability to propose and vote on changes to the platform. The CRV token can be earned by providing liquidity to designated Curve liquidity pools.

Crypto Mining Processor (CMP)

A crypto mining processor (CMP) is a graphics processing unit (GPU) designed specifically for crypto mining. These crypto-specific graphics cards typically include better hashing performance over comparable GPUs since they are optimized to mine cryptocurrencies. In addition, these cards usually can’t be used for other purposes (like gaming or video rendering) as they lack the external connections needed for streaming video to a monitor.

Crypto Ransomware

Crypto ransomware uses encryption to maliciously block access to a user’s data. Victims of a crypto ransomware attack are told to pay a ransom in return for releasing their locked data. In recent years, attackers have demanded ransoms to be paid in cryptocurrencies such as bitcoin (BTC).

Crypto Token

A crypto token is a blockchain-based unit of value that organizations or projects can customize and develop for use within existing blockchain ecosystems. Crypto tokens can be programmable, transparent, permissionless, and trustless. They can also serve many functions on the platforms for which they are built, including being used as collateral in decentralized financial (DeFi) applications, accessing platform-specific services, or voting on DeFi protocols.

Crypto-Backed Loan

A crypto-backed loan lives on the blockchain and requires borrowers to provide cryptocurrency as collateral. When borrowers pay back into the smart contract, they receive their collateral.

Crypto-Backed Stablecoin

Crypto-backed stablecoins are one of four main stablecoin types. They are typically overcollateralized by an underlying cryptocurrency asset to account for crypto price volatility. With cryptocurrency as their underlying collateral, crypto-backed stablecoins are issued on-chain. To obtain a crypto-backed stablecoin, a user locks their cryptocurrency in a smart contract to receive stablecoins. Paying the stablecoins back into the same smart contract allows a user to withdraw their original collateral.

Crypto-Collateralized Loan

Crypto-collateralized loans are a type of loan where the issuer accepts a cryptocurrency deposit as collateral to issue a loan in another cryptocurrency or fiat currency. The borrower must typically deposit a higher amount of initial cryptocurrency (than the loan total) to provide a buffer against the market volatility common to digital assets. Since these loans are collateralized (often overly so), they are commonly processed quickly (sometimes in minutes) and normally don’t require traditional credit checks.

Crypto.com

Crypto.com is a cryptocurrency payments platform that promotes the widespread adoption of cryptocurrency. The site initially ran on a dual-coin structure that used both Monaco Coin (MCO) and Cronos (CRO). However, in late 2020 the platform completed a coin swap which consolidated the network under the CRO coin, which is now used as the platform's primary coin for cross-asset settlements, block transaction fees and validation rewards, and as a staking mechanism to unlock tiered user benefits.

Cryptoart

Cryptoart is native to the blockchain and has its own particular aesthetic. It can be defined as rare digital artworks — sometimes called “digital trading cards” or “rares” — which are associated with unique and provably rare tokens that exist on the blockchain.

Cryptocurrency

Cryptocurrency is a digital asset that circulates on the internet as a medium of exchange. It employs blockchain technology — a distributed ledger of transactions that is publicly available — and is secured by advanced cryptography. This revolutionary asset architecture allows for certainty that cryptocurrency coins and tokens cannot be double-spent even in the absence of a centralized intermediary. The first cryptocurrency to achieve mainstream success was Bitcoin which paved the way for the proliferation of many other cryptocurrencies.

Cryptocurrency Address

A cryptocurrency address is generally a string of alphanumeric characters that represents a wallet, exchange, or similar blockchain-specific address. A crypto address can also be represented by a QR code or a human-readable address representation. All wallet and exchange addresses are unique and denote the location of the sender and receiver on the blockchain network. Blockchain addresses can be evaluated publicly on a blockchain explorer (a web service that records all transactions that have ever taken place on the network), but are also pseudonymous, because they are not necessarily linked to their user’s real-world identity.

Cryptocurrency Exchange

A cryptocurrency exchange — or crypto exchange — is an exchange where digital assets can be bought, sold, and traded for fiat currency or other digital assets. They share similarities with traditional stock exchanges (where stocks are traded) in the type of transactions and orders that users can execute. Crypto exchanges have evolved significantly from early iterations (which were often unregulated) to provide more security and accessibility while ensuring legal compliance in accordance with the jurisdictions in which they operate. As the crypto space grew, more exchanges emerged to provide competitive trading fees, exchange rates, and user-friendly features.

Cryptocurrency Faucet

A cryptocurrency faucet is a website or mobile application that distributes small amounts of crypto to users in exchange for completing tasks to help grow a project’s reach, such as sharing posts on social media, viewing ads, and watching videos, among others. Not to be confused with airdrops, which typically present bigger rewards, faucets are aptly named because their rewards are small and analagous to drops of water leaking from a faucet. The first Bitcoin faucet was created by Gavin Anderson in 2010 to give new users access to bitcoin (BTC) and to help raise awareness and involvement.

Cryptocurrency Pair (Trading Pair)

A cryptocurrency trading pair allows you to trade one cryptocurrency for another. This means that you can view the value of one cryptocurrency asset relative to another cryptocurrency asset. This is most typically available with bitcoin (BTC) and allows you to see how much a given asset is worth in BTC instead of, say, a fiat currency. Cryptocurrency pairs help establish value between cryptocurrencies without referring back to fiat currency.

Cryptocurrency Wallet

Cryptocurrency wallets come in a variety of forms, their most basic function is to store a user’s private and public keys and interact with various blockchains enabling users to send and receive digital currency and monitor their cryptocurrency balances. Wallets have a public address that can be given out for people to send you digital assets, and a private key to confirm the transfer of digital assets to others. Wallets can be digital (software) or physical (hardware), hot (connected to the internet) or cold (disconnected from the internet), custodial (a trusted third party has control of a user’s private keys) or non-custodial (only the user controls their private keys).

CryptoDefense Ransomware

CryptoDefense is an advanced subset of CryptoLocker Ransomware that appeared around 2014. It used public-key cryptography (PKC), and targeted computers running the Windows operating system (OS). The infection was spread through spam emails with infected PDF documents. Victims were often given 72 hours to pay ransom, collected largely in bitcoin (BTC), in order to regain access to their infected files which would otherwise be permanently deleted.

Cryptographic Proof

A cryptographic proof is a special type of technology that is commonly built into a blockchain network to hide sensitive information. Cryptographic proofs are generally used to prove and verify certain data without revealing any other details about the data itself. They are designed to conceal details such as ownership and other sensitive data from other parties that participate in the network. Zk-SNARKS are one of the most effective and well-known types of cryptographic proofs.

Cryptographically Verifiable

Blockchain networks employ specialized on-chain mechanisms — often called cryptographic proofs — that allow data transferred on a network protocol to be verifiable and unalterable. The process is facilitated through complex algorithmic cryptography that is immutable and helps prevent the falsification and modification of data, so that network users and outside participants know with increased certainty that the value, data or crypto they are sending or receiving is in fact legitimate. These characteristics make it possible for users to place considerably less trust in another party, instead relying on the underlying blockchain protocol, its smart contract mechanisms, and its informatic code.

Cryptography

In computing, cryptography is the study of secure communication techniques that allow computerized networks to operate in a transparent and verifiable manner. In blockchain specifically, cryptography often involves the use of asymmetric encryption (public-key cryptography) and other specialized encryption frameworks that are used to secure the integrity of data exchange on distributed systems. In general, cryptography is the study and analysis of computing protocols and similar systems to prevent malicious behavior. Data confidentiality, authentication, data security, and other related practices are essential to modern day cryptography.

Cryptography Mailing List

The Cryptography Mailing List is the mailing list on which Satoshi Nakamoto introduced Bitcoin. The Cryptography Mailing List is devoted to the discussion of online privacy, cryptographic technology, and their associated political implications.

Cryptojacking

Cryptojacking refers to a type of attack where the victim's computer, or other hardware, is turned into a cryptocurrency mining device without their knowledge. Victims' devices and electricity are then used to generate cryptocurrency mining rewards on behalf of the attacker. Cryptojacking can be carried out remotely through malware or by someone with direct physical access to the device.

CryptoKitties

CryptoKitties is a blockchain game created by Axiom Zen in 2017. The game allows players to purchase, sell, and breed digital collectible cats that are ERC-721 tokens, Ethereum’s token standard for non-fungible tokens (NFTs).

CryptoLocker Ransomware

CryptoLocker Ransomware is a type of ransomware that first appeared around 2013. It infiltrated computers through spam emails, which included an infected ZIP file attachment in its first wave of attacks. Attackers used encryption algorithms to encrypt infected files and systems, which then spread to other devices through network drives. A second version of CryptoLocker was spread through the peer-to-peer (P2P) botnet Gameover ZeuS, which used a botnet to send spam or fake emails that would lure victims into executing exploit kits.

Cryptomining

Cryptocurrency mining is the process of solving equations in a Proof-of-Work consensus mechanism to verify transactions and add new blocks to the blockchain. Computers that support a blockchain network are called nodes, and the process by which they solve complex equations is called mining. Miners are those who operate these computers. For their efforts, they are compensated with a mining reward, typically in the blockchain’s native cryptocurrency.

CryptoPunks

CryptoPunks are one of the most well-known and highly valued collections of non-fungible tokens (NFTs) in the crypto industry. CryptoPunks were released in 2017 on the Ethereum blockchain and are characterized by the cyberpunk and London punk genres. After several years of maturation, many CryptoPunks have been auctioned off for millions of dollars. Apart from a highly sought-after reputation, the collection is verifiably limited to 10,000 punks. CryptoPunks were one of the first ever tokenized collections that initiated the ERC-721 standard for NFTs.

CryptoWall Ransomware

CryptoWall is an advanced subset of CryptoLocker Ransomware that first appeared around 2014. It used a sophisticated encryption algorithm and spread through email attachments, exploit kits, and drive-by downloads. In order for a user to regain access to their infected files, ransom was demanded in bitcoin (BTC) and litecoin (LTC).

CSS (Cascading Style Sheets)

Cascading style sheets, or CSS, is a style sheet language that makes up a large part of the internet, along with HTML, JavaScript, and other frameworks. CSS allows developers to add and separate different types of fonts, colors, and layouts that are used on web browsers. CSS is also used to allow for variations in display across different device and screen types used on mobile phones, tablets, computers, and other related hardware. The CSS format was registered with the World Wide Web Consortium (W3C) during the spring of 1998 when the internet started to become more mainstream.

cToken

A cToken is a lending token native to the Compound platform. When users deposit a cryptocurrency using the Compound protocol, they receive cTokens which represent the initial deposit plus accrued interest. For example, lending DAI to Compound gives the lender cDAI, which automatically earns interest for the cDAI holder. At any time, cDAI can be returned to Compound in exchange for the original DAI plus the accumulated interest.

Cumulus (Polkadot)

Cumulus is an extension of the Polkadot Substrate development framework that allows Substrate-built runtimes to be compatible with Polkadot parachains through Polkadot’s Relay Chain. A fundamental component of Cumulus is the Cumulus consensus engine, which is used to run a Polkadot node. This consensus engine is internally used to dictate to the node and synchronization algorithms which chain to follow, finalize, and treat as legitimate. Cumulus also makes use of Cumulus Runtimes to help enable validator nodes to work via Substrate and the system’s block validator application programming interface (API). Finally, Polkadot Collators are also implemented via the Cumulus repository.

Currency Crisis

A currency crisis is a type of financial crisis characterized by a nation's fiat currency losing its value. A currency crisis arises when investors become leery of holding a country's assets. For example, when investors lost confidence in the Icelandic financial sector, the country faced a currency crisis when the value of Icelandic currency fell by 60% between the end of 2007 and the end of 2008.

Curve (CRV)

Curve is a decentralized exchange (DEX) optimized for low slippage and low fee swaps between assets pegged to the same value. Curve is also an automated market maker (AMM) that relies on liquidity pools and rewarding those who fund the pools, and deals only in stablecoins. CRV is the governance token of the Curve protocol, and is also used to pay liquidity providers on the platform.

Custodial Wallet

A custodial wallet is a type of cryptocurrency wallet where a third party holds a user's private keys and cryptocurrency funds. With a custodial wallet, a user must trust a third party to secure their funds and return them upon request. The most common custodial wallets are web-based exchange wallets.

Custodian

A custodian is responsible for securely storing assets, such as cryptocurrency, for another institution or individual. Typically, custodial services are targeted at institutional investors who hold large amounts of cryptocurrency. Custodians are often exchanges that host cryptocurrency wallets for their users.

Custody

Custody refers to the legal ability for a financial institution to hold and protect financial assets for its customers with the aim of preventing asset theft or loss. Custodians may hold assets in both electronic and physical form. Because they are responsible for safeguarding assets for many customers (potentially worth billions of dollars), custodial firms tend to be extremely large and reputable institutions. With cryptocurrency and blockchain custody solutions, custodianship may also include the management and safekeeping of a customer’s private keys. Cryptocurrency exchanges often custody their customers' private keys and cryptocurrency holdings.

Customer Due Diligence (CDD)

Customer Due Diligence (CDD) is the process of verifying the identity of potential customers. Typically, this process gathers facts about potential customers enabling an organization to assess the extent to which the customer may expose the organization to a range of risks, including money laundering and terrorist financing activities. This process usually entails obtaining a customer's name, residential address, and official government documentation that includes their photograph and date of birth.

Customer Identification Program (CIP)

Established by the U.S. Patriot Act of 2001 and implemented in 2003, the Customer Identification Program (CIP) prescribes the minimum standards with which financial institutions must confirm the identity of a new customer in connection with opening an account. Each financial institution's CIP is proportional to its size and type of business, types of accounts offered, methods of opening accounts, and other factors. The objective of this program is to minimize the degree to which the U.S. financial system is used for money laundering and terrorist financing activities.

Cyber Attack

A cyber attack is a malicious online data intrusion carried out by criminals against a computer system, network, or related software or hardware device. Cyber attacks are used to disable a target network or computer system, steal or destroy important data, or to compromise computers to launch more complex and damaging attacks.

Cybersecurity

Cybersecurity — also referred to as computer security or information technology (IT) security — is the practice of protecting computer networks and systems from damage and theft of hardware, software, electronic data, and curtailing disruption of the services they provide. The importance of robust cybersecurity continues to increase as the world becomes more technologically reliant on computers, mobile devices, Wi-Fi, wireless networks, smart devices, the Internet of Things (IoT), and related technologies due to their susceptibility to security breaches and hacks.

Cycle (DFINITY)

In DFINITY’s Internet Computer, cycles power smart contract computations (referred to as software canister computations) to execute actions on the Internet Computer Protocol (ICP). The cost of computations is expressed in units of cycles that are equivalent to gas within the Ethereum network. Cycles represent the actual cost of operations such as physical hardware, energy storage devices, and network bandwidth.

Cypherpunk

The cypherpunk movement includes individuals (cypherpunks) and entities who generally advocate the widespread use of cryptography, blockchain, and related privacy-preserving technologies as a means for engendering social and political change. The movement began through communication on a mailing list in the late 1980s, which discussed cryptography, encryption, privacy, and security as means of empowering society on a far-reaching scale. The cypherpunk community represented some of the earliest adopters of Bitcoin in the late 2000s and early 2010s.


D

Daedalus Wallet (Cardano)

The Daedalus Wallet is an open-source software wallet for Cardano’s ADA and is supported by all major computer operating systems. It is a hierarchical-deterministic (HD) desktop wallet that gives users more control of how they manage and back-up their funds. Daedalus is also a full node wallet, which gives it good security for a software wallet, as this allows the wallet to be trustless. Other notable features include a customizable user interface and an integrated news feed.

Daemon

A daemon is a computer program that runs as a background process on a computing device rather than being controlled by an interactive user. Daemons are usually initiated upon booting up the computer, rather than being activated manually. They typically control functions like responding to network requests and detecting hardware activity.

Dagger

Dagger is a specialized notification engine used to keep track of accounts and data events within the Ethereum network in real-time. Dagger is designed as a JavaScript (JS) based framework that allows developers to employ Polygon’s MoreVP scaling technology to create state-of-the-art dApps that can run on the Ethereum network.

DAI

DAI is an ERC-20 stablecoin token released by the Ethereum-based MakerDAO protocol that is used to facilitate collateral-backed loans without an intermediary. DAI is pegged to the U.S. dollar in a 1:1 ratio so that each DAI should be worth $1 USD. DAI is a decentralized crypto-backed stablecoin, and thus maintains its USD peg by using collateral in the form of cryptocurrencies like ether (ETH).

dAppChain (Loom Network)

On the Loom Network, a dAppChain is a dApp-specific transaction sidechain built on top of the base Ethereum blockchain to maximize efficiency. A dAppChain can handle complex processing tasks and even host entire dApps, all while minimally interacting with the base layer blockchain to which it is anchored. Applications developed using the Loom Network feature a unique dAppChain to carry out distinct consensus models, protocols, and optimizations.

Dapper Labs

Dapper Labs is a Canadian blockchain development firm owned by Axiom Zen. Dapper Labs is known for the creation of Crypto Kitties in 2017, and later for the development of several other notable blockchain projects. Dapper labs is focused on the creation of blockchain systems that are generally used for decentralized finance (DeFi), gaming and esports, and non-fungible tokens (NFTs). Flow Blockchain — built by Dapper Labs — helped create NBA Top Shot (a platform for trading, collecting, buying, and selling NBA NFT collectables) in 2020, and is expected to release similar platforms and products in the coming years.

Dark Web

The dark web is a segment of the internet intentionally hidden from conventional search engines and only accessible by means of special software. The most common web browsers used to access the dark web are Tor and I2P, which use masked IP addresses in order to hide the identity of dark web users and site owners. The dark web is typically associated with cybercrime and illicit activity. The dark web constitutes a small sliver of the larger deep web, which is also hidden from conventional search engines, but is not generally associated with illicit activity.

Darknode (Ren)

RenVM is an inter-blockchain liquidity network made up of thousands of independently operated nodes called Darknodes. Anyone can run a Darknode, but each node must run the RenVM software via a Virtual Private Server and deposit 100,000 REN tokens into the Darknode Registry Contract. This mechanism incentivizes the node operators to refrain from malicious behavior at the risk of forfeiting their deposit. Darknodes collectively act as a trustless, decentralized custodian of the digital assets that users lock up on the RenVM platform. They allow users to collect fees every time the RenVM converts a digital asset into an ERC-20 token.

Data Access Layer (DAL)

A data access layer (DAL) is generally considered the main component of the back-end of a computer system or network. It is a layer within a computer program that allows programs to access data and persistent storage. DALs allow running programs to access data anytime it is needed to operate correctly. Applications that make use of DALs leverage a database server, or can operate without one. DALs support several database formats, but must be able to communicate with different data requests within a system.

Data Anchoring

On the Klaytn blockchain platform, the process of data anchoring connects data from the auxiliary service chain to the mainchain. Data anchoring periodically stores block hashes from the faster, more customizable service chain onto the more secure mainchain. The technique is meant to increase the security of service chains, which can be less secure than the mainchain due to their smaller number of nodes.

Data Packet

A data packet is a unit of data that can be transferred over a network. They are usually measured in megabytes (MB) or gigabytes (GB). A live internet connection contains a constant back-and-forth exchange of data packets.

Data Science (DS)

Data science (DS) is the interdisciplinary study of data to create actionable insights into the growing amount of data the world uses in many sectors. DS generally combines the use of analytics, artificial intelligence (AI), and scientific methodologies to compile, store, interpret, and process large amounts of data. DS can be employed in nearly any industry imaginable, and helps organizations, businesses, and other constituents learn from the data they use, often to help ensure greater technological innovation and higher rates of profitability.

Data Scraping

Data scraping, also known as web scraping, refers to methods with which computer programs extract data from websites for use in local databases or other applications. Data scraping is most commonly used to gather content, prices, or contact information from online sources. While there are valid legal use cases for data scraping tools, the same software can also be used to download and reappropriate data for unauthorized purposes, such as identifying pseudo-anonymous web service users or plagiarizing branded content.

Data Verification Mechanism (DVM)

The Data Verification Mechanism (DVM) is the oracle process used to resolve disputes on the UMA protocol. When there is a price dispute between two parties over a synthetic token derivative contract, the DVM requests UMA token holders vote on the correct price. The DVM then relays the correct price to the requestor and rewards UMA token holders for their vote.

Datatoken (Ocean Protocol)

Datatokens are ERC-20 tokens that represent tokenized datasets and data services on the Ocean Protocol. By purchasing a particular datatoken on Ocean's data marketplace, users gain access to particular datasets and data services that the datatokens represent. Datatokens serve as both an on-ramp and off-ramp for data to enter the decentralized finance (DeFi) space and become monetized on the Ocean Protocol.

Day Trader

In traditional markets, day traders execute a trading strategy that involves only holding intraday positions and do not hold open positions overnight. Day traders attempt to take advantage of short-term price fluctuations between highly liquid assets. Day trading is generally regarded as a riskier investment than long-term strategies.

dBFT 2.0

The NEO blockchain uses a highly advanced framework (dBFT 2.0) similar to Proof-of-Stake (PoS) called Delegated Byzantine Fault Tolerance or dBFT. NEO’s dBFT 2.0 solves several inefficiencies that the first version of dBFT struggled with. DBFT 1.0 was sometimes susceptible to a single block fork, meaning that messaging problems between system nodes could often occur, resulting in network inefficiencies. To fix this problem, dBFT 2.0 changed the messaging request system that allows nodes to communicate with each other, adding the Recovery Message option. This option helps the network’s main Consensus Nodes to recover faster in the event of messaging problems, and to thus maintain consensus more effectively.

Dead Cat Bounce

A dead cat bounce is a technical analysis charting pattern that refers to a temporary recovery in the price of an asset that is experiencing a prolonged decline, followed by a continued downtrend. A dead cat bounce is essentially a fake out in the price recovery of an asset. This term is derived from a Wall Street adage that says "even a dead cat will bounce if it falls from a great height."

Dead Coin

Dead coins are cryptocurrencies or defunct crypto projects that have been abandoned. Several criteria are used to designate dead coins: inactive webpages, lack of development updates, lack of active nodes, and less than $1,000 USD in trading volume over a three-month period. Over 1,700 dead coins have been documented as of 2022.

Death Cross

A death cross is a bearish technical trading signal in which the 50-day moving average crosses below the 200-day moving average, typically triggering a major sell-off. It is the opposite of a Golden Cross trading signal, and has been evident prior to many of the largest stock market crashes in history.

Debt Instrument

A debt instrument is a tool that an individual, government, or business entity can use to obtain capital. Credit cards, credit lines, loans, and bonds can all be types of debt instruments. The term debt instrument is used primarily for institutions that are trying to raise capital, usually in the form of a revolving line of credit that is not typically associated with a primary or secondary market. More complex debt instruments involve an advanced contract structure and the involvement of multiple lenders or investors, usually via an organized marketplace.

Debugger

A debugger is a specialized software implementation that is designed to identify and remove errors — a process called debugging — in a software system, computer network, or related infrastructure. Debuggers audit computer systems by testing for correct performance. When a system exhibits a large number of bugs, or it crashes all together, it is critical to halt the operation of the system temporarily to repair it. Debuggers are often used to target the exact location of problems by using different mechanisms like instruction-set simulators, step-by-step code analysis, and computerized state modification, among others.

Decentraland (MANA)

Decentraland is a virtual world that is integrated with Ethereum. On the Decentraland platform, users can explore a multifaceted, user-generated landscape that incorporates real estate, gaming, and social media elements. MANA, an ERC-20 token, is the digital asset token used to pay for goods and services in Decentraland, while LAND is a non-fungible ERC-721 token that represents the ownership of virtual land.

Decentralized Application (dApp)

A decentralized application — or dApp — makes use of blockchain technology to address use cases ranging from investment to lending to gaming and governance. Although dApps may appear similar to web applications in terms of user experience (UX), dApp back-end processes eschew centralized servers to transact in a distributed and peer-to-peer fashion. Rather than using the central Hypertext Transfer Protocol (HTTP) to communicate, dApps rely on wallet software to interact with automated smart contracts on supported blockchain networks.

Decentralized Application Programming Interface (dAPI)

Decentralized application programming interfaces (dAPIs) — an innovation of the API3 protocol — are API services that are inherently compatible with blockchain technology. While dAPIs function very similarly to legacy APIs, legacy APIs are centralized and not natively compatible with blockchain technology. On the API3 protocol, API providers are able to leverage a serverless oracle node, called the Airnode, to sell their data feeds on the blockchain.

Decentralized Autonomous Organization (DAO)

A decentralized autonomous organization (DAO) is a blockchain-based organization that is democratically managed by members through open-source code and typically formalized by self-enforcing smart contracts. DAOs lack centralized management structures. All decisions are voted upon by network stakeholders. DAOs often utilize a native utility token to incentivize network participation, and allocate proportional voting power to stakeholders based on the size of their stake. As DAOs are built on top blockchains — often Ethereum — their transactions are executed transparently on the underlying blockchain.

Decentralized Exchange (DEX)

A decentralized exchange (DEX) is a financial services platform for buying, trading, and selling digital assets. On a DEX, users transact directly on the blockchain in a peer-to-peer (P2P) fashion without the need for a centralized intermediary. DEXs do not serve as custodians of users' funds, and are often democratically managed with a decentralized governance structure. Without a central authority charging transaction fees for services, DEXs may be cheaper than their centralized crypto exchange counterparts.

Decentralized Exchange (DEX) Aggregator

A decentralized exchange (DEX) aggregator gives traders the ability to buy, sell, and trade different tokens and coins from numerous DEXs through a single streamlined interface. This type of automated market maker (AMM) system potentially gives users more options, better trading liquidity, and a better overall user experience (UX) than using a standalone DEX. 1inch, ParaSwap, and Matcha are examples of DEX aggregators that are designed to find users the best crypto price from DEX protocols like Uniswap, Balancer, SushiSwap, Bancor, KyberSwap, and others.

Decentralized Exchange (DEX) Protocol

A decentralized exchange (DEX) protocol defines the specific mechanisms that govern trade or order book functionality, how trades transact in a DEX protocol, and the deployment of potential rewards that incentivize buyers and sellers.

Decentralized Finance (DeFi)

Decentralized finance (DeFi) is a major growth sector in blockchain that offers peer-to-peer (P2P) financial services and technologies built on protocols such as Ethereum, Cardano, Polkadot, and Solana. DeFi loans, investments, trades and swaps are typically transparent, permissionless, trustless, and interoperable. There is a growing DeFi trend that encourages decentralized governance methods and equitable stakeholder ownership for DeFi platform users. Platform composability in DeFi has resulted in unlocking value through interoperability with innovations like decentralized exchanges (DEXs), yield farming, liquidity tokens, and more.

Decentralized Governance

For blockchain networks and decentralized applications (dApps), decentralized governance refers to the processes through which the management of a platform is executed. It involves different methodologies for voting on platform tech, strategy, updates, rewards, and rules. Decentralized governance is typically conducted on-chain using blockchain-based voting systems. Usually, these votes can only be cast by platform users or holders of a project’s governance token; many projects use a weighted-voting system that gives more voting power to users with more tokens. Decentralized governance is often enforced and managed through the use of a decentralized autonomous organization (DAO).

Decentralized Identifier (DID)

A decentralized identifier (DID) is a type of digital identification that is typically used on public blockchain networks. Once established, DIDs allow their users to verify and use their identities without a centralized authority, identity provider, or related third party. This is accomplished through the use of an identity wallet that uses key-pair cryptography to verify a person’s identity. One interesting application of DIDs is the ability to create separate DIDs that share specific data with specific online entities. For example, you could verify your nationality without revealing your name or date of birth (DOB).

Decentralized Network

A decentralized network is a connected conglomerate of separate entities that communicate without a central authority or server. They stand in contrast to centralized networks, which feature a central point of governance. Blockchains are an example of a decentralized system: the data ledger is distributed amongst network participants (nodes), they must achieve consensus on the data content for the network to function. Without a single point of authority or failure, blockchains are typically more secure and immune to attacks as even damaged, malicious, and offline nodes cannot alter or shut down the network due to its consensus mechanism(s).

Decentralized Oracle Network (DON)

Generally, a decentralized oracle network (DON) refers to a network of decentralized blockchain oracles that provide external data to blockchains or requesting smart contracts. With many different data sources and an oracle system that isn’t controlled by a single entity, DONs provide increased security and transparency to drastically improve smart contract functionality. For example, Chainlink and Band Protocol are two popular DONs.

Decentralized Storage Network (DSN)

A Decentralized Storage Network (DSN) provides peer-to-peer (P2P) access to users who want to buy or rent out data storage space. With the help of end-to-end encryption techniques, clients privately transmit P2P files that provide cryptographic proofs for security. Sia, Filecoin, and Storj are examples of decentralized storage networks that aim to reduce the risk of data failures that can occur with a centralized cloud storage provider. While many DSNs use a blockchain-based structure, others may use different decentralized network architectures.

Decentralized/Decentralization

Decentralization is in many ways the central and defining characteristic of blockchain technology. Applying decentralized processes and tech can reduce or even eliminate the role of intermediaries across industries and use cases. For example, by removing banking institutions from financial instruments, decentralized finance (DeFi) platforms can distribute profits and governance to users and the wider community. On an even more foundational level, a decentralized network crowdsources consensus, making it much harder for any one entity to control or censor the data that transacts through the network. However, many experts believe that achieving optimal decentralization can tend to decrease network throughput.

DeCloud (Akash Network)

DeCloud is Akash Network’s decentralized cloud platform and allows users to make use of various decentralized finance (DeFi) and cloud computing services using the Akash Network cloud storage and computing protocol. DeCloud is designed to be serverless, interoperable, self-sovereign, censorship resistant, fast, flexible, and affordable. DeCloud is a permissionless cloud service provider for DeFi, decentralized projects, and high-growth companies. DeCloud is compatible with major cloud service providers and cloud-based applications.

Decryption

As it relates to blockchain and cryptography, decryption is the process of utilizing encoded data or encrypted text (ciphertext) and converting it back into plaintext that can be read by the computer system that created it. Decryption in blockchain often relates to methods of unencrypting data manually, through a unique identifier code, or using specialized cryptographic keys.

Deep Web

The deep web is the portion of the World Wide Web (WWW) that is relatively hidden and much harder to access than the surface web. The deep web contains web pages that are not indexed by traditional web search engines like Google. The deep web is said to make up over 99% of the internet, and is comprised of web mail, social media accounts, online banking, and other websites that sometimes require a password to access. The deep web is also made up of private databases and statistics from global government agencies, Non-Governmental Organizations (NGOs), large enterprises, and other constituents.

DeFi Pulse Index (DPI)

The DeFi Pulse Index (DPI) is an asset management index created by DeFi Pulse using Set Protocol. Originally created in 2020, the DPI represents a basket of various DeFi-focused ERC-20 tokens. The DPI is designed to track the most successful and relevant DeFi tokens, providing DPI holders with exposure to the DeFi market at large with one single token.

Deflation

Deflation is the opposite of inflation and refers to the gradual reduction of prices in an economy relative to actual value, which increases the purchasing power of a currency over time. Deflation usually accompanies the contraction in monetary supply in a given economy, while inflation is often the result of increased money printing.

Delegated Byzantine Fault Tolerance (dBFT)

Delegated Byzantine Fault Tolerance (dBFT) is the consensus method that was created by NEO to be a more advanced version of Proof of Stake (PoS). The consensus mechanism is similar to regular Byzantine Fault Tolerance (BFT) except it employs a methodology whereby anyone can become a delegate that meets specific requirements. In this case, delegates are allowed to share and compare the proposals from other potential delegates. The system possesses extremely fast finality times and transaction speeds, but some argue that it is highly centralized because NEO only employs seven main Consensus Nodes to reach network consensus.

Delegated Proof of Contribution (DPoC) (ICON Network)

Delegated Proof of Contribution (DPoC) is a unique economic governance protocol implemented on the ICON Network that leverages the ICON Incentives Scoring System (IISS). DPoC is a variant of Delegated Proof of Stake (DPoS) in that stakers delegate votes towards block validation privileges, but DPoC sees ICX holders delegating towards individuals who have exercised positive participation on the network rather than for particular nodes. The elected entity then validates blocks on a delegate's behalf, and earns crypto rewards accordingly.

Delegated Proof of Stake (DPoS)

Much like the widespread Proof-of-Stake (PoS) system, Delegated Proof of Stake (DPoS) incentivizes users to confirm network data and ensure system security by staking collateral. However, the distinctive characteristic of DPoS is its voting and delegation structure. In contrast to PoS, where nodes are usually awarded the ability to process new blocks based solely on the total amount each node stakes, the DPoS system allows users to delegate their own stake to a node of their choosing — known as a delegate — and vote for the nodes to earn block validation access. Elected validators receive block rewards after verifying the transactions in a block, and those rewards are then shared with users who delegated them as validators.

Delegation

Delegation refers to the contribution of some amount of a cryptocurrency or token to another user for participation in a network staking mechanism on a Delegated-Proof-of-Stake (DPoS) blockchain protocol. It is useful for users who want to earn staking rewards and participate in a network, but do not have a large enough crypto supply to meet the minimum staking requirements on their own. DPoS intends to achieve a high degree of equitability and democratization through delegation mechanisms.

Delegator

A delegator is a type of node that is often employed by Proof-of-Stake (PoS) blockchain networks. Delegators have a diverse range of purposes depending on the specific blockchain protocol they operate on, but they are generally used to help full nodes or validator nodes, which are the primary nodes responsible for carrying out network consensus. Those who wish to participate in consensus, but don't wish to operate a full node, may become a delegator node and stake their coins/tokens with a public validator node — through a process called delegation — to share in a portion of block rewards.

Delisting

Delisting is the removal of a crypto asset from an exchange. Delisting may occur when the project no longer fulfills the listing requirements initially set out by the exchange. Common reasons for delisting include lack of regular trading volume, poor network and/or smart contract stability, evidence of fraudulent or risky behavior, lack of protocol development, non-existent business-to-customer communication, as well as several other factors. After an asset is delisted from an exchange, it can no longer be bought and sold on the platform. A delisting is usually permanent, but in rare cases a project’s asset can be relisted.

Denial-of-Service (DoS) Attack

A Denial-of-Service (DoS) attack is a type of digital attack on a network that attempts to incapacitate a system by overwhelming it with repeated requests. A DoS attack is a malicious effort to disrupt normal traffic to a website or other internet property to temporarily crash the underlying network and make it non-functional.

Deposit (Cryptocurrency Transaction)

A deposit transaction is the process whereby a user deposits their funds in the form of cryptocurrency (or fiat currency) from one platform to another. Deposits are generally conducted from a cryptocurrency exchange, cryptocurrency wallet, custodial provider, or from a fiat-to-crypto on-ramp. Deposits are a type of blockchain transaction, and often come with a transaction fee that is charged by the underlying blockchain network being used to carry out the transaction. Deposits, along with withdrawals, are generally used to move assets between wallets and exchanges, and to exchange fiat (USD, EUR, JYP) between a bank account and fiat on-ramp service provider.

Deposit Contract

A deposit contract is a smart contract that allows users to deposit cryptocurrency into a blockchain protocol, often via a validator node. While deposit contracts typically allow users to deposit tokens into a validator node to help maintain the operational efficiency of the network, they can also sometimes be used within a decentralized finance (DeFi) protocol that allows for the use of specific financial instruments (such as staking, lending, and borrowing), enabling users to accrue incentivized token rewards.

Depository Trust & Clearing Corporation (DTCC)

The Depository Trust & Clearing Corporation (DTCC), along with the National Securities Clearing Corporation (NSCC) and other subsidiaries, provides institutional investors in the U.S. with post-trade clearing and settlement and other services. DTCC also provides asset custody for securities issuers from more than 60 other countries. The company also offers services related to municipal and corporate debt, mutual funds, equities, derivatives, unit investment trusts, insurance offerings, and U.S. depository receipts. The DTCC is the world’s largest financial processor and is responsible for settling most of the securities transactions in the U.S.

Depth-Limited Search (DLS) Algorithm

The Depth-Limited Search (DLS) algorithm is a specialized consensus algorithm used within the Cosmos blockchain network. It is designed to solve the specific technical problem of the infinite path challenge as it relates to uninformed search algorithms. While the DLS algorithm is very memory efficient, it suffers from a lack of completeness.

Derivative

A derivative is a financial contract that derives its value from the underlying traits of an asset, index, or interest rate. Futures and options contracts are examples of derivatives. There are a variety of blockchain-enabled cryptocurrency derivatives, including synthetic cryptocurrencies and bitcoin futures, which represent agreements to trade bitcoin (BTC) at a future date at a predetermined price.

Deshielding Transaction

A deshielding transaction is a type of transaction used on the Zcash blockchain that is sent from an anonymous sender to a transparent and public receiver wallet. Deshielding transactions employ zk-SNARK cryptographic proof technology to maintain data privacy, despite the differing privacy settings of the sender and recipient.

Design Axiom (DA)

A design axiom (DA) is a term given to the critical elements of the Crypto.com blockchain's technical architecture. The Crypto.com technical Whitepaper notes six design axioms critical to the overall success of the project: state-of-the-art security architecture; a scalable fast network with high transaction throughput; decentralization; upgradeability; data privacy; and an inclusive network design.

Desktop Wallet

A desktop wallet is a software wallet for cryptocurrency and digital assets that is downloaded directly onto a computing device. Desktop wallets are almost always non-custodial in nature, which means users control their own private keys. Desktop wallets are hot wallets, meaning they are connected to the internet — unless the computing device is turned off or the wallet is installed on an offline secondary computer. Most desktop wallets offer password protection and can generate a recovery phrase as a backup to regenerate keys.

Deterministic Module

A deterministic module is a section of independent electronic circuits built into a circuit board that provides functions on a computer system that do not feature any degree of randomness. A deterministic module will thus always produce the same output from a given starting condition or initial state. A blockchain-based computerized system is typically deterministic in nature.

Devnet (Development Network)

Similar to a testnet, the development network (devnet) operates independently of the mainnet. Some differentiate these environments based on their intended uses. Although not every blockchain protocol utilizes a devnet or testnet, many use them as an experimental playground to try new features and as a way to stress-test blockchain updates for speed, reliability, and security metrics prior to their mainnet release.

Dharma Wallet

Dharma is a decentralized finance (DeFi) wallet built to operate on the Ethereum blockchain. According to the Dharma website, the wallet allows users to purchase nearly 74,000 different tokenized assets with the help of 55 different decentralized exchanges (DEXs). Dharma offers low fees when compared to many traditional centralized exchange and wallet competitors. Dharma also facilitates instant connectivity to any bank account in the United States.

Digital Art

Digital art can be described as the art that you create on your computer with programs like Adobe Illustrator, Photoshop, or MS Paint. You can also use more sophisticated tools to create animated or interactive digital art. The most common digital artwork files are .tiff, .gif, .jpg, .pdf, and .mp4 files. Digital art is one of the most popular subgenres of contemporary art. Once it’s on the blockchain, however, it’s cryptoart.

Digital Asset

Digital asset is the catch-all term for assets that exist digitally. The term covers a wide variety of assets, including cryptocurrencies, utility tokens, security tokens, digital stocks, and digital collectables. All cryptocurrencies are digital assets, while not all digital assets are cryptocurrencies.

Digital Currency

A digital currency is a currency that exists purely in a digital form, without a physical manifestation. Digital currencies possess multiple advantages over their traditional counterparts, including lowered transaction costs, greater transparency, increased transaction speeds, as well as decentralization. Various forms of digital currencies have existed since the late 1980s, but it was not until 2009 that the double-spend problem was solved through the Bitcoin blockchain protocol and the bitcoin (BTC) cryptocurrency.

Digital Currency Electronic Payment (DCEP)

Digital Currency Electronic Payment, or DCEP, is China’s central bank digital currency (CBDC) initiative. Underway since 2014, DCEP is intended to replace physical cash with a digital edition of China's RMB that can be exchanged between digital wallets without involving a bank. In contrast to decentralized blockchains, the Chinese government will maintain centralized authority over the platform and currency, which has undergone a number of large-scale public trials.

Digital Dollar

The 'digital dollar' is a commonly used term that refers to the United States potentially issuing a USD-based central bank digital currency (CBDC). United States government agencies are researching the potential benefits and risks associated with creating a CBDC, but no clear path forward has yet been indicated.

Digital Identity

A digital identity is data that is used to represent an individual, organization, or device. For individuals, digital identities can be digital versions of government documents that verify one’s date of birth (DOB), nationality, sex, and other important information. It also refers to an individual’s social media profiles, email, and internet usage history. The concerns with digital identity — particularly for individuals — typically revolve around security and personal privacy. Often in blockchain, a digital identity is directly linked to a Decentralized Identity (DID), which once established, allows for a blockchain-based ID that can be verified through key-pair cryptography.

Digital Signature

A digital signature in cryptocurrency is the process of using a private key to digitally sign a transaction. Through public-key cryptography (PKC), a digital signature authenticates the sender and recipient of a transaction. It allows anyone with the sender’s public key to verify the digital signature or the authenticity of the message, transaction, or data.

Digital Signature Algorithm (DSA)

The Digital Signature Algorithm (DSA) is a specialized standardization for the creation of digital signatures that are used within public-key cryptography (PKC) systems such as blockchains or related computing infrastructure. DSA was standardized by the U.S. Federal Information Processing Standard in 1991 in conjunction with the National Institute of Standards and Technology (NIST). Upon its creation, the DSA standard patent was made available for global use, but it is anticipated that an upcoming update to the standardization may render it deprecated and unusable.

Dilution

Dilution is an economic term referring to the issuance of new assets which decrease existing shareholders' percentage of ownership. Dilution can occur with assets ranging from stocks to cryptocurrencies. In the case of cryptocurrency, dilution refers to the reduction in value of a single crypto unit, or the market capitalization of a cryptocurrency protocol overall, because of new coin or token creation.

Direct Market Access (DMA)

Direct market access (DMA) refers to the ability for investment institutions to make trades and investments — for securities and other asset types — through the order book of an exchange or investment platform they don’t normally have access to. This direct access is usually only available to companies, or buy-side firms, that fulfill certain criteria and is realized through third parties such as investment banks, or sell-side firms. DMA is generally fulfilled by making use of algorithmic electronic trading software to fulfill certain order types and investment strategies.

Direct Public Offering (DPO)

A Direct Public Offering (DPO) — sometimes known as a Direct Listing or Direct Placement — is a method of offering shares directly to the public, without an intermediary such as an investment bank, broker-dealer, or underwriter. One potential benefit of this approach is that it can ultimately help cut many of the costs that are typical during the much more common and traditional Initial Public Offering (IPO). DPOs are often used by smaller companies with a loyal client base and are meant to give the firm offering the shares more flexibility for capital allocation. Prior to a DPO, the enterprise must present compliance documents to regulators from each region where it plans to offer shares, but the enterprise often does not need to register with the Securities and Exchange Commission (SEC).

Directed Acyclic Graph (DAG)

A Directed Acyclic Graph (DAG) is a form of Distributed Ledger Technology (DLT). In contrast to a blockchain, which groups transactions into blocks and orders them in a linear fashion, a DAG is a network of individual transactions that are only connected to each other — without blocks. While blockchains require block validation, in a DAG, individual transactions provide validation for each other. All network users in a DAG are simultaneously miners and validators, and therefore transaction fees tend to be much lower than those common to public blockchain networks.

Directional Trading

Directional trading refers to trading strategies in which the sole factor for investment is the future direction of the overall market. It is generally associated with options trading because different directional trading strategies can capitalize on moves both upward and downward.

Discord

Discord is an instant messaging (IM), voice over internet protocol (VOIP), and digital distribution platform for creating online communities. Discord enables users to communicate via voice calls, video calls, and instant messaging, and to share media and files in private chat environments organized into "servers." Discord has become well-known in the blockchain industry (along with Telegram) as a hosting community where blockchain projects give regular updates and allow fans, investors, and users to ask questions and keep in touch with founding team members.

Discounted Cash Flow Model

The discounted cash flow (DCF) model is a valuation tactic that helps investors determine the present value of an investment by estimating how much money it will make in the future. DCF analysis projects future cash flows by using a series of assumptions about how the company or asset will perform in the future, and then forecasting how this performance translates into the cash flow generated. The future cash flows are discounted back in a net present value (NPV) calculation, which represents the amount an investor should be willing to pay today for receiving an asset’s cash flows in the future.

Disk Operating System (DOS)

A disk operating system, or DOS, is a text-based user interface (TUI) that operates via a disk drive. DOSs are no longer widely used because the technology was replaced by more advanced operating systems as computing evolved, but are considered a foundational computating architecture. DOSs were generally used by hard disk drives (HDDs) and optical and floppy disks, and are characterized by a basic file system that is used to read, write, and organize files on its storage architecture. The most well-known disk operating system is called MS-DOS, which was initially developed in 1981 by Microsoft for IBM.

Distributed Denial-of-Service (DDoS) Attack

Similar to a Denial-of-Service (DoS) attack, a Distributed Denial-of-Service (DDoS) attack is a type of malicious network offensive conducted by a number of systems against a target. In a DDoS attack, perpetrators use traffic from many different sources to flood a connected machine or service with requests in an effort to overwhelm its network and make it unavailable for use. Because multiple traffic sources are more difficult to identify, DDoS attacks are significantly more challenging to combat than DoS attacks.

Distributed Hash Table (DHT)

A distributed hash table (DHT) is a type of distributed database that is capable of storing and retrieving data associated with a network of peer nodes that can join and leave the network at any time. DHTs are typically designed to scale in a way that accommodates a large number of participating nodes that are organized in a structured and algorithm-dependent network topology. These network nodes coordinate amongst themselves to verify and store data in the DHT network without relying on a centralized coordinator.

Distributed Ledger Technology (DLT)

Distributed Ledger Technology (DLT) refers to a shared database upon which transactions and associated details are recorded in multiple places simultaneously. An example of DLT could be in the form of a permissioned network under control by a central authority, or a permissionless network maintained by a decentralized network of nodes lacking a central authority. Blockchains and Directed Acyclic Graphs (DAGs) are both examples of different types of DLT.

Distributed Randomness Generation (DRG)

Distributed Randomness Generation (DRG) is a validation protocol used on several Proof-of-Stake (PoS) blockchains as a security measure. Using both a verifiable random function (VRF) and a verifiable delay function (VDF), DRG prevents the designated validator from altering the randomness or not submitting the last random number generated. This is because the preimage of randomness (pRnd), which is used to validate the current block on DRG-enabled blockchains, has already been written to the previous block and thus is unalterable. DRG is designed to be scalable, verifiable, unchangeable, and unpredictable (i.e. random).

Divergence

In an investment context, divergence is when two data points go in opposite directions when charting technical analysis, such as when the current price of an asset rises, and its relative strength index (RSI) drops. The opposite of divergence is convergence, where two technical indicators rise or drop in the same direction. Divergence can also refer to a process whereby the price of a futures contract drifts farther away from the spot price of an underlying commodity as the delivery date of the contract expires. This type of divergence can result in the contract being liquidated.

Diversification

Diversification refers to keeping a diverse investment portfolio of assets to protect against market turmoil. Different investments tend to perform differently depending on what’s happening in the market, so owning a variety of diverse assets means that when some lose value, others may gain value. A well-diversified portfolio usually includes a mixture of stocks, fixed income (bonds), and commodities. A diversified portfolio may also include one or more crypto assets, which should also be diversified.

Dividend

Dividends are regular payments made by a stock-issuing company to its shareholders. While not all stocks pay dividends, the exact distribution of stock dividends is determined by a company's board of directors. Dividends are usually paid in fiat currency, although they are sometimes paid in new shares of additional stock.

Dividend Reinvestment Plan (DRIP)

A dividend reinvestment plan (DRIP) takes dividends earned by investors in a company and automatically reinvests them into more stocks of that company, often at a discounted rate. A DRIP accommodates the potential for exponential earning: Dividends are reinvested in more stock, which in turn generates more dividends, and so on. However, investors are usually given the choice to reinvest their dividends or cash them out before the DRIP initiates.

DNV (Accredited Registrar Enterprise)

DNV (formerly DNV GL) is a Norwegian accredited registrar and classification company that has about 14,500 employees and 350 offices in more than 100 countries. DNV has a direct partnership with VeChain to provide assurance and auditing services for many of the enterprises VeChain works with, and provides data for supply chain management, carbon-neutral vehicles, logistics, natural gas, and more.

Do Your Own Research (DYOR)

Do Your Own Research (DYOR) is a term that is used in the blockchain investing space to encourage potential investors to study, analyze, and perform thorough due diligence on a project they are considering investing capital into. As with any investment opportunity, there is always risk involved. Failure to research or understand a project in its entirety can often lead to loss of capital and a negative investment result.

Docking

Docking is the process of merging two protocols — for example from Ethereum Execution Layer to Ethereum Consensus Layer (formerly Ethereum 1.0 to Ethereum 2.0) — to become better and stronger over time. The docking process generally involves the transfer of data and information from the older and less technologically advanced protocol to the newer and more state-of-the-art version. Docking is a very complex process and can take weeks (or longer) to complete because of the steps associated with sharing similar data types between network infrastructures that are often very different from one another.

Dollar-Cost Averaging (DCA)

Dollar-cost averaging (DCA) is an investment strategy where an investor divides up their investment capital to make periodic purchases of an asset to gain a better overall average entry price. DCA is often considered one of the most prudent investment strategies for crypto due to the industry's inherent volatility. By buying at regular intervals regardless of price movement, DCA helps investors avoid poorly-timed lump sum purchases. An example of DCA would be an investor buying USD 100 worth of bitcoin (BTC) every week for a year instead of one large BTC buy of USD 5200.

Domain Name Service (DNS)

A Domain Name Service (DNS) is a decentralized, hierarchical naming system for network infrastructure, computers, and other similar resources that are connected to the internet or a private network. A DNS is generally used to translate more common domain names to the numerical IP addresses used to locate and identify specific devices and computer services within their underlying network protocols. By providing a globally distributed directory for domain names, the DNS system has been a pivotal component of the internet's infrastructure since 1985.

DOT (Polkadot)

DOT is the native cryptocurrency of the Polkadot blockchain protocol and its underlying ecosystem. It is used to help maintain the security and consensus of the Polkadot Relay Chain and other components within the network (parachains, collators, fishermen, and nominators). DOT can be bonded through parachains, staked through validators, and used for other purposes. It is typically awarded to users who stake DOT to run a validator node. DOT helps the Polkadot ecosystem maintain a fair and transparent governance structure through validator staking and other mechanisms.

Double-Spending Problem

The double-spending problem refers to a critical risk with digital currencies where the same funds can be copied and spent more than once. With fiat currency, the spender transfers physical cash to the receiver, unable to spend it again. With digital currency, blockchain systems are devised to prevent the same digital coin or token, such as bitcoin (BTC), from being sent to more than one address. The risk of double-spending with cryptocurrencies is mitigated by various mechanisms that verify the authenticity of all transactions.

Dow Jones Industrial Average (DJIA)

The Dow Jones Industrial Average (DJIA), or the Dow, is a widely used index and barometer of stock market performance that consists of 30 stocks from multiple sectors. Companies included in the DJIA are known as blue-chip stocks because of their importance to the overall economy of the United States. The DJIA is calculated by adding the prices of the stocks and dividing the final value by a Dow divisor.

Drawdown

A drawdown is a metric used to classify the decline in financial markets during a certain period. Drawdowns use a peak-to-trough approach in percentage terms. For example, if a specific market or stock drops from an initial position of $100,000 to $60,000, then rallies back above the initial position, the drawdown would be 40%. Market drawdowns are important to consider when a trader or fund manager is managing a large number of assets in an investment portfolio or fund. A drawdown is generally not considered a loss, but merely represents an asset’s movement from its peak (high) to trough (low).

Due Diligence

In finance, due diligence refers to an examination of financial records that takes place prior to entering into a proposed transaction with another party. Due diligence broadly refers to an investigation, audit, or review performed to confirm the facts of a matter under consideration. The term originated in the U.S. with the Securities Act of 1933 that made securities dealers and brokers responsible for fully disclosing material information about the securities they were selling at the risk of criminal prosecution. Now, it is a standard process in business transactions and arrangements.

Dust

Dust is a very small fraction of a cryptocurrency or token; it is an aspect of many blockchain networks. On the Bitcoin protocol, dust can range from one to several hundred satoshis (sats), which is the smallest divisible unit of bitcoin (BTC). Dust is a residual byproduct of trading and transacting with cryptocurrencies, and represents such small denominations that it retains little-to-no monetary value.

Dust Limit

Any address or unspent transaction output (UTXO) that has a lower balance than the current fee charged to transact on that blockchain is under what is called the dust limit. The dust limit fluctuates due to market forces on a network and varies between different cryptocurrency networks, but the funds are rendered without function unless the balance is restored above the transaction fee needed to trade or withdraw.

Dusting Attack

A dusting attack occurs when a trace amount of cryptocurrency, called dust, is sent to thousands — sometimes hundreds of thousands — of wallet addresses. This attack is deployed in order to track these addresses with the hope of “un-masking” or de-anonymizing them. These mass dustings may also be used as stress tests, where a large amount of dust is quickly sent to test the throughput, or bandwidth, of a network. Some say these dustings are also a way to spam a network, by sending huge batches of worthless transactions that temporarily clog or slow down a network.

Dutch East India Company

The Dutch East India Company was a trading megacorporation formed in the early 17th century for trading spices with India and, later, with Southeast Asia. The company is considered the first modern corporation due to its sophisticated structure and operations. It was also the first publicly held company and its shares were traded at the Amsterdam Exchange. At its peak, the company is estimated to have been worth USD 7.9 trillion when accounting for inflation.

Dynamically Typed Programming Language

Dynamically typed programming languages are languages that only check the code after successful program deployment. Dynamically typed languages are generally considered slower and more complex to write when compared to statically typed languages. The syntax (how code is formed and combined to form larger sequences) of languages is usually classified as either dynamically typed or statically typed. Type checking for dynamically typed languages normally occurs during the running phase (run-time) of the program, in contrast to statically typed languages which are checked during the compilation phase (compile-time).


E

E-business

E-business, or electronic business, is any business model that provides products and services to its customers over the internet. E-business is conducted by large corporations, governments, non-profit organizations, individual citizens, and many other constituents. Ecommerce is one of the most well-known types of e-business, but should not be confused with the general classification of e-business. Ecommerce is characterized by buying and selling products and services online through an electronic platform, but it is only a small portion of the true value of goods, services, and information exchanged on the internet.

E-Signature

An e-signature, or electronic signature, is a signature executed in an electronic document or form. Electronic signatures are legally valid in most jurisdictions to replace handwritten signatures.

Earnings Per Share (EPS)

Earnings per share (EPS) is a method used in fundamental analyses of a company's profitability. Fundamental analysis involves evaluating a company's stock rather than just its earnings. Earnings and shares combined can provide a great deal of insight into a company’s profits. EPS tells us how much of a company's profit is assigned to each share of stock. EPS is calculated as net income (after dividends on preferred stock) divided by the number of outstanding shares.

Ecommerce

Ecommerce, or electronic commerce, is a business model that allows users to buy and sell products and services on the internet. Ecommerce is usually classified into four main segments: business to business (B2B), business to consumer (B2C), consumer to consumer (C2C), and consumer to business (C2B). Nearly any imaginable product or service is available through an ecommerce website including books, music, electronics, financial services, and more. Ecommerce is often used as a substitute to traditional brick and mortar stores because costs are lower, and the potential customer reach is much greater. Amazon, eBay, and Alibaba are some of the most well-known and widely used ecommerce platforms.

Economic X Node (XN) and Economic Node (EN) (VeChain)

Economic X Nodes (XNs) and Economic Nodes (ENs) are two types of nodes created and used by the VeChain Foundation. They incentivize coin holders to run a node in exchange for tokenized VET rewards, and help maintain network consensus alongside Authority Masternodes. There are four different tiers of XNs depending on the amount of VET staked, while ENs have three different tiers. XNs and ENs are managed via VeChainThor Node smart contracts and interact with the entire blockchain system. As of 2020, no new XNs can be created and existing XN operators are considered long-term supporters of the project.

Ecosystem Expansion Project (EEP) (ICON Network)

An Ecosystem Expansion Project (EEP) is an ICON-related project or activity that contributes to the overall growth and expansion of the ICON ecosystem. EEPs play a role in determining the ICON Network’s governance system, along with P-Reps and their Decentralized Application Booster Program (DBP). All ICONists can propose and execute EEPs and receive rewards when other ICONists delegate a certain amount of stake to those who proposed EEPs.

Edge Node (Theta Network)

Theta Network Edge Nodes are hosted by Theta community members. Introduced in Theta’s 2.0 mainnet launch, Edge Nodes allow users to transcode and relay video content as well as share excess bandwidth/processing power across the network without the need for centralized servers. This Edge Node network forms the community-driven core of Theta’s Edgecast platform, which underpins the network's peer-to-peer streaming dApps. As of early 2021, there were more than 7,000 Edge Nodes around the world. Edge Node operators receive THETA token rewards in exchange for contributing to Theta’s global content-sharing ecosystem.

Edgecast (Theta Network)

Edgecast is Theta Network’s decentralized application (dApp) for content transcription and distribution. It allows Theta users to earn Theta coin rewards for sharing videos with other users. As a result, Theta has established a user-driven method of powering its growing ecosystem of entertainment-focused services — most of which are focused on esports, music, TV, film, education, and enterprise conferencing.

Effective Proof of Stake (EPoS) (Harmony)

Effective Proof of Stake (EPoS) is Harmony’s proprietary Proof-of-Stake (PoS) mechanism and is designed to increase network security and decentralization. EPoS allows thousands of validators to stake in a fair and equitable manner, reducing the possibility of staking centralization. Harmony's EPoS staking framework supports reward delegation and reward compounding and encourages 100% network uptime by slashing validators who double-sign transactions and penalizing elected but unavailable nodes.

EIP-1559

EIP-1599 is an Ethereum Improvement Proposal (EIP) designed to make network transactions more efficient by using a hybrid system of base fees and tips. In the proposal, a base fee is defined as an algorithmically determined price that all Ethereum users would pay to complete transactions. Tips are defined as optional fees that users could include to speed up their transactions. EIP-1559 was implemented in August 2021 and is designed to reduce transaction costs and improve the overall Ethereum user experience (UX).

Electronic Retailing (E-tailing)

E-tailing is the sale of goods and services through the internet. There are numerous types of e-tailing including business-to-business (B2B) and business-to-consumer (B2C) sales of products and services. E-tailing requires companies to tailor their business models to capture internet sales, which can include building out new distribution channels and new technical infrastructure.

Elliptic Curve Digital Signature Algorithm (ECDSA)

The Elliptic Curve Digital Signature Algorithm (ECDSA) is the cryptographic signature algorithm used by Bitcoin and several other highly regarded cryptocurrencies, wallets, and exchanges. Through the use of private keys, public keys, and cryptographic signatures, the algorithm guarantees that only the holders of private keys can send bitcoin (BTC) transactions. The tBTC system also uses ECDSA cryptography to create tokenized bitcoin.

Elrond eGold (EGLD)

The eGold coin (EGLD) is the cryptographic asset native to the Elrond Network. It helps allow the Elrond ecosystem to function optimally through its staking, governance, and developer payment mechanisms.

Elrond Standard Digital Token (ESDT)

An Elrond Standard Digital Token (ESDT) is similar to the ERC-20 tokenization standard employed by the Ethereum network. ESDTs enable true asset ownership and programmability with minimal transfer fees, allowing Elrond’s infrastructure to build a robust variety of DeFi products. Elrond Standard Digital Tokens are designed to facilitate inexpensive token transfers that allow tokens to be moved from one account to another without utilizing a smart contract. Because of their native in-protocol support, transactions sent or received with ESDTs don't require use of the Elrond Virtual Machine (EVM) — enabling a user-friendly, fast, and scalable token transaction ecosystem that functions similarly to that of Elrond eGold (eGLD).

Elrond Virtual Machine

The Elrond Virtual Machine (VM) or Arwen WASM Virtual Machine is the state-based VM engine that is designed to facilitate the operational efficiency and creation of smart contracts on the Elrond blockchain and on external blockchains that interact with the Elrond Network.

Email Spoofing

Email spoofing is the act of creating and sending email messages with a forged sender address, typically with the intent to compromise the recipient. The most common ways this is accomplished include copying an organization’s defining content, such as specific phrases, fonts, logos, or color schemes used by the legitimate website or service provider in order to make the fraudulent message look authentic. Since most core email protocols do not have any authentication mechanisms, email spoofing continues to be a widely used form of online fraud.

Encryption

Encryption refers to technical processes that secure data and systems, and make it more difficult for hackers to gain unauthorized access to information, or meddle with networks and transactions. In modern cryptography, encryption generally entails the conversion of what is known as “plaintext” into “ciphertext." Encryption is a means of encoding information so that only authorized parties can understand it.

Enhanced Due Diligence (EDD)

Enhanced Due Diligence (EDD) is a Know-Your-Customer (KYC) process that provides a greater level of scrutiny of potential business partnerships and highlights risks that cannot be detected via Customer Due Diligence (CDD) alone. It is designed for use with customers who are deemed high-risk via the KYC process. Relevant risk factors can include large transaction amounts, high customer net worth, geographical location, political exposure, and more.

Enjin (ENJ)

Enjin is a platform that enables developers to create and manage games on the blockchain. Enjin hopes to leverage blockchain technology to reduce the high fees and fraud common with the transfer of virtual goods. ENJ is an ERC-20 token used to pay for digital goods and services on the Enjin platform.

Enterprise Adoption

Enterprise adoption refers to the ability for a specific service or type of technology to be used by a large corporation, company, government, Non-Governmental Organization (NGO), or specific industry. Enterprise adoption of any technology generally means that it is being used widely to solve multiple problems for different real-world use cases. It is the hope of the blockchain community that blockchain technology will eventually achieve enterprise adoption.

Enterprise Blockchain

Enterprise blockchain is a term used to describe blockchain systems that are typically used by large corporations for record keeping, data storage, and numerous other transaction and business types. Viable long-term enterprise blockchain systems must consist of three main characteristics — scalability, decentralization, and security — in order to be sustainable for most real-world enterprise uses. Enterprise blockchains are typically systems capable of the extreme scalability needed to process transactions very quickly because of the large amount of data that is regularly sent and received by large corporations. Enterprise blockchain systems can be either private, public, or hybrid systems.

Enterprise Ethereum Alliance (EEA)

Formed in 2017, the Enterprise Ethereum Alliance (EEA) is a member-led industry organization that was built to enable the collaboration of numerous enterprises, academics, Fortune 500 companies, and technologists to further the construction and widespread adoption of Ethereum as an enterprise-grade technology platform. The EEA helps facilitate the implementation of the Ethereum blockchain for enterprises by using its scalable, private, and interoperable infrastructure for multiple real-world uses. The Ethereum Enterprise Alliance also regularly hosts member-based meetings to share access to educational material, technical resources, and media to create a mutually beneficial environment for Ethereum enterprise adoption.

Enya

Enya is a company that creates blockchain-based scaling solutions and infrastructure. Founded by faculty and alumni from Stanford, Enya has contributed to several open-source and blockchain projects, including the Ethereum-based Layer-2 solutions Boba Network (formerly OMGX) and OMG Foundation (formerly OMG Network and OmiseGo).

EOSIO

The EOSIO Network is a smart contract and decentralized application (dApp) development platform. Unlike many other blockchain networks, EOSIO does not charge direct transactional fees for operations. Instead, users wishing to transact or run a dApp must obtain sufficient network capacity by holding EOS coins. EOS is the native coin on the EOSIO network, used for voting and accessing network capacity.

EOSIO 1.0

EOSIO 1.0 was the first full version of the EOSIO blockchain network (formerly known as EOS) released on June 1st, 2018. After several upgrades it was replaced by the more advanced EOSIO 2.0 which launched on January 10th, 2020.

EOSIO 2.0

EOSIO 2.0 launched on January 10th, 2020. It is designed to enhance the performance and security of its predecessor (EOSIO 1.0), as well as provide new developer tools to make it easier to build on the EOSIO platform.

EOSIO Contract Development Toolkit (EOSIO.CDT)

The EOSIO Contract Development Toolkit (EOS.CDT) is a specialized WASM ToolChain and set of tools designed to build, create, modify, and utilize smart contracts within the EOSIO ecosystem.

EOSIO RPC Application Programming Interface (API)

The EOSIO RPC application programming interface (API) is a type of Remote Procedure Call (RPC) API used to connect to the EOSIO blockchain. A RPC occurs when a computer utilizes a program that makes a procedure execute by utilizing a distinct address space on another shared network or computer. This is done by coding and the use of a local procedure call without the developer giving details for the remote interaction via location transparency.

EOSIO Software Development Kit (SDK)

The EOSIO software development kit (SDK) is an SDK built to provide tools to make application development easier on EOSIO. The EOSIO SDK is built for both Java (Android) and Swift (iOS) programming languages. They allow software developers to create EOSIO-specific applications that can be built for the Android and iOS operating systems.

EOSIO Virtual Machine (EOSIO VM)

The EOSIO Virtual Machine (EOSIO VM) is a high-performance blockchain WebAssembly (WASM) interpreter used by the EOSIO blockchain. It is an engine that uses three different interpreters to make it possible to compile, debug, and optimize smart contracts. Its main purpose is to improve the functionality and performance of smart contracts.

Epoch

While this varies depending on the blockchain protocol, an epoch generally refers to a specific number of blocks — or a specific or approximate period of time. Generally found on blockchains that utilize Proof of Stake (PoS), different PoS protocols have different ways of defining an epoch (if they use them). Epochs are used to reach security checkpoints, distribute staking rewards, or assign a new group of blockchain validators. For example, an Ethereum epoch lasts 30,000 blocks — while a Cardano epoch lasts five days.

Equihash

Equihash is an architecturally sound Proof-of-Work (PoW) cryptocurrency mining — or hashing — algorithm. The framework is designed to be application-specific integrated circuit (ASIC)-resistant and highly scalable. It is also designed to remove the centralization of large corporations operating cryptocurrency mining hardware. The algorithm was created by Alex Biryukov, Dmitry Khovratovich, and other cryptographers at the University of Luxembourg prior to its mainstream introduction in 2016.

Equity Stake (Equity)

An equity stake is classified as the percentage of a business owned by a specific individual or entity — for example as shares of stock in a company. In the blockchain industry, equity is commonly held by the founder of a company or blockchain project, in exchange for helping create, design, fund, and build the project since its inception.

Erasure Encoding

Erasure encoding is used in computer science to separate data into encoded fragments (data blocks) so they can be sent securely to another location in the system. Erasure encoding often allows data to be expanded and encoded along with unwanted data so it can be stored in different locations to preserve the most important information. In the event that a database is damaged or corrupted, erasure encoding can help allow encoded fragments of data to be saved so they are not permanently lost.

ERC-1155 Tokenization Standard

ERC-1155 is an Ethereum-based token standard that incorporates non-fungible token (NFT) technology. The ERC-1155 standard allows for a single smart contract to manage multiple token types, including both fungible, semi-fungible, and non-fungible tokens. It is purported as the new multi-token standard. Other token standards like ERC-20 and ERC-721 require a separate contract to be deployed for each token type or collection, which results in excessive and redundant code on the Ethereum blockchain.

ERC-20 Tokenization Standard

The ERC-20 standard outlines the common set of criteria and technical specifications an Ethereum token must follow to function optimally and interoperably on the Ethereum blockchain. It enables the creation of tokenized assets that can be bought, sold, and exchanged alongside cryptocurrencies like bitcoin (BTC) and ether (ETH). The ERC-20 standard utilizes smart contracts to issue tokens that can be exchanged on the Ethereum network as well as used interoperably between Ethereum-based decentralized applications (dApps). It is the most commonly used Ethereum token standard, and has been used to create many notable digital assets.

ERC-2222 Token Standard

The ERC-2222 tokenization standard extends upon Ethereum’s widely used ERC-20 token standard. This standard is generally known as the Funds Distribution Token (FDT) standard and is designed to allow a token to represent claims on the future cash flow of loan repayments, dividends, and fee or revenue shares. The FDT standard is a special smart contract implementation that is used by several blockchain projects for staking, liquidity pools, lending and borrowing, and other uses.

ERC-223 Tokenization Standard

ERC-223 is a tokenization standard that was proposed in 2017. It was designed to address some of the inefficiencies attributed to the ERC-20 Ethereum tokenization standard by developers building the Ethereum Classic blockchain, but for various reasons has not been implemented on a far-reaching scale. Notable for ERC-223 is a feature set designed to help prevent token losses that can occur with transfers of ERC-20 tokens.

ERC-721 Tokenization Standard

ERC-721 is a technical standard for the implementation of non-fungible tokens (NFTs) on the Ethereum blockchain which outlines and provides rules that all NFTs must follow. NFTs that adhere to the ERC-721 standard are interoperable with each other and the wider Ethereum ecosystem. The ERC-721 standard produces provably rare assets, and is widely used for digital collectibles, games, art, and luxury items.

ERC-777 Tokenization Standard

Similar to ERC-20, ERC-777 is a tokenization standard for fungible tokens, and is designed to enable more complex interactions for token trading. It helps remove confusion around decimals, minting, and burning — and it employs a distinctly powerful feature known as a hook. A hook is a function in an informatic computer-based contract that is initiated when tokens are sent to it, and which simplifies how accounts and contracts interact while receiving tokens. Furthermore, because of this fact, ERC-777 tokens are much less likely to get ‘stuck’ in a contract (which has historically been an issue with ERC-20 tokens).

Escrow

An escrow is a contractual arrangement in which an intermediary receives and disburses funds or assets on behalf of the primary transacting parties based on predetermined conditions agreed to by the transacting parties. Traditionally, the intermediary is a trusted third-party arbitrator, but with the advent of blockchain technology, this escrow service can now be automated using algorithmically-enforced rules based on smart contracts. The automation of escrow holds massive potential implications across a broad range of industries.

Esports

Electronic sports, or esports, is a type of competition using video games. Esports is often made up of organized multiplayer video game competitions, often between professional esports participants competing on an individual or team-based format. Regular multiplayer mode has been present in console-based gaming for decades, but not until the late 2000s did the birth of competitive live streaming tournaments become well known. The most common video game esports genres are multiplayer online battle arena (MOBA), first-person shooter (FPS), card, fighting, battle royal, and real-time strategy (RTS) games.

Ethash

Ethash is a specialized Proof-of-Work (PoW) hashing algorithm employed by the Ethereum blockchain. Ethash is the newest version of Ethereum’s Dagger-Hashimoto mining algorithm, and is characterized as a faster rendition that is application-specific integrated circuit (ASIC)-resistant, while at the same time being graphics processing unit (GPU) mining-friendly and light client-friendly (unlike its predecessor). Because Ethash is PoW-based, there is a good chance it will no longer be used once Ethereum Consensus Layer (formerly Ethereum 2.0) launches with its Proof-of-Stake (PoS) consensus framework.

Ether (ETH)

Ether (ETH) is the native cryptocurrency of the Ethereum blockchain, and plays an integral role in the Ethereum ecosystem. Transactions on the Ethereum blockchain are paid for in micropayments of ETH referred to as gas, while ether also facilitates interactions with and between smart contracts throughout the Ethereum platform and ecosystem.

Ethereum

Ethereum launched in 2015 as a decentralized, blockchain-based global supercomputer to serve as the foundation for an ecosystem of interoperable, decentralized applications (dApps) powered by token economies and smart contracts. Assets and applications designed on Ethereum are built with self-executing smart contracts that remove the need for an intermediary. The network is fueled by its native cryptocurrency ether (ETH), which is used to pay network transaction fees. Open source, programmable, private, and censorship resistant, Ethereum forms the backbone of a decentralized internet, which has already spawned innovations like Initial Coin Offerings (ICOs), stablecoins, and decentralized finance (DeFi) applications.

Ethereum Consensus Layer

Ethereum Consensus Layer (formerly known as Ethereum 2.0) refers to a set of Ethereum blockchain updates intended to vastly improve its scalability, efficiency, and broader utility. The multi-phased package of upgrades is officially called Serenity. It features a switch from a Proof-of-Work (PoW) consensus algorithm that relies on computational mining to a Proof-of-Stake (PoS) consensus algorithm that relies on validator staking to keep the network in motion. In utilizing PoS and implementing the innovation of partitioned shard chains, Ethereum Consensus Layer is expected to be able to achieve the transactional scale required to be the global supercomputer.

Ethereum Deposit Contract

A deposit contract is a smart contract on Ethereum Execution Layer (formerly Ethereum 1.0) that allowed a user to create a validator node on the Ethereum network — a node that contributes to network consensus and block creation — by depositing 32 ether (ETH) into the node. The deposit contract for Ethereum Consensus Layer (previously Ethereum 2.0) went live on November 4th, 2020 and users had to stake their 32 ETH before the November 24th staking deadline. This launch required at least 16,384 individual users to fulfill the 32 ETH obligation.

Ethereum Dominance (ETHD)

Ethereum dominance (ETHD) is a metric that measures the market cap of ether (ETH) — the world's second largest cryptocurrency — in relation to the total market cap of all other cryptocurrencies combined. ETHD is often perceived to have a correlation to the performance of bitcoin (BTC) and alternative cryptocurrencies, or altcoins. Generally, when ETHD increases, the value of most other cryptocurrencies increases in what is sometimes referred to as an "alt season."

Ethereum Foundation

Based in Switzerland, the Ethereum Foundation is one of the main entities responsible for overseeing the equitable development and governance of the Ethereum blockchain. The Ethereum Foundation was originally founded in 2014 by Vitalik Buterin, Gavin Wood, and other Ethereum co-founders. The Ethereum Foundation is one of several community-oriented bodies (along with ConsenSys, the Enterprise Ethereum Alliance, and others) tasked with stewardship of the Ethereum protocol.

Ethereum Improvement Proposal (EIP)

An Ethereum Improvement Proposal (EIP) is a mechanism used by the Ethereum network to propose new features and processes that help determine the direction of the Ethereum network. EIPs are an important part of Ethereum’s governance system and act as a source of truth for the Ethereum community. They are typically used to amend technical specifications of the Ethereum network, and consist of upgrades and standards that are discussed by the Ethereum development community and the Ethereum Foundation. EIPs go through a rigorous finalization and auditing process to determine if they are in the best interest of the Ethereum project long-term.

Ethereum Request for Comment (ERC)

Ethereum Request for Comment (ERC) is a set of technical documentation used by Ethereum smart contract developers that outlines a specialized set of rules for the implementation of tokens that run on the Ethereum blockchain. The ERC token standard specification is used as a means to create token interoperability within the Ethereum network that allows users to send and receive all kinds of tokens between Ethereum addresses. Further, there are several distinct ERC tokenization standards, including ERC-1155 and ERC-721, with the most common being the ERC-20 tokenization standard.

Ethereum Transaction

Ethereum transactions are code or a set of commands that execute in a single Ethereum block. They change from simple token transfers to complex Zero-Knowledge Proofs (ZKPs) and smart contracts. Transactions are permanently recorded onto the data state of the Ethereum blockchain at the cessation of every block.

Ethereum Virtual Machine (EVM)

The Ethereum Virtual Machine (EVM) is a development interface accessible through a web browser. The EVM enables developers to deploy decentralized applications (dApps) more effectively by providing a suite of development kits, application templates, and other tools. The EVM improves accessibility by eliminating the need for developers to purchase costly hardware, and allowing developers to launch a dApp regardless of the underlying coding language. The EVM is a primary driver of the popularity of dApp development on the Ethereum blockchain.

Ethermint

Ethermint is a scalable, high-throughput Proof-of-Stake (PoS) blockchain that exhibits extensive interoperability and compatibility with the Ethereum network. The platform is built using the Cosmos software development kit (SDK), which runs on top of the Tendermint Core consensus engine. The Ethermint system is designed to help developers build Ethereum-compatible applications within a Tendermint-based environment. Through the Cosmos SDK, the platform makes use of the Inter-Blockchain Communication (IBC) protocol to facilitate the exchange of tokenized assets and other data types between the Cosmos and Ethereum ecosystems.

European Central Bank (ECB)

The European Central Bank (ECB) is the main central bank for the Eurozone, which is the monetary union of 19 European Union (EU) member states that employ the use of the Euro (€) as the region’s main currency. The ECB is one of the most important central banks in the world, and serves as one of the seven institutions that comprise the infrastructure of the EU. The main purpose of the ECB is to maintain price stability, regulatory certainty, fair monetary policy, and a healthy European financial system related to banking, investment, insurance, securities, and the EU financial sector as a whole. The ECB is responsible for the authorization of Euro issuance in EU member states.

European Economic Area (EEA)

The European Economic Area (EEA), established in January 1994, is an area in Europe that acts as an extension of the European Union’s (EU) financial market. The EEA is composed of the EU member states as well as three of the four nations that make up the European Free Trade Association (EFTA) — Norway, Iceland, and Liechtenstein, with Switzerland denying entry. The EEA was founded to create an open framework to implement laws across all participating countries relating to the movement of goods, services, capital, and citizens (known universally as the four freedoms).

Exchange

A cryptocurrency exchange is a type of digital currency exchange where digital assets can be bought, sold, and traded for fiat currency or other digital assets. They are similar to mainstream exchanges where traditional stocks are bought and sold in the type of transactions and orders that users can execute. Cryptocurrency exchanges have evolved significantly from the earliest iterations (which were often unregulated) to provide more security and accessibility and ensure legal compliance in accordance with the jurisdictions in which they operate. As the cryptocurrency space continues to grow, more exchanges have emerged which provide competitive trading fees, exchange rates, and user-friendly features as they vie for more users and trading volume.

Exchange Coin (Exchange Token)

Exchange coins are digital assets launched on a crypto exchange via an Initial Exchange Offering (IEO), a fundraising method for crypto companies that's similar to an Initial Coin Offering (ICO). There are two different types of exchange coins: those launched by the exchange itself as the native coin or token of the platform, and those launched by other crypto companies using the token launch infrastructure and services of the exchange. These exchange assets can either be tokens (digital assets enabled by an existing blockchain) or coins (digital assets that run on their own blockchain).

Exchange-Traded Commodity (ETC)

An exchange-traded commodity (ETC) is typically backed by an underwritten note that is collateralized by an underlying asset purchased using the capital invested into the ETC. As a result, exchange-traded commodities are often considered a cross between an exchange-traded fund (ETF) and an exchange-traded note (ETN). This means ETCs have some of the potential tax and cost-saving advantages of ETNs, while also providing a degree of risk reduction in the event an underwriter defaults.

Exchange-Traded Fund (ETF)

An exchange-traded fund (ETF) is a financial product that is tied to the price of other financial instruments. This structure gives investors a way to gain exposure to an asset or a bundle of assets without buying or owning the asset(s) directly. ETFs can be composed of all kinds of assets including stocks, commodities, and bonds. A digital asset ETF, for example, would allow investors to invest in the underlying digital asset without needing to manage the asset itself or interact with a cryptocurrency exchange.

Exchange-Traded Note (ETN)

An exchange-traded note (ETN) is a structured financial product that is issued as a senior debt note, and stands in contrast to exchange-traded funds (ETFs) which represent a direct stake in an underlying asset. In other words, ETNs are unsecured and similar to bonds. ETNs were developed in 2006 by Barclays Bank in order to make it easier for normal investors to invest in traditionally illiquid, hard-to-access assets. Because ETNs don’t involve the direct buying and selling of assets like an ETF, investor taxes are not triggered until the fund is sold, which can be advantageous for long-term investors.

Exchange-Traded Product (ETP)

An exchange-traded product (ETP) is a type of security that tracks an underlying security, index, or financial instrument asset, and can be purchased on an exchange. ETPs trade on the National Stock Exchange (NSE) during the day. The first crypto ETPs went to market in 2019.

Execution Price

An execution price is the price at which a buy or sell order for a security is completed, or executed. As prices fluctuate in a dynamic market, what is offered for a trade as an order price might not always be identical to the execution price of the trade. A strong execution price has very little slippage or change in price from an order price and is a sign of a healthy asset market with good liquidity.

Exit Scam

In the context of blockchain, an exit scam is a process whereby a company creates a fake business model, Whitepaper, website, and other information to pose as a credible blockchain enterprise. It then offers investors a means to participate in various funding rounds where it sells coins or tokens that represent equity in the project, and ultimately executes a large inside-job market sell-off orchestrated by the founding members of the project who proceed to steal investors' capital and go on the run.

Exploit Kit

Exploit kits are automated programs that contain code for identifying vulnerabilities and installing malware. They are a type of toolkit that cybercriminals use to attack weaknesses in computing systems. Once they've infected a victim's machine, they compile device information, search for vulnerabilities, determine the appropriate or most effective exploits, and then deploy those exploits on behalf of the exploit kit user.

Exponential Decay Model

The exponential decay model is a cryptoeconomic minting mechanism used by numerous blockchain projects to mitigate inflation. Blockchains that follow the model produce higher native currency rewards during the launch and early stages of the network, which decrease exponentially over time, along with an increasing block mining difficulty. The model has been criticized by some for enabling a miner incentivization imbalance.

Extended Private Key (XPRIV)

An extended private key (XPRIV) is one half of the master key pair (the other being an extended public key) used in hierarchical-deterministic (HD) wallets. An HD wallet is a cryptocurrency wallet that generates new cryptographic key pairs or addresses from a master key pair each time funds are sent or received.

Extended Public Key (XPUB)

An extended public key (XPUB) is one half of the master key pair (the other being an extended private key) used in hierarchical-deterministic (HD) wallets. An HD wallet is a cryptocurrency wallet that generates new cryptographic key pairs or addresses from a master key pair each time a crypto transaction is initiated.


F

Fair Launch

Fair launch refers to the equitable and transparent initial distribution of coins or tokens in a blockchain project. Fair launches stand in contrast to crypto distributions in which a small group of founders and early investors receive special or early access to a project’s coins/tokens. They are seen as an effective way to promote decentralization and engagement in the crypto community.

Fair Sequencing Service (FSS) (Chainlink)

The Fair Sequencing Service (FSS) is a mechanism developed by the Chainlink data oracle platform that allows decentralized finance (DeFi) systems to reduce transaction ordering problems and costs. FSS streamlines the use of smart contracts on Layer-1 blockchains by allowing the Chainlink oracle network to order transactions — by using several oracle nodes to carry out the process instead of one — to a specific smart contract made up of user transactions and oracle reports. Chainlink's FSS stands to potentially further decentralize mining and transaction ordering in blockchain networks.

Fan Token (Chiliz)

A Fan Token is a specialized token that runs on the Chiliz protocol that represents specific sports teams. Fan Tokens were created in unison with Chiliz' all-in-one rewards-based mobile application, Socios. Fan Tokens give Socios users the ability to vote on the proposals involving particular sports teams, such as design changes to uniforms, team matchups, and more. Socios voting is enabled via smart contracts that execute on the Chiliz blockchain. To obtain Fan Tokens, users must first purchase Chiliz (CHZ) tokens which can be exchanged to and from different Fan Tokens.

Fan Token Offering (FTO)

A Fan Token Offering (FTO) is a public sale of an organization’s Fan Tokens on Chiliz’ Socios platform. Prior to an FTO, the issuing organization — typically a popular sports team — decides the total fixed supply of their Fan Tokens and the token’s initial token sale price, denominated in Chiliz Tokens (CHZ). Prior to launching an FTO, Socios will publicly disclose all the essential information relevant to the token release, including the FTO’s start and end dates, the Fan Token’s opening price, and the fully diluted market cap. This helps users on the platform to make more informed investment decisions.

Fantom Virtual Machine

The Fantom Virtual Machine (FVM) is the Virtual Machine (VM) designed and built by the Fantom network that makes use of the Asynchronous Byzantine Fault Tolerant (aBFT) consensus mechanism and the Fantom Opera chain to connect with the Ethereum Virtual Machine (EVM). This is possible as a result of its capability to create smart contracts through Ethereum’s Solidity programming language.

Fast Byzantine Fault Tolerance (FBFT)

Fast Byzantine Fault Tolerance (FBFT) is a consensus mechanism used on some Proof-of-Stake (PoS) blockchains. A variation of Practical Byzantine Fault Tolerance (pBFT), FBFT has the block leader collect votes from validators using a multi-signature signing process in lieu of asking all validators to broadcast their vote (as done on pBFT chains). This allows FBFT to be “faster” and more scalable than pBFT consensus-based chains. While pBFT works well with distributed networks, many consider FBFT more robust for decentralized networks like blockchains as it allows nodes to sync using a local clock and the last block’s timestamp.

Fast Exit Problem

The fast exit problem is an issue that banking, blockchain, and other computing networks may encounter when users attempt to withdraw their funds, resulting in a multi-day waiting period for funds to exit. This issue can result in substantial loss of time, capital, and business efficiency for governments, large enterprises, and other constituents. Retail investors and institutional investment firms also face numerous financial and investment challenges related to the same issue. At this time, there are several blockchain systems and other types of computing infrastructure building new frameworks to attempt to eliminate this problem.

Faucet

These web-based services generally supply testnet coins or devnet coins from people or organizations who own surpluses that they’re willing to part with — usually for free. Some faucets may even release coins from a main blockchain protocol that have real-world monetary value.

Fear of Missing Out (FOMO)

Fear of Missing Out (FOMO), in the context of blockchain or general finance, is an acronym that refers to the feeling of regret or apprehension for missing out on a specific investment opportunity after the price of a stock, cryptocurrency, or other asset substantially rises in price during a short time period. FOMO can also have a general meaning that stems from a person’s belief that they may miss out on an activity they really wanted to participate in while their friends or loved ones are enjoying themselves without them being present.

Fear Uncertainty and Doubt (FUD)

Fear, uncertainty, and doubt (FUD) is a term commonly used in the context of blockchain or general finance. It signifies that overall market sentiment is fearful, uncertain, and doubtful. FUD generally increases among market participants during a bear market when a substantial monetary drop in a number of stocks or the entire stock market takes place. In relation to blockchain, FUD is typically very high when the price of bitcoin (BTC) drops significantly during a very short period of time, which typically brings other cryptocurrency market valuations down in price with it.

Federal Deposit Insurance Corporation (FDIC)

The Federal Deposit Insurance Corporation (FDIC) is an independent U.S. federal agency that insures deposits in financial institutions, acting as a guarantor in the event of an institution failing. The FDIC was created in the 1933 Banking Act to restore faith in banks during the Great Depression. Its ongoing purpose is to foster confidence in financial institutions.

Federated Blockchain

A federated blockchain, commonly known as a consortium blockchain, is a private blockchain network managed by multiple entities wherein each participant retains special privileges. Controlling entities typically participate in the consensus process as a transaction validator (by hosting a node or several nodes) and have permissions to view certain types of data, often via specialized authentication systems. Consortium blockchains are a less decentralized Distributed Ledger Technology (DLT) that maintains some benefits of distributed systems for enterprise and government use cases.

Federated Byzantine Agreement (FBA)

Federated Byzantine Agreement (FBA) is a consensus method developed and deployed by the Stellar blockchain protocol. It operates through a system of federated voting wherein nodes deem other nodes trustworthy until a quorum is achieved, and network consensus is solidified.

Fiat Currency

A fiat currency is any type of government-issued currency that is used as legal tender by a specific nation, government, or region’s citizens. Fiat currencies are not backed by a physical commodity (like gold or silver), but instead by the government that issued it. As a government-regulated instrument, it functions as a medium of exchange, store of value, and unit of account. To function as fiat, money must be durable, portable, divisible, uniform, acceptable, and limited in supply. Most modern paper currencies are fiat currencies, like the EU euro, Japanese yen, and U.S. dollar.

Fiat Off-Ramp

A fiat off-ramp is an exchange or similar service that allows for digital assets like cryptocurrencies to be exchanged for fiat currency like the U.S. dollar. Off-ramps are a software-based service built by a financial service provider, usually with a banking license to legally operate in their specific jurisdiction. A fiat off-ramp enables users who have purchased cryptocurrencies to convert their digital assets back into fiat currency.

Fiat On-Ramp

A fiat on-ramp is an exchange or similar service that allows for fiat currency to be deposited and exchanged or traded for digital assets like coins, tokens, and cryptocurrencies. On-ramps are a software-based service built by a financial service provider, usually with a banking license to legally operate in their specific jurisdiction. A fiat on-ramp is the first step in exchanging or trading cryptocurrencies for many users who first purchase digital assets like bitcoin (BTC) and ether (ETH) with fiat currency.

Fiat-Backed Stablecoin

Fiat-backed stablecoins are digital assets pegged to the value of an underlying fiat currency at a 1:1 ratio. They are typically collateralized by fiat at a 1:1 ratio as well and are built to reduce the volatility associated with digital assets. Stablecoins not only serve as a store of value, they also simplify engagement in on-chain endeavors like decentralized finance (DeFi). The fiat currency which serves as collateral to a stablecoin — the most common being USD — is held off-chain, which requires users to trust that the fiat reserves are properly managed and audited.

Fibonacci Ratio

The Fibonacci ratio (also called the “golden ratio”) describes predictable balancing patterns in elements found throughout nature, including atoms. It is named after Leonardo Fibonacci who lived around 1200 A.D. and is credited with discovering the ratio. In the Fibonacci sequence, each number is the sum of the two preceding numbers (1, 1, 2, 3, 5, 8, 13, etc.). Four main techniques are used to apply the Fibonacci sequence to finance: retracements, arcs, fans, and time zones.

FICO (Fair Isaac Corporation) Score

A FICO (Fair Isaac Corporation) score is a credit score developed by the U.S.’s Fair Isaac Corporation to assess a potential creditor’s creditworthiness. FICO scores generally consider five main data points when assessing creditworthiness. These include payment history, types of credit used, credit history, recent applications for credit, and current level of indebtedness.

Field-Programmable Gate Array (FPGA) Miner

A field-programmable gate array (FPGA) miner is a crypto miner that uses an FPGA to mine cryptocurrency. It’s “field-programmable” in the sense that it can be customized by the customer upon delivery by setting up its gate array (a set of logic gates) and installing or designing bespoke software. Once configured, FPGA miners tend to be more powerful and efficient than graphics processor unit (GPU) miners — and are more flexible than the mining algorithm-specific and unalterable application-specific integrated circuit (ASIC) miners. However, FPGA miners tend to require more technical know-how than other mining rig options.

FIL_BASE (Filecoin)

The Filecoin (FIL) base of 2,000,000,000 FIL coins is the maximum number that will ever exist and is known as FIL_BASE. 55% of the FIL_BASE is allocated to storage mining, 15% is allocated to a mining reserve, and the remaining 30% is allocated to various other developmental projects. Filecoin’s coin allocation methodology intends to ensure the growth of both long-term and short-term network participation, while applying counter-pressure to mitigate FIL supply shocks.

Filecoin (FIL)

Filecoin is an open-source, cloud-based Decentralized Storage Network (DSN) built to maximize data storage and retrieval. The Filecoin network leverages a mining, storage, and retrieval mechanism that connects storage miners (providers) and retrieval miners (servers) with clients who pay to store and retrieve data. Network participants receive and send tokenized rewards in the form of Filecoin coins (FIL) for providing services on the network.

Finality (Settlement Finality)

Settlement finality is the process whereby a transaction is absolute and confirmed by a blockchain network protocol. Before settlement finality is achieved, the transaction remains pending and may not be considered completed. Rapid and broad settlement finality is necessary to achieve high throughput scalability on a blockchain, the achievement of which remains pivotal to the widespread applicability of decentralized tech for global enterprise use.

Finality Rate

Finality is a blockchain state (or status) that occurs after a blockchain transaction has been confirmed and can no longer be canceled, reversed, or altered by any of the network participants. The finality rate is the amount of time it takes to reach a finality state after a transaction is executed. This rate can be measured in seconds or blocks, depending on the blockchain in question, as well as on the context in which this term is applied.

Financial Action Task Force (FATF)

Founded in 1989, the Financial Action Task Force (FATF) is an international Anti-Money-Laundering (AML) organization. A collaborative body made up of numerous countries and jurisdictions, focuses of its AML efforts include combating issues such as organized crime, drug trafficking, and terrorist financing.

Financial Inclusion

Financial inclusion refers to the accessibility and equality of financial services like banking, loans, equity, and insurance services. Successful financial inclusion is measured by the availability of affordable and timely access to these types of services.

Financial Industry Regulatory Authority (FINRA)

The Financial Industry Regulatory Authority (FINRA) is a private corporation that acts as a self-regulatory organization. It is responsible for writing rules governing brokers and broker-dealer firms in the U.S. Although it has regulatory powers, it is not officially part of the U.S. government, and exists as an independent non-governmental organization (NGO). The Securities and Exchange Commission (SEC) oversees FINRA.

Financial Industry Regulatory Authority (FINRA) Rule 3310

Financial Industry Regulatory Authority (FINRA) Rule 3310 established minimum standards for broker-dealers' Anti-Money-Laundering (AML) compliance programs. It requires firms to develop and implement a written AML compliance program which must then be approved by FINRA. Firms must also provide annual (on a calendar-year basis) independent testing for compliance that is conducted by member personnel or by a qualified outside party.

Financial Information eXchange (FIX)

The Financial Information eXchange (FIX) is a communication protocol for the real-time exchange of securities transaction information that provides direct market access (DMA) data to financial service entities. The FIX serves approximately 300 financial institutions, including all major investment banks. It has become the de-facto standard for pre-trade, trade, and post-trade communications.

Financial Instrument

A financial instrument is any type of financial asset or contract that can be traded and exchanged between different types of network participants. Normally, financial instruments include derivatives (such as futures and options contracts), securities (stocks and equities), cryptocurrencies, commodities (such as gold and silver), fiat currencies (via forex trading), and debt instruments such as bonds or loans, among other asset types. Financial instruments are typically traded on a stock exchange, through a stock broker, or via an asset exchange.

Financial Securities

A security is a fungible investment instrument that is offered with some kind of financial value. A security can be a physical or digital asset, while examples include stocks, bonds, and options. The definition and subsequent regulation of some cryptocurrencies as a security is an emerging legislative factor in many jurisdictions.

Financial Technology (FinTech)

Financial technology (FinTech) is an emerging industry that improves the existing structure of conventional financial services by leveraging new technological developments. FinTech generally aims to lower costs, improve transaction times, remove minimum thresholds, bolster financial inclusion, and offer more flexible terms on financial products among other initiatives. Blockchain and cryptocurrency can be considered a category within the FinTech sphere.

Fine Art

Art began to be distinguished as “fine” or “high” during the Italian Renaissance. The adjective “fine” has nothing to do with the quality of an art object, but rather reflects the aesthetics of the Renaissance. Fine art exists for the sake of itself and its beauty, not its utility. Prior to this period, art was generally decorative, and applied to household objects.

Finite-State Machine

A finite-state machine is a computational system that can only exist in exactly one state — out of a finite number of states — at any given time. Finite-state machines operate by reading a series of inputs and then switching to a new state, one that corresponds with a function of its most recent input and current state. All conventional computing devices are physical representations of finite-state machines.

Finney Attack

A Finney attack is an attack where a miner pre-mines a transaction into a block from one wallet to another. Then, they use the first wallet to make a second transaction and broadcast the pre-mined block which has the first transaction. This requires a very specific sequence to work. This is only possible if the receiver of the transaction accepts an unconfirmed transaction.

Firewall

A firewall is a computer-based network security system that filters and monitors incoming and outgoing network traffic based on predefined security parameters. A firewall is a security mechanism that establishes a barrier between a trusted network and an untrusted network like the internet. Firewalls can be very elementary, or very complex and expensive to construct, depending on the needs of the use case in question.

First-Mover Advantage (FMA)

First-mover advantage (FMA) is a classification given to a company that provides a product or service prior to any of its future competitors. Being a first-mover generally allows a company to establish a strong brand, customer loyalty, and a large market share before other potential competitors. First-movers tend to benefit from additional time to perfect their business model, product and service offerings, and much more. Amazon and eBay are examples of large enterprises that benefited greatly from becoming first-movers in their respective industries.

Fiscal Crisis

A fiscal crisis results when a state or government experiences a deficit between its expenditures and revenues. Fiscal crises tend to entail an economic dimension as well as a political dimension. They are often referred to as a budget deficit.

Fiscal Policy

A fiscal policy is a financial policy implemented by a government to adjust its spending and tax rates to monitor and influence a nation’s economy. Fiscal policies usually work hand-in-hand with monetary policies and a central bank to adjust a nation’s money supply. Both of these strategies work together to provide the necessary means to shape a nation's economy in the short, medium, and long term.

Fishermen (Polkadot)

Fishermen is a technical term used within the Polkadot blockchain protocol to refer to full nodes that are responsible for maintaining the integrity of the network and nodes. The job of fishermen is to monitor the Relay Chain and other parts of the protocol to pinpoint and report unwanted behavior to validator nodes. Rather than packaging state transitions and producing the next parachain blocks like Polkadot collators, fishermen monitor the process to make sure that no invalid state transactions are included. Fishermen typically stake a small amount of DOT initially, and are rewarded upon identifying unwanted behavior on the network.

Fixed Supply (Price Elasticity)

Fixed supply means that the supply, or total quantity of an asset, is constant and does not change. When an asset has a fixed supply — like the fixed supply of 21 million bitcoin (BTC), for example — then the primary factor involved in its price fluctuations is demand. The supply of an asset is related to the price elasticity of an asset, or the responsiveness of the amount of goods or services needed to change its price. When an asset has a fixed supply, then the elasticity of an asset is said to be zero.

Flag (Technical Formation)

In technical analysis, a flag pattern is a formation that is defined by a strong countertrend (the flag) following the short-lived price trend (the flag pole). Flags typically move in the opposite direction of the prevailing price trend, meaning that if the chart is bullish, a bear flag may occur. In contrast, if the chart initially is bearish, a bull flag formation can occur. Flags generally signify a trend reversal or breakout after a period of sideways price consolidation, and are often accompanied by price action and related volume indicators.

Flash Loan (Aave)

A Flash Loan is a type of decentralized finance (DeFi) loan that is rapidly executed — borrowed and paid back in quick succession — without the need for collateral. An experimental technology offered by the Aave platform, Flash Loans are made possible because of how data is recorded on the Ethereum blockchain. If the principal and interest are not repaid within one Ethereum transaction, the Flash Loan is effectively reversed.

Flexa

Flexa is a New York City-based company that manages a blockchain-based payment network, the Flex Network Protocol, which allows users to spend crypto at brick and mortar retailers through its Spedn app. The app generates a QR code at checkout, which retailers scan to instantly receive their preferred fiat currency for the transaction, while the equivalent amount of crypto is deducted from users' wallets within the app. Instant payments are made possible through the use of the network’s native token AMP.

Flexacoin (FXC)

A payment network that allows users to spend crypto at brick-and-mortar retail stores. Flexacoin (FXC) is the digital asset token used to collateralize payments on the Flexa Network, helping to enhance transaction speed and security.

Flippening

The flippening refers to the hypothetical moment in time when the total market cap of Ethereum surpasses the total market cap of Bitcoin. The flippening has been hypothesized for many years, and may or may not come to fruition. Some crypto experts believe the flippening could occur in the mid 2020s because of Ethereum's far-reaching smart contract, decentralized finance (DeFi), and yield-farming applications.

Flipping

Flipping is a strategy that denotes buying an asset, stock, cryptocurrency, or some other investment that is then sold shortly afterwards to generate a quick profit. The general term “flipping” can be used in many contexts, such as buying and selling a home to make a substantial profit in a short amount of time. As it relates to Initial Coin Offerings (ICOs), flipping typically refers to the strategy of buying coins/tokens prior to an exchange listing and then selling them shortly after they are first listed for a substantial profit.

Floor Price

The floor price — also known as a price floor — is the minimum price at which something can be purchased. This could refer to a commodity, a luxury-branded good, the work of an artist, or some other product. The floor price is typically decided by market forces and can rise and fall accordingly. In the blockchain space, the floor price is often used to reference the cheapest available non-fungible tokens (NFTs) in an NFT collection.

Flow (Blockchain Platform)

Built by Dapper Labs — the company behind non-fungible token (NFT) collections such as CryptoKitties and NBA Top Shot — Flow is a blockchain designed to support consumer collectible ecosystems for collectibles, games, and related consumer applications.

Forex (FX)

Forex is a portmanteau that combines the terms “foreign currency” and “exchange" that is used to define the entire foreign currency exchange market. The forex currency trading market is a global and largely over-the-counter (OTC) market that determines foreign currency exchange rates and facilitates all aspects of buying, selling, and exchanging currencies at spot or agreed-upon prices.

Forging

Forging refers to the creation or minting of new blocks in blockchain protocols using the Proof-of-Stake (PoS) consensus algorithm. When a new block is forged, there is an opportunity to receive a reward from the fees associated with each transaction included in the block. Blocks are forged after the transactions are validated and the block is signed. Different PoS networks have varying rules regarding their respective requirements to take part in the validation and forging process.

Fork

A fork occurs when one blockchain is divided into two blockchains. This type of split in a blockchain network happens when an update is made to the blockchain protocol, but not all of the network participant nodes agree to adopt it. Blockchains can experience two main types of forks: a soft fork or a hard fork. Soft forks result in an update that is “backwards compatible.” This means that nodes which accept the update are still capable of interacting with nodes which do not. In a hard fork, the update significantly alters the original blockchain protocol such that the two versions are no longer compatible with one another. The result of a hard fork is two unique blockchains that diverge after the hard fork event.

Form 10-K

Form 10-K is a financial report that publicly traded companies are required to file annually by the U.S. Securities and Exchange Commission (SEC). The report provides a comprehensive summary of a company's financial performance over the course of the past year.

Form 10-Q

Form 10-Q is a financial report that publicly traded companies are required to file quarterly by the U.S. Securities and Exchange Commission (SEC). It contains similar information to the annual 10-K form, although generally less detailed and unaudited. Information regarding the prior fiscal quarter is included in the end-of-year 10-K form, so only three 10-Q forms are generally required to be submitted for the year.

Formal Verification

Formal verification refers to mathematically proving and verifying a smart contract to ensure that it will function as intended. The use of mathematical functions to build the software allows for the mathematical verification of new code before it is added. Formal verification is a cornerstone of cryptography.

Fractional Ownership

Fractional ownership allows you to own a portion of an asset through the tokenization process. Tokens are divisible and can be split into large or small amounts. This characteristic allows a user to purchase a specific amount of an asset like bitcoin (BTC) or ether (ETH). For example, it is possible for an investor to purchase a few cents' worth of a tokenized asset (such as a house, car, or painting), or millions of U.S. dollars worth of the same asset. The value of tokenized assets is often measured by converting them to an equivalent value in fiat currency.

Framework for Runtime Aggregation of Modularized Entities (FRAME)

Framework for Runtime Aggregation of Modularized Entities (FRAME) is a runtime framework used by the Substrate application and blockchain development paradigm, which was created and designed by Polkadot. FRAME is a set of modules and software libraries that simplify runtime development. Within Substrate, these modules are called pallets and they host the domain-specific logic needed to allow a blockchain’s runtime system to operate.

Fraud Proof

A fraud proof is a technical mechanism that operates as a bond when employed in decentralized application (dApp) ecosystems that make use of Optimistic Rollups (ORs), which are sidechains that seek to decrease the fees and latency dApps might experience on a blockchain platform. A sequencer, which is responsible for processing ORs, must include a fraud proof along with their work to incentivize good performance. Sequencers are financially rewarded for processing rollups according to consensus rules, and financially punished by forfeiting their fraud proof when they break them.

Front-End (Computing Architecture)

The front-end of a computer system or network refers to the portion of the system that is displayed on the user’s screen or graphical user interface (GUI). Front-end developers normally make use of various programming languages like Java, HTML, JavaScript, and CSS along with other tools to create the front-end, or application layer of a computer system. In contrast, the back-end is the portion of the website or system that facilitates the operational efficiency of the system and is considered the opposite of the front-end.

Front-End Software Development

Front-end software development is the process of creating computerized systems that are displayed on the screen, or graphical user interface (GUI), of a website or application to allow users to interact with it. Front-end developers normally make use of HTML (HyperText Markup Language), CSS (Cascading Style Sheets), JavaScript, and other mediums to create a website’s front-end. They might also create systems for other layers including application programming interfaces (APIs) and various servers and databases.

Frontier (July 2015)

Frontier was the name given to the first version of the Ethereum mainnet, which launched in July of 2015 and made use of a Proof-of-Work (PoW) consensus mechanism. Frontier was a fairly bare-bones structure that got the network off the ground. It provided a command line interface (CLI) to mine ether (ETH) and upload and execute smart contracts — nothing more. The initial launch of Frontier and the Ethereum network took place between the initial founding of Ethereum in 2013 and its subsequent mainnet launch in 2015.

Frontrunning

A process prohibited by many platforms and jurisdictions, frontrunning is when an investor enters into an equity trade, derivative, option, futures contract, or security-based swap in order to profit in advance of the trade by obtaining non-public knowledge of a large pending order to in turn purchase a substantial amount of an asset — dramatically impacting the asset’s price. Frontrunning, also known as tailgating, is usually considered a form of insider trading or market manipulation that is illegal in many jurisdictions.

Full Domain Hash (FDH) Signature

A full domain hash (FDH) signature is a cryptographic signature mechanism that makes use of the hash-and-sign paradigm. FDH signatures leverage Rivest–Shamir–Adleman (RSA) public-key cryptography (PKC) and are provably secure using the random oracle model. FDH signatures are part of a group of standardized signatures that are widely used in PKC.

Full Stack Software Engineer

Full stack software engineer is a term used to describe the capabilities and skill set of a software developer. A full stack developer is a computer scientist who is able to program all of the different components of a software implementation (e.g., database, server, operating system, application, and middleware). Full stack developers are able to build both the back-end (the innermost working components of the system) and front-end (the components that make up what the user sees on their screen) of a computer or software system using different programming languages and other tools.

Fully Homomorphic Encryption (FHE)

Fully Homomorphic Encryption (FHE) is a form of encryption used in computer science that allows users to perform computations on data without first decrypting it. Decrypting sensitive data makes it susceptible to potential privacy and confidentiality breaches that could result in data theft and misuse by malicious third-party actors. FHE mitigates this problem and can be used for many purposes in the blockchain ecosystem, including the preservation of sensitive healthcare data, privacy-preserving outsourced storage and computation via cloud computing environments, and related technology. FHE often works in unison with Secure Multi-Party Computation (SMC) and other privacy-preserving cryptographic primitives.

Functional Programming Language

A functional programming language is a programming language that employs mathematical functions to determine the behavior of a program. They stand in contrast to imperative programming languages, in which software coding is executed as a set of stepwise instructions. Some advantages of functional programming languages include the mathematical precision and verifiability of the code, as well as the resulting security and speed.

Fund

A fund is a pool of money that is set aside for a specific purpose and usually invested. Funds are often managed by professional financiers. Common funds include pension funds, insurance funds, foundations, and endowments.

Fund of Funds (FOF)

A Fund of Funds (FOF) – or multi-manager investment — is a pooled investment fund (made up of several mutual funds, hedge funds, private equities, and investment trusts) that is used to achieve wide diversification and proper asset allocation of investments in numerous fund categories within a single portfolio. These holdings can replace direct investing in stocks, bonds, or other security or investment types. FOF are generally classified as either “fettered,” meaning that they can invest only in funds managed by the same investment firm, or “unfettered,” meaning that they are able to invest in external funds run by other asset management firms.

Fundamental Analysis (FA)

Fundamental analysis (FA) is an investment analysis method employed by traders and investors to evaluate the intrinsic value of an asset — and then determine if it is currently undervalued or overvalued. FA can include the examination of microeconomic factors such as current economic conditions, market trends, or industry comparison, as well as analysis of the team behind a company or asset itself. Fundamental analysis contrasts with the other major method of market analysis, technical analysis (TA), which examines price, volume, and other technical indicators.

Fungibility

Fungibility is the attribute of being mutually interchangeable. Fungibility occurs when a good, asset, or units of an asset are indistinguishable from each other, and so can be interchanged with each other. For instance, one U.S. dollar is equivalent to any other U.S. dollar, and is therefore fungible. Fungibility makes an asset useful as a currency or payment method.

Futo

Owned by seed investor Eron Wolf, Futo is a freedom-focused organization that funds and develops technologies that give users control of their computers, programs, and associated networks. Futo’s first investment was in the decentralized social media network Minds.

Futures

Futures are derivative contracts for the purchase or sale of a security or commodity for a pre-set price at a future date. At the futures’ expiration date, the buyer has the obligation to buy the underlying asset, while the seller has the obligation to sell it. The value of the futures contract is based on assets like commodities, currencies, indexes, or stocks. Futures contracts are traded on exchanges and are used for income generation, hedging, speculation, and other purposes. There are a variety of cryptocurrency applications, including bitcoin (BTC) futures, which represent future agreements to trade BTC.


G

Game Finance (GameFi)

Game finance (GameFi) is a blockchain-based gaming model. GameFi typically employs a play-to-earn (P2E) model that allows users to be rewarded in cryptocurrencies or non-fungible tokens (NFTs) for completing in-game tasks, engaging with other players, or progressing through various game levels. In contrast to traditional video games, most blockchain games allow users to own their in-game assets and transfer their tokenized rewards out of the virtual world they initially earned them in. This can allow gamers to buy, sell, and trade their items on crypto exchanges or NFT marketplaces.

Gartner

Gartner is an American research and advisory company that provides data and metrics to their global executive customer base across industries like technology, finance, communications, legal and regulatory compliance, customer service, human resources, and supply chain. The company provides numerous services — often to executives leading large international enterprises — including webinars, written research, financial and industry-specific data, and more. Gartner also hosts conferences, executive trainings, and other workshops for various enterprise and government clients around the world.

Gas (Ethereum)

The fees associated with transacting and executing smart contracts or decentralized applications (dApps) on the Ethereum blockchain are referred to as gas. Ethereum blockchain processes happen through transactions that require gas. These gas costs are figured by measuring the computational power required for each action and how long each action takes. Gas costs are denoted in gwei, a denomination of ether (ETH), equal to 0.000000001 ETH. Gas was built into the system to reward validators who maintain network consensus. By adding a cost to each transaction, gas also acts as a spam mitigation tool that deters nefarious network activity.

Gas (GAS)

GAS (not to be confused with the gas fees native to the Ethereum network) and NEO are the two native cryptocurrencies of the NEO blockchain protocol. NEO acts as the primary currency for transactions and gives holders the right to vote on network proposals. Users can also earn GAS through staking their NEO. GAS is also used to pay for network usage: transaction fees, storage fees, and fees associated with executing smart contracts. All NEO coins were minted at the establishment of the protocol, and GAS coins are minted with every new block.

Gas Fees

Gas fees are payments made by users to cover transaction or smart contract execution costs on the Ethereum blockchain network, in compensation for the computing energy that such executions require. Gas fees are generally priced in a small amount of the cryptocurrency ether (ETH). The sender of a transaction can decide if they want the transaction to be sent slowly or quickly. The faster the transaction is processed, the more gas fees it will require.

Gas Limit

Ethereum charges a fee, called gas, for the computational exertion needed to send a transaction on the network — and the gas limit is the highest fee that the Ethereum network can charge a user. The gas limit depends on the complexity of the transaction, the chosen sending speed, and the current level of network congestion at the time the transaction is initialized. Because the Ethereum network is so large, thousands of transactions can be queued and awaiting confirmation, which results in network validators prioritizing transactions for users that pay more in gas fees.

Gateway

Gateways are devices that make use of Internet of Things (IoT) technology to connect to a blockchain system or related network infrastructure. Most IoT network devices are generally inhibited by poor battery life, limited computing power, restricted communication bandwidth, and other criteria that affect performance. Gateways were designed to help combat these inefficiencies and can be made up of any number of devices that possess the capability to run a network themselves. Examples of gateways include a mobile phone connected to various wearable devices, a smart car linked by multiple in-car devices, or a 5G base station connected to a multitude of IoT devices.

Gavin Wood

Gavin Wood is a British computer scientist best known for founding Polkadot, Kusama, Parity Technologies, and the Web3 Foundation. Wood became one of the original founders of Ethereum in 2013 and the project's Chief Technology Officer (CTO). Wood also notably created the Solidity programming language that Ethereum uses to program smart contracts. In 2019, Wood developed the Kusama blockchain network and continues to build Polkadot and Kusama, along with other related entities.

Gems (The Sandbox)

In The Sandbox game, Gems are ERC-20 tokens that define the attributes of the assets created by users. They are burned upon usage.

General Availability (GA) Version

A General Availability (GA) version refers to the version of a software program or application that has been released for sale to the general public. The GA version is usually released after the release to manufacturing (RTM) version and several other preceding versions (including the alpha and beta releases). The GA version has normally undergone all testing and finalization to be ready for commercialized purchase, including regulatory and security testing and more.

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) is a European data and privacy protection regulatory framework for the European Union (EU) and the European Economic Area (EEA). The GDPR is also responsible for the transfer of personal data outside of the EU. The main goal of the GDPR is to protect and control the rights of personal data and to streamline the regulatory environment for international business inside and outside the EU.

Genesis Block

A genesis block refers to the first block of any blockchain network. It is almost always hardcoded into the protocol software. It is the only block of a blockchain network that does not reference a previous block.

Geographic Information System (GIS)

A geographic information system (GIS) is a computer-based system used to map, share, analyze, manage, and interpret numerous types of geographic and location data. It is quite common to use GIS technology to apply certain data types to maps to carry out research, data analysis, and other processes for engineering, planning, design, environmental monitoring, disaster relief, search and rescue, telecommunications, and many other uses. GIS also utilizes location data and coordinates such as longitude (x-axis), latitude (y-axis), and elevation (z-value) to fulfill various purposes related to geospatial mapping and data compilation for different disciplines.

Gigabyte (GB)

A gigabyte (GB) is a unit of measurement for digital data storage that is made up of 1,000,000,000 bytes of data. A GB is 1,000 times larger than the megabyte (MB) and is measured using the International System of Units (SI) measurement scale. Bytes are the basic unit of data storage, but have since grown to include many larger measurements including kilobytes (KBs), megabytes, and terabytes (TBs). GBs, like MBs, are normally used to measure data storage on a computer or computer network, or for external USB storage devices or hard drives, and other related software or hardware.

Git

Developed by Linus Torvalds, Git is an open-source software program used primarily by programmers. Free to use, Git lets programmers collaborate on code independent of a central server. For ease of use, some use centralized Git repositories such as GitLab, GitHub, or BitBucket. Using a data structure similar to a Merkle tree, changes to old versions of a program can’t be changed without being noticed — enhancing transparency and secure code development. Considered a version control system, Git lets you revert to older versions of software and allows multiple users to merge their code changes to a new version simultaneously.

GitHub

GitHub, a subsidiary of Microsoft, provides online hosting services for collaborative software development using Git, a distributed version-tracking system. With a variety of advanced collaborative tools, security features, and version control, GitHub has become the de-facto standard for collaborative, online software development. GitHub offers free personal accounts in addition to enterprise accounts. It is commonly used to host open-source projects, although it offers private repositories as well.

Global Industry Classification Standard (GICS)

The Global Industry Classification Standard (GICS) is a financial taxonomy system that has been adopted by most of the global financial system. It is an agreed-upon “language” for understanding into which industries and sectors certain companies are categorized. The GICS structure consists of 11 sectors, 24 industry groups, 69 industries, and 158 sub-industries. The GICS system classifies public companies only.

Go Programming Language

Go is an open-source computer programming language designed by Google. Go is sometimes referred to as 'Golang' because of its domain name (golang.org). Go is a statically typed and compiled programming language that is similar in syntactic structure to C, but includes advanced features for improved productivity when dealing with large networks and codebases. Go has become a preferred programming language for decentralized blockchain networks, and is used with decentralized applications (dApps) and other decentralized tools.

Goguen Phase (Cardano)

Named after computer scientist Joseph Goguen, the Goguen Phase is the third of five phases in Cardano’s long-term roadmap. One of the primary goals of Goguen is to allow both technical and non-technical users to create smart contracts and decentralized applications (dApps).

Golden Cross

A golden cross is a bullish technical trading signal in which the 50-day moving average crosses above the 200-day moving average, typically triggering a price rally. It is the opposite of a death cross trading signal, which is a bearish trading signal. Golden cross formations can also be detected within shorter time frames, such as the 5-day and 15-day averages, although longer periods typically offer stronger signals.

Golem (GNT)

Golem Network is a platform for democratizing access to censorship-resistant computing power. It allows users to supply and lease idle hardware in a peer-to-peer manner. Golem currently operates as a decentralized alternative to centralized cloud computing solutions provided by Amazon, Microsoft, and IBM. The settlement layer of the protocol allows for the creation of a shared and alternative economy, where users earn passive income by leasing their hardware. The network is fueled by the Golem Network Token (GLM), which was previously identified by the ticker symbol GNT before a token swap in November 2020.

Google Authenticator

Google Authenticator is a mobile-based authentication application that makes use of two-factor authentication (2FA) services by using a Time-based One-Time Password Algorithm (TOTP) and HMAC-based One-Time Password (HOTP) algorithm for authenticating a user’s identity for use with software applications. The application generates a one-time six-digit password (which changes every 30 seconds) that must be entered in conjunction with a user's usual login credentials. Google Authenticator serves as a security measure to mitigate malicious actors from hacking into applications on a user’s mobile device or web browser, and is used by cryptocurrency exchanges as an added security measure for customer logins.

Gossip Protocols

Also known as epidemic protocols, gossip protocols are peer-to-peer (P2P) communication frameworks that efficiently and reliably share information. While there are numerous variations, gossip protocols tend to be scalable, fault-tolerant, and secure — while being able to function on decentralized networks. Originally used to maintain consistent copies of a database stored in different locations, gossip protocols are also used for internet routing protocols, Internet Relay Chat (IRC), and various blockchain networks. On blockchains, gossip protocols allow nodes to randomly sync with each other to exchange data in a more secure manner.

Governance

Blockchain governance refers to the formal structure that a blockchain ecosystem maintains to ensure the long-term integrity, transparency, and technical innovation of the project. An equitable governance structure involves different methodologies for voting on platform technology, strategy, updates, and rules. Blockchain governance typically includes both on-chain governance (like cryptographic algorithms that govern the network's computational architecture and consensus mechanism) and off-chain governance (like interpersonal decision-making that is not written in computer code).

Governance Token

A governance token provides holders with a degree of influence over a platform's protocol, products, and future functionality. Governance tokens are often issued via decentralized protocols that aim to encourage community-led growth and self-sustainability. Holders of governance tokens are typically able to propose changes to the protocol as well as use their tokens to vote on those changes. Governance tokens are used to democratically manage a protocol in a fair and decentralized manner. On Proof-of-Stake (PoS) blockchains, governance tokens may be staked within network validator nodes to secure the platform’s security and operational efficiency in exchange for regular staking rewards.

GRANDPA Consensus Mechanism (Polkadot)

GRANDPA (GHOST-based Recursive Ancestor Deriving Prefix Agreement) is one of the two central components of the hybrid consensus mechanism that Polkadot utilizes to secure and maintain its network. GRANDPA is a mechanism for finalizing the state of the blockchain, while its counterpart, Blind Assignment for Blockchain Extension (BABE), is a mechanism for producing blocks.

Graph Node (The Graph)

The Graph blockchain protocol is designed to index and query data from blockchains, and Graph Node is the tool that enables this function. Graph Node is a Rust-based framework that acts as a master server to event source the Ethereum blockchain (the only blockchain currently supported) and the system’s corresponding subgraphs. It deterministically updates a data store that can be queried and searched via the GraphQL endpoint. In essence, Graph Node is the main server that carries out the processes needed to obtain the answers to complex queries from blockchain databases.

Graphical User Interface (GUI)

A Graphical User Interface (GUI) is a means of interacting with a computer program in a visual way. GUIs are intended to make computer programs easier to use and employ icons, windows, and menus. GUIs stand in contrast to text-based user interfaces (UIs) which require users to interact with computer programs through text-based commands.

Graphics Processor Unit (GPU) Mining

Graphics Processor Unit (GPU) mining is a cryptocurrency mining mechanism that makes use of GPUs instead of the Central Processing Units (CPUs) that had been used in the early days of the blockchain industry. For example, the Radeon HD 5970 GPU-miner is able to execute 3,200 32-bit instructions per clock. Compared to the 4 32-bit instructions per clock of a CPU, this represents an 800-fold increase in efficiency. Because of such drastically expanded processing capabilities, GPU mining is much more efficient for performing the types of repetitive computations needed for cryptocurrency mining.

Grayscale (Institutional Investment Firm)

Grayscale is an institutional investment firm that offers cryptocurrency assets to large-scale institutional investors. Grayscale is known for being one of the world’s largest holders of bitcoin (BTC) and ether (ETH). The company offers institutional investors numerous products and services including custodial asset management, trading, and access to its well-known BTC and ETH trusts. Additionally, the firm offers investors index funds, including the decentralized finance (DeFi) Fund and the Digital Large Cap Fund. Grayscale is based in the U.S. and has been headquartered in New York City since its founding in 2013.

Greenlist

The Greenlist is a list of cryptocurrencies provided by the New York Department of Financial Services (NYDFS). NYDFS-licensed virtual currency businesses are permitted to use the coins on the list for approved purposes.

Griefing

Griefing occurs when a user acting in bad faith deliberately harasses or trolls other users within an online environment to disrupt their concentration and strategy to cause a loss for those involved (other than for the griefer). For example, griefing can take place in an online video game community. Griefing is not generally classified as cheating because it uses allowable aspects within the game (albeit for unintended purposes). Examples include destroying something that other players built or created. Basically, griefing is intentionally interrupting the in-game immersion of another player during their gameplay to cause a losing result.

Gross Domestic Product (GDP)

Gross domestic product (GDP) is the total market value of all finished goods and services produced within a country during a specific time period. GDP is one of the most widely accepted metrics for measuring the overall economic strength of a country, and is used to broadly measure a country’s annual growth rate, domestic production, and overall total economic value. Gross domestic product is generally calculated in three ways (using production, incomes, or expenditures) and can be adjusted for inflation and other population metrics to provide more tailored data insights. Though GDP has its limitations, it has historically served as a key tool to help guide policymakers, businesses, and investors towards more informed and more strategic decision-making.

Gross Merchandise Value (GMV)

Gross Merchandise Value (GMV) — also known as Gross Merchandise Volume — is used within the online retailing industry to indicate the total volume of sales (measured in USD, euros, or another fiat currency) for merchandise sold within a specific marketplace during a specified time period. GMV also includes all fees and deductions that are calculated independently, such as site revenue, which is derived from fees and is not the same as the monetary value of items sold. The GMV for ecommerce retailers is denoted by the average sale price per item, multiplied by the number of individual items sold.

Gwei

Gwei is a denomination of ether (ETH), the native cryptocurrency of the Ethereum blockchain. One gwei is equal to 0.000000001 ETH. Gas fees, which are fees charged on every Ethereum transaction, are typically denominated in gwei.


H

Hack

A hack, or hacking, is the process whereby a malicious third-party cybercriminal breaks into a computer system or network that they do not legally have access to. Hacks can be carried out to steal sensitive data, for monetary gain, or for other malicious intentions. The process of hacking can also be used for legitimate purposes by various enterprise, private, or government entities to stop cybercriminals from carrying out online criminal activity.

Hackathon

A hackathon is a competitive and time-sensitive event held by a firm, consortium, or related entity (for example in the technology, FinTech, or blockchain industries). In these events, software engineers compete to produce working applications, software programs, or even entire computer networks. Hackathons often provide several distinct prize categories for winning participants, and tend to have a specific focus — such as on programming languages used, operating system type serviced, or the specific demographic of programmers involved. The name Hackathon is a portmanteau of hacking and marathon.

Hacker

Computer hackers are often malicious actors who use their programming skills and technical expertise to break into computer systems or networks to steal, destroy, or modify data. Hackers are often employed by governments, large enterprises, or law enforcement agencies in order to retrieve information that could lead to the arrest and conviction of criminals.

Hal Finney

Hal Finney was a famous cryptographer and programmer who was employed by PGP Corporation for many years and eventually became known as one of the early pioneers responsible for the creation of the Bitcoin network. Finney was the recipient of the first Bitcoin transaction that was allegedly sent by Bitcoin creator Satoshi Nakomoto. Many have hypothesized that Finney himself was Satoshi Nakomoto, however during an interview shortly before his death in 2014, Finney stated that he was not Nakamoto. To this day he is considered one of the most influential and iconic software developers of our time.

Halving

A halving is when the reward allocated to miners for mining new blocks is reduced by 50%. Halving events usually occur at fixed intervals. For example, Bitcoin's block reward is halved every 210,000 blocks, and happens about every four years.

hApps (Holochain)

Decentralized applications (dApps) which are built on the Holochain blockchain platform are referred to as hApps. Holochain is a completely distributed open-source network that allows anyone to create hApps. Many hApps are developed to help users better manage their personal data by employing strong privacy and security parameters. Elemental Chat (a secure P2P messaging hApp) and HoloVault (an integrated dashboard that allows users to manage how their data is being used) are two examples of hApps.

Hard Cap

Hard cap has two separate definitions related to blockchain. Firstly, a hard cap indicates the absolute maximum supply of a cryptocurrency that can ever be created. For example, Bitcoin has a hard-capped supply of 21 million bitcoin (BTC). The second meaning indicates the maximum amount of a currency that will be offered to investors during an Initial Coin Offering (ICO) or funding round. For example, a new blockchain project raising funds may impose a hard cap of 100 million tokens to be initially sold, meaning that only 100 million tokens can be sold during the ICO.

Hard Fork

A hard fork is a software update that is not backwards compatible. In the context of blockchain technology, a hard fork happens when new rules have been introduced into the blockchain code that are not compatible with the rules of the blockchain's previous code. If network nodes do not update their software, they are unable to communicate with nodes that have updated their software. This sometimes results in the blockchain splitting into two networks — one which operates with the old rules and one which operates with the new, updated rules. For example, Bitcoin Cash emerged after a hard fork of the Bitcoin blockchain.

Hard Fork Combinator (HFC) (Cardano)

Cardano’s hard fork combinator (HFC) is designed to streamline the network’s updates without requiring system stoppages or fundamental chain restarts. It does this by combining pre- and post-fork blocks for a transition period — with the ability to combine future blocks and their updates into a single combined property or ledger.

Hard Peg

A hard peg is a specific type of exchange rate model that is applied to a currency in order to maintain its value relative to a reserve currency or basket of currencies. As they relate to blockchain, a hard peg is usually applied to stablecoins to maintain their peg to a fiat currency like the U.S. dollar, and typically do not allow for much flexibility to deal with economic shocks and fluctuations.

Hardware Wallet

A hardware wallet is a non-custodial wallet and is considered a secure way to personally store crypto. Typically looking like a USB stick, a hardware wallet is usually offline but connects via USB or bluetooth to an online device when making transactions. Although technically connected to the internet at times, it’s still considered a cold — or offline — wallet as transactions are signed “in-device.” This means the transaction has been signed offline prior to being broadcast to the blockchain via the internet. Due to this security feature, malware is unable to sign these transactions — or view your keys.

Hash Function

Hash functions are algorithms that take data of any size and convert it into a fixed-length hexadecimal number, or hash. Hash functions are one-way functions and cannot be reversed to reveal the data inputted to create the hash. The Bitcoin blockchain utilizes the SHA-256 hash algorithm in its transaction validation process.

Hash Rate

The hash rate is the unit of measure for the computing power of a Proof-of-Work consensus mechanism. The hash rate is valued in terahashes per second (TH/s), and increases or decreases according to the number of miners operating on the network.

Hashed Timeclock Contracts (HTLCs)

Hashed Timelock Contracts (HTCLs) are smart contracts that facilitate atomic swap transactions. These smart contracts function as a "virtual lockbox" that requires a HashLock and TimeLock Key to unlock funds during an exchange.

Hashes per Second (H/S)

Hashes per second (h/s) is a measurement used to determine the hash rate on a blockchain network that uses Proof of Work (PoW). This measurement calculates the number of hash computations performed on a blockchain network every second. The number of hashes per second is also used to compare the mining performance of various crypto mining rigs that are used for cryptocurrency mining.

Hashing

Hashing is the process of taking an input of any size and using a mathematical function called a hash function to create an output of fixed size. Hash functions are considered one-way functions. Unlike encryption, which is intended to conceal data as it moves over a network or is stored on a device, hashing is primarily used to verify the authenticity of data. Hashing also serves an important security function in protecting network components such as passwords and sensitive information that can be stored as hashes — the outputs of hash functions.

HashLock Key

During an atomic swap, the HashLock Key will only distribute exchanged cryptocurrency when both parties have signed off on their respective transactions.

Hashmasks

Hashmasks is a non-fungible token (NFT) collection of 16,384 unique masked characters. Holders accumulate Hashmasks’ NCT token, which allows them to select a name for their NFT on the Ethereum blockchain.

Haskell Programming Language

Haskell is a programming language suitable for a variety of applications in financial services and hardware design. Cardano is programmed in Haskell.

Head and Shoulders (Technical Formation)

Head and shoulders technical formations visually consist of a left shoulder, a head, a right shoulder, as well as a neckline (which is drawn across the bottom of the formation). These formations are created by rising and dropping prices that form two smaller "shoulders" surrounding a larger "head" in the center. Head and shoulders typically occur when an asset is close to a reversal in price. With an inverse head and shoulders formation, the opposite occurs once the pattern has been defined, with the end result often being an increase in price.

Hedge

A hedge is when an investment in a security or asset is made with the intention of offsetting potential risks or losses elsewhere in an investment portfolio.

Hedge Contract (Hegic)

Hedge contracts are specialized smart contracts utilized by the Hegic protocol that enable the on-chain trading and execution of options contracts. Like traditional options contracts, hedge contracts come in the form of both call and put options.

Hedge Fund

A hedge fund is a pooled investment fund that uses complex combinations of investment strategies and techniques to increase its performance. Hedge funds have a relatively low barrier for entry compared to other types of funds, but are still typically reserved for accredited institutional investors and high-net-worth individuals (HNWIs). Hedge funds can be expensive to gain entry to compared to traditional investments, but tend to exhibit higher returns than market averages globally.

Heimdall Node

A Heimdall node is a validator node that is integrated with Polygon’s staking contract system on Ethereum to enable Polygon’s Proof-of-Stake (PoS) consensus mechanism. This capability was realized by building on top of the Tendermint consensus engine with modifications to the signature scheme and specific data structures. Heimdall nodes oversee block validation, block producer committee selection, and checkpointing of Polygon’s sidechain blocks to the Ethereum network. The Heimdall layer aggregates blocks produced by Bor nodes into a Merkle tree and publishes the Merkle root sequentially to the Polygon root chain (one of the Polygon sidechains).

Hexadecimal (Hex)

Within the fields of mathematics and computing, the hexadecimal numerical system or “hex” system is a positional numerical system that represents numbers utilizing a radix base of 16. Instead of using the common methodology of representing numbers using 10 symbols, hexadecimal makes use of 16. Typically, the numbers “0”–“9” represent the values 0–9, while the letters “A”–“F” represent the values 10–15. Hexadecimal numerals are generally used by computer system designers and software engineers to provide a human-friendly representation of binary-coded values to allow for simple readability.

Hidden Cap

A hidden cap is a blockchain-focused fundraising strategy where the fundraising goal’s upper limit is kept secret and known only to the blockchain team. Used on some Initial Coin Offerings (ICOs) and similar equity offerings, proponents claim that hidden caps benefit smaller investors. This is because bigger investors generally want the transparency of knowing the total amount or supply of an asset before they are willing to make a substantial capital investment. This typically discourages large investments as a hidden cap affects investment allocation decision-making. Critics counter that hidden caps go against the blockchain ethos of transparency, verifiability, and trustlessness.

Hierarchical-Deterministic (HD) Wallet

A hierarchical-deterministic (HD) wallet is a cryptocurrency wallet that generates new cryptographic key pairs or addresses from a master key pair each time funds are received. This technique is intended to enhance the privacy of the wallet by distributing the total balance of a user's cryptocurrency holdings across several addresses. This feature also increases the security of the wallet by distributing private keys, while all previously used addresses remain usable and within the user's control.

High

The high, or highest price, is one of four main data points used for day trading on the stock market. The other three are the opening price, low, and close — and all four are collectively known as OHLC. The high is generally classified as the highest price obtained during the last trading period, which typically runs from 9:30am–4:30pm EST on weekdays in U.S. markets. Unlike the traditional stock market that has closed hours and closes completely for trading on weekends, cryptocurrency markets are open 24 hours a day, every day of the year.

High-Frequency Trading

High-frequency trading is an automated market trading method that utilizes algorithms to rapidly buy and sell a large quantity of orders.

High-Level Programming Language

A high-level programming language is a programming language that possesses high levels of abstraction and is designed to be less complex and more efficient than low-level languages. High-level programming languages are characterized as highly readable (they are usually based on English), extremely portable for use with numerous platform types, and easier to debug and maintain compared to their low-level counterparts. High-level programming languages are also highly executable, and typically require a compiler to translate into a machine-readable format. Most widespread programming languages are considered high-level, with examples being JavaScript, C++, Python, Java, C#, and WebAssembly (WASM).

High-Net-Worth Individual (HNWI)

A high-net-worth individual (HNWI) is a person that possesses liquid assets above a certain amount, generally at least $1 million USD. These assets could include stocks, bonds, and commodities, among others.

High-Yield (Junk) Bonds

A junk bond is a bond that holds a higher risk of default. Junk bonds are also referred to as 'high-yield,' because investors receive higher interest rates in return for taking on increased risk.

HMAC-Based One-Time Password (HOTP)

A HMAC-based One-Time Password (HOTP) is a password that makes use of a one-time password (OTP) algorithm leveraging Hash-Based Message Authentication Code (HMAC). HOTPs, like Time-based One-Time Passwords (TOTPs), are used as a security measure for specialized authentication methods such as two-factor authentication (2FA). The HOTP mechanism uses a hash-generated one-time password that allows users to securely log in to various websites often through their mobile phone using an authentication application.

HODL (Hold)

"HODL" is a slang expression that refers to the holding of cryptocurrency assets, as opposed to selling them. The term is often used during crypto bear markets to encourage crypto investors to maintain their crypto portfolios at current levels in lieu of selling or liquidating their crypto. The term was derived from a post on Bitcointalk in which the poster misspelled 'hold,' and subsequently became a meme and crypto term.

Homestead (March 2016)

Homestead was an upgrade of the Ethereum network that took place during March 2016, after the initial Frontier phase of the Ethereum network was determined to be stable enough for the launch of Homestead. Homestead provided much of the same beta testing-level experience as Frontier, alongside a command line interface (CLI), more stability, and a few additional features.

Homomorphic Encryption (HE)

Homomorphic encryption (HE) is an encryption technique employed in computer science that allows developers to perform data computations without decryption. Privacy-preserving technology is critical to the widespread adoption of computer science and blockchain and HE presents a sustainable alternative to other privacy-preserving computing techniques.

Honest Geppetto Attack

An Honest Geppetto Attack refers to a computer network attack in which a hacker runs a large number of nodes for a long period of time in order to gain the trust of other nodes in a given network. When this has been achieved, the attacker abruptly takes the nodes offline with the goal of disrupting the entire network. The best way to prevent an Honest Geppetto Attack is to build a network large enough that this attack is rendered ineffective.

HoneyBadger BFT (HBBFT)

HoneyBadger BFT (HBBFT) is an asynchronous Byzantine Fault Tolerant (aBFT) network consensus mechanism that is designed to handle potentially thousands of transactions per second (TPS) and scale over a wide area network. As an asynchronous method of BFT consensus, HBBFT does not rely on assumptions about time to achieve network consensus, which is beneficial in an environment where network nodes are operating under widely different conditions and connection speeds.

Horizontal Relay-Routed Message Passing (HRMP)

Horizontal Relay-Routed Message Passing (HRMP) is a solution built for the Kusama and Polkadot networks that helps parachains communicate and share data with each other. In May 2022, HRMP was replaced by the more advanced Cross-Chain Message Passing (XCMP) technology. HRMP was more computationally demanding than XCMP because it stored all messages in Polkadot’s Relay Chain. HRMP and XCMP are both designed to help facilitate cross-chain communication and the transfer of assets and other data from one blockchain protocol to another.

Horizontal Scalability

Horizontal scalability is a means of increasing the transactional capacity of a blockchain network by adding more nodes to the network or optimizing systems, rather than altering the protocol via code.

Hostage Byte Attack (Storj)

A hostage byte attack is a theoretical vulnerability in the STORJ network in which malicious storage nodes might extort payment from users by refusing to transfer pieces of data.

Hot (Online) Wallet

The term hot wallet refers to a cryptocurrency wallet that is connected to the internet. The wallet's assets are therefore held online, as opposed to a cold wallet, which is held in an offline environment.

Hotspot (Helium)

Hotspots are devices that operate on the Helium Network both as specialized network nodes and as wireless internet hotspots. Helium Hotspots are manufactured by multiple vendors and are designed to be easily deployable solutions to participate in the Helium Network and earn rewards for providing internet coverage to various devices on the network.

Howey Test

The Howey Test is a series of four conditions that the U.S. Securities and Exchange Commission (SEC) uses to determine whether a financial transaction is considered to have involved the purchase of a security. The conditions are:

  1. The transaction involves an investment of money
  2. There is an expectation of profits from the investment
  3. The investment of money is in a common enterprise
  4. Any profit comes from the efforts of a promoter or third party

If a transaction passes all four conditions of the Howey Test, it is legally considered to involve the purchase of a security.

Human-Readable Agreement

Human-readable agreements are agreements that are written in human-interpretable language (i.e. English) instead of code. This mechanism is important because it helps allow the technical architecture of a computerized system to be better understood by humans.

Huobi (Cryptocurrency Exchange)

Huobi is a cryptocurrency exchange that was founded in 2013 by CEO Leon Li. Huobi provides services for both retail and institutional investors. It has a version of wrapped bitcoin (BTC) called Huobi BTC (hBTC), and has also built its own blockchain called the Huobi Eco Chain.

Huobi BTC (HBTC)

A version of wrapped bitcoin (BTC) launched by Huobi Global, the Huobi BTC (HBTC) crypto protocol generates an ERC-20 representation of BTC. Backed 1:1 by BTC, HBTC is custodied by crypto exchange and blockchain investment firm Huobi.

Huobi Ecochain Blockchain (HECO)

The Huobi Ecochain blockchain is the proprietary blockchain created by the Huobi Group and its main underlying cryptocurrency exchange Huobi Global. It is characterized by its cost-efficiency, extremely fast transaction times, and Ethereum Virtual Machine (EVM)-compatible architecture allowing developers to deploy Solidity-based smart contracts on the protocol. Huobi Ecochain is designed mainly to transfer tokenized assets between different decentralized applications (dApps) and the various services offered by its region-specific Huobi exchange platforms. Huobi Ecochain provides the technical infrastructure needed to operate various centralized finance (CeFi) and decentralized finance (DeFi) systems for both retail and institutional investors across the globe.

Hybrid Blockchain

A hybrid blockchain network combines elements of both private and public blockchains. The hybrid aspect of the network's architecture most often includes a main public chain, in addition to private sidechains of various purposes that link back to the mainchain and public access.

Hybrid Exponential Minting

Hybrid exponential minting is a method for minting coins utilized by the Filecoin network. In this model, 30% of rewards are distributed according to an exponential decay model, in which block rewards are greatest at the protocol's inception and decrease over time. 70% of rewards are distributed in proportion with the growth of the total storage capacity of the network. This model was developed to ensure the long-term viability of the Filecoin network because it rewards miners throughout the entire lifecycle of the network, in proportion to the utility they provide to the network.

Hybrid Smart Contract (Chainlink)

Hybrid smart contract is a term employed by the Chainlink protocol, referring to augmented smart contracts that combine both on-chain and off-chain elements. An example of a hybrid smart contract could be a decentralized finance (DeFi) application that relies on external Chainlink price feeds — combining off-chain data into the structure of the on-chain smart contract. Hybrid smart contracts are envisioned to expand the applicability of smart contract technology to broader real-world use cases.

Hydra (Cardano)

A Layer-2 solution for Cardano being developed by Input-Output Global (IOG), Hydra is designed to further enhance throughput, diminish latency, and incur little-to-no costs — while still preventing Denial-of-Service (DoS) attacks. Hydra will accomplish this by processing transactions off-chain while still being tangentially coupled to the main Cardano ledger for transaction settlement. Hydra is scheduled for a late 2022 release date.

Hyperinflation

Hyperinflation describes severe, and often rapid price increases in an economy resulting from surplus money supply. Political instability, a weak economy, and loss of confidence in the financial system can cause hyperinflation, which can be highly destabilizing to a national currency and economy.

Hyperledger

The Hyperledger blockchain project is an open-source umbrella project that first came to fruition in December 2015 via the Linux Foundation. Hyperledger has received considerable contributions from large-scale global enterprises such as IBM, Intel, and JP Morgan to support the collaborative development and ongoing research of blockchain and Distributed Ledger Technology (DLT). The project’s mission is to improve multi-industry collaboration for blockchain technology to improve the performance and reliability of DLT to support global business transactions. The Hyperledger project consists of four main blockchain protocols — Hyperledger Fabric, Hyperledger Sawtooth, Hyperledger Besu, and Hyperledger Iroha.

Hyperledger Fabric

Hyperledger Fabric is a permissioned blockchain protocol that was initially designed by IBM and other constituents to provide a modular framework that enables delineation of node infrastructure, smart contract execution, configurable consensus, and blockchain-agnostic membership services. Hyperledger Fabric is composed of Peer Nodes, Orderer Nodes, and Membership Service Providers (MSPs) which typically make use of a Certificate Authority responsible for authenticating Hyperledger member identities and role types. Hyperledger uses JavaScript, Go, Java, and other languages. It is capable of using multiple consensus methodologies, but is generally used with Practical Byzantine Fault Tolerance (pBFT).

Hypertext Transfer Protocol (HTTP)

Hypertext Transfer Protocol (HTTP) is an application layer protocol that allows hypermedia data like HTML to operate online. HTTP is one of the main foundational layers of the internet and allows web pages, hyperlinks, hypertext, data, and more to communicate with different types of web servers that are needed to display information to users via a user interface (UI) or screen. HTTP not only interacts with HTML, but also with other web-based systems such as JavaScript, cascading style sheets (CSSs), application programming interfaces (APIs), and the Transmission Control Protocol (TCP) and Internet Protocol (IP) layers of the internet.


I

Iceberg Order

An iceberg order is an automated purchasing strategy — usually carried out by large institutional investment firms — that relies on software to divide a large purchase of an asset into several smaller limit orders. The objective of an iceberg order is to buy a large amount of an asset in smaller increments without disrupting the price of the asset with one large order. Iceberg orders are usually purchased in both visible and hidden increments. The name “iceberg” is denoted by the fact that the visible purchases are “just the tip of the iceberg.”

ICON Incentives Scoring System (IISS) (ICON Network)

The ICON Incentives Scoring System (IISS) is the method used by ICON for measuring, incentivizing, and rewarding contributions to the network. Examples of contributions include running a node in ICON's Delegated Proof-of-Stake (DPoS) network architecture, or developing a decentralized application (dApp). Rewards are denominated in the ICON Exchange Token (ICX).

ICX (ICON Network Token)

ICX, or the ICON Exchange Token, is the native asset of the ICON blockchain. The token is minted each time a block is created, and serves various purposes. As a governance token, ICX holders can vote on changes to the ICON blockchain. The ICX token is used as a reward for nodes that maintain the network, to pay for fees and smart contract usage, and as a medium of exchange in the wider ICON ecosystem.

Identity Data

Identity data refers to data that might be used to personally identify a user or party on the internet. Types of identity data might include social security numbers, personal addresses, or other private information. Identity data can encompass many types of private information that might disclose financial details, such as bank account and credit card information.

iExec

iExec is a blockchain project that serves as a decentralized marketplace for blockchain-based cloud computing resources. It is one of only a few projects in the blockchain industry that uses a distinct version of the Proof-of-Contribution (PoC) consensus mechanism.

Ignite (formerly Tendermint)

Ignite (formerly known as Tendermint) is a company founded in 2014 by computer scientist Jae Kwon. Tendermint is the creator of the Proof-of-Stake (PoS) Tendermint Core Byzantine Fault Tolerant (BFT) consensus mechanism that was initially built for the Cosmos Hub blockchain. Tendermint functions as a gateway to the Cosmos blockchain ecosystem. The company created the Application Blockchain Interface (ABCI), which enables the replication of decentralized applications (dApps) written in a variety of programming languages. They also built the Inter-Blockchain Communication (IBC) protocol, an interoperability protocol designed to enhance the security of data transfers between different blockchains.

Illuvium Configuration Change Proposal (ICCP)

Illuvium Configuration Change Proposals (ICCPs) are a mechanism used by the Illuvium blockchain gaming platform that allow for proposed changes to Illuvium’s System Configuration Variables. ICCPs are documents that are used to propose changes to configurations within the Illuvium platform and its underlying architecture and are usually composed of potential amendments to marketplace fees, balance changes, configurable council values, and capture mechanics within the Illuvium protocol. The authors of individual ICCPs are responsible for building consensus within the community and analyzing various community opinions in relation to the proposal.

Illuvium Improvement Proposal (IIP)

Illuvium Improvement Proposals (IIPs) are a method of facilitating the blockchain-based governance structure of the Illuvium blockchain gaming platform. IIPs allow token holders and network participants to vote on proposed amendments to the Illuvium protocol and its underlying architecture via the network-specific ILV token. While the Illuvium governance structure is similar to Ethereum Improvement Proposals (EIPs) and other blockchain systems, IIPs make use of their own distinct mechanisms to achieve a decentralized, equitable governance structure, which includes ongoing modifications to the Illuvium gaming platform and its underlying systems.

Immutability

In a blockchain context, immutability refers to something that cannot be changed. This characteristic allows data to be irreversibly codified into the shared ledger of a blockchain network after transaction execution. Most non-blockchain computer networks are mutable, meaning that the information inside them can be modified, censored, or changed. Immutability allows a blockchain network user to send and receive crypto transactions that can’t be reversed. It also can ensure the integrity of data for a decentralized application (dApp), blockchain cloud storage platform, and various other blockchain network applications.

Immutable X

Immutable X is a specialized Layer-2 scaling solution for blockchain-based systems. The protocol is designed to enable extremely fast transaction times and zero gas fees on Ethereum, resulting in a framework that is tailored for use within blockchain play-to-earn gaming and non-fungible token (NFT) platforms. These highly sought-after characteristics are achieved through Immutable X’s Zero-Knowledge Rollup (zk-Rollup) technology, a form of privacy-focused Layer-2 scaling. The system also makes use of Zero-Knowledge Proof cryptography which is designed to eliminate the possibility of malicious actors accessing a users’ private keys.

Impermanent Loss

Impermanent loss occurs when the value of tokens held in an algorithmically balanced liquidity pool lose value relative to assets in the open market due to price volatility. The loss is 'impermanent' because the original value of the tokens can be restored if the liquidity pool restores balance.

In the Money

'In the money' refers to an option that has a market price that is higher than its 'strike' price, which is the set price at which the option owner can buy or sell the security or commodity that underlies the option. Conversely, 'out of the money' refers to an option that has a market price lower than the strike price.

Index Fund

An index fund is a pool of different assets in various ratios or balances. In traditional finance, an index fund is managed by a portfolio manager who manually makes trades to bring the fund back to its intended balance. In the decentralized finance (DeFi) version of an index fund, the fund typically rebalances automatically when trades occur.

Index Token

Index tokens are designed to track the index of a specific group of cryptocurrencies or other assets. Index tokens operate in a similar manner to indexes that are used within the traditional stock market. Index tokens are often used to track the market cap of multiple decentralized finance (DeFi) projects (such as Compound, Aave, Uniswap, and MakerDAO) or to track several Layer-1 smart contract blockchain platforms (such as Ethereum, Cardano, Avalanche, Polkadot, and Cosmos). Further, a crypto-based synthetic index token can be used to track stock indexes like the S&P 500 or the NASDAQ.

Indexing Server

An indexing server is a specialized operating system (OS) or database used for indexing (i.e. organizing and measuring) different types of data. Indexing is used to track and group different data sets from a variety of topics. Theoretically, the most powerful indexing servers have the capability to categorize and access all publicly available data. This all-important data can then be used for numerous uses in practically any industry. Indexing servers allow users to type in a search query (or question) that they would like answered, thereby helping them solve a specific problem.

Individual Retirement Account (IRA)

In the U.S., many financial institutions offer individual retirement accounts (IRAs) that provide tax advantages for retirement savings. Anyone can sign up for an IRA and save money in one. In short: one advantage of a traditional IRA is that your contributions are tax-deductible in the year that they are made.

Inflation

Inflation refers to the rising of prices in an economy relative to actual value, which decreases the purchasing power of a fiat currency such as USD, EUR, JPY, or GBP. One potential cause of inflation is an increase in the money supply, which is typically executed by a country’s central bank. Most cryptocurrencies follow a fixed policy that decreases token or coin circulation over time. These cryptocurrencies are often coded with a total max supply that cannot be exceeded.

Information Technology (IT)

Information technology (IT) refers to the use of technology to solve business or organizational problems. IT can also be considered the use of computers, computer networking infrastructure, data storage, cloud computing, software, hardware, and numerous other types of technology to provide services and solve problems for customers. IT intersects with most industries and is used to solve many complex technological challenges by increasing transparency, improving efficiency, enhancing security and privacy, and by giving customers a better user experience (UX).

Initial Coin Offering (ICO)

Initial Coin Offerings (ICOs) or token sales are a mechanism made possible by blockchain technology that incorporates the creation and sale of a token or coin to raise funds for a new crypto protocol, decentralized application (dApp), or other digital asset or blockchain product. Instead of providing buyers with equity or shares, an ICO sells coins/tokens that usually claim future utility in the associated project. Despite this, ICO-launched coins/tokens may still be considered securities, and are subject to jurisdictional regulation in certain countries.

Initial Data Offering (IDO) (Ocean Protocol)

Similar to an Initial Coin Offering (ICO) or an Initial Public Offering (IPO), an Initial Data Offering (IDO) refers to the initial public listing of a datatoken asset on the Ocean Protocol blockchain. Instead of providing buyers with equity or shares, an IDO sells datatokens that represent datasets and data services on the Ocean Protocol platform.

Initial DEX Offering (IDO)

An Initial DEX Offering (IDO) is the process whereby a blockchain project initially launches their token through a token sale hosted on a decentralized exchange (DEX). IDOs are sometimes chosen by the teams launching them because they can offer businesses a means to engage potential investors and build their brand through a reputable company (i.e. an established DEX) in a more transparent environment. Initial DEX Offerings are similar to Initial Exchange Offerings (IEOs), which are typically hosted on larger and more centralized exchange platforms. IDOs are sometimes preferred to IEOs and Initial Coin Offerings (ICOs) because they often offer more immediate liquidity, a faster trajectory to trading, and lower listing costs.

Initial Exchange Offering (IEO)

An IEO or Initial Exchange Offering is a token distribution event that is specifically conducted on a cryptocurrency exchange platform. Similar to Initial Coin Offerings (ICOs), IEOs are a fundraising method for many crypto-oriented companies. The U.S. Securities and Exchange Commission (SEC) has released guidance recommending caution when investing in an IEO and says IEOs may be in violation of federal securities laws. These IEOs may lack many of the investor protections of registered and exempt securities offerings.

Initial Farm Offering (IFO)

Initial Farm Offerings (IFOs) help new projects get their tokens into the hands of users through yield farming. In exchange for committing their liquidity provider (LP) tokens to a decentralized exchange (DEX) protocol, traders can receive access to new token sales.

Initial Public Offering (IPO)

An Initial Public Offering (IPO) is a sale of shares of a private company to the public — particularly institutional and retail investors. This process, which takes place on a stock exchange, transforms the private company into a publicly traded company by selling securities that represent a fraction of ownership. Companies that intend to conduct an IPO must adhere to rules and regulations as set out by the U.S. Securities and Exchange Commission (SEC).

Input-Output Global (IOG)

Formerly known as Input-Output Hong Kong (IOHK), Input-Output Global (IOG) is a software development enterprise that is one of the main contributors (along with EMURGO and the Cardano Foundation) to building the Cardano blockchain ecosystem. IOG builds blockchain solutions for enterprise, government, and private sector clients as well as the Cardano smart contract platform. The company was founded in 2015 by Cardano CEO Charles Hoskinson and co-founder Jeremy Wood. As of Q3 2021, IOG employs over 400 employees in more than 50 countries.

Insider Trading

Insider trading is an illegal activity in which a person who has access to non-public, material information about a company utilizes that information to make advantageous trades of the company's stock.

Institutional Investment Fund

An institutional investment fund is an investment fund that is accessible only to large institutional investors. Institutional investment funds build comprehensive portfolios for their clients that have a variety of purposes and investment objectives. These often include investment allocation towards nonprofit foundations, retirement plans, and educational endowments. Typical contributors to institutional investment funds include governments, large enterprises, charities, and other constituents. Institutional investment fund offerings can include mutual funds, commingled institutional funds, institutional shares, and separate institutional accounts.

Institutional Investor

Institutional investors are firms that invest in various asset classes on behalf of other people. Examples of institutional investors include pension funds, hedge funds, and commercial banks among others.

Institutional Trading Software

Institutional trading software is software that provides an online interface or exchange platform for institutional trading and portfolio management.

Institutional-Grade

The term institutional-grade generally refers to infrastructures or products which have features that make them suitable for use by large enterprises.

Insurance

Insurance provides compensation for losses in exchange for the payment of a fee, referred to as a premium. Some digital asset exchanges have insurance for the assets they hold in the event of theft or other circumstances leading to losses.

Intangible Asset

An intangible asset is any asset that cannot be physically touched. Examples of intangible assets include intellectual property rights, computer software, design patents, medical data, and contractual agreements such as a land title transfer or mortgage, among others. As they relate to blockchain, intangible assets include decentralized identities (DIDs), smart contracts, decentralized oracles, databases, application programming interfaces (APIs), software development kits (SDKs), and more. The classification of cryptocurrencies and non-fungible tokens (NFTs) is ambiguous because they can be stored in a digital wallet or crypto exchange and have characteristics that are both tangible and intangible.

Integrated Development Environment (IDE)

An Integrated Development Environment (IDE) is a software program that provides developers with developer tools to design applications in a single, easy-to-use graphical user interface (GUI). IDEs usually consist of a source code editor, code debugger, and build automation tools. Sometimes IDEs consist of an interpreter, class browser, object browser, class hierarchy diagram, and compiler as well as other tools to simplify software development.

Intellectual Property (IP)

Intellectual property (IP) is a wide-ranging categorization of intangible assets like property rights (such as trademarks or copyrights), computer software, design patents, trade secrets, medical data, and contractual agreements such as land title transfers or mortgages, among other assets. IP can also include musical tracks, ebooks, paintings, images, film, and other artistic mediums. IP laws in different jurisdictions vary substantially, and are widely needed to give businesses and individuals rights to the information and intellectual goods they create to mitigate potential data theft. In a blockchain context specifically, examples of intellectual property include non-fungible tokens (NFTs) and tokenized cryptocurrency assets.

Inter-Blockchain Communication (IBC) Protocol

The Inter-Blockchain Communication (IBC) Protocol is a protocol that facilitates interoperability between different blockchain networks by enabling cross-chain interaction and value exchange. It was designed by technologists from Tendermint, Agoric, and the Interchain Foundation.

Inter-Chain Communication

Inter-chain communication, which is also called cross-chain communication, is a process that facilitates communication between different blockchain networks to enable mutual interaction and value exchange, often in the form of token and cryptocurrency asset exchange. Cross-chain and inter-chain communication are one of the main technologies that enable blockchain network interoperability. There are inefficiencies related to inter-chain communication, but as blockchain proliferation grows, many experts believe that it will become increasingly more efficient to exchange data in new ways, such that full data sharing capabilities between hundreds or even thousands of blockchains may be possible.

Intercontinental Exchange (ICE)

The Intercontinental Exchange (ICE) is an American Fortune 500 company formed in 2000 that helps facilitate the operation of global exchanges and clearing houses to provide financial, mortgage, and technology data and listings services. The ICE operates and owns asset exchanges for financial, derivatives, and commodity marketplaces around the world, operating under 12 specific regulated exchanges and marketplaces including ICE futures exchanges in the US, Canada, and Europe. The Intercontinental Exchange was built to help facilitate the trading of derivatives and various asset class types on the New York Stock Exchange (NYSE) and the former London International Financial Futures and Options Exchange (LIFFE), subsequently renamed as ICE Futures Europe.

Interest Bearing Asset

Traditionally, an interest bearing asset is any asset that earns interest for its holder. Interest bearing assets typically consist of liquid assets (mainly cash and balances, interest due from banks, trading and available-for-sale securities), non-liquid assets (various financial assets designated at fair value, held-to-maturity investments, and gross loans), and other interest bearing components of assets. Interest bearing assets in the blockchain and crypto industry are quite common, and can include any cryptocurrency or crypto-related financial instrument that earns interest for their holder. Interest bearing assets are often utilized through blockchain’s advancing financial paradigm, decentralized finance (DeFi).

Interest Bearing Token (ibTKN)

An interest bearing token (ibTKN) is a crypto token that can be found on most decentralized exchanges (DEXs). Once you deposit crypto assets, your ibTKNs grow in value by receiving a cut of the trading fees in exchange for providing liquidity. When you redeem your ibTKNs for your original assets, you receive your initial deposit plus any accrued trading fees. Examples of ibTKNs include Yearn.finance’s yvDAI, SushiSwap’s xSUSHI, and Curve’s 3crv.

Interest Rate

Interest is the amount of money that a lender charges for borrowing money. Interest rates are expressed as a percentage of the amount lent and are typically calculated on an annual basis known as the annual percentage rate (APR).

International Monetary Fund (IMF)

The International Monetary Fund (IMF) is an international financial institution and a non-governmental organization (NGO) based in Washington D.C. It is made up of 190 representative countries from around the world. The IMF is built to foster global monetary cooperation, secure financial stability, facilitate international trade, promote sustainable levels of economic growth, and reduce global poverty. The IMF periodically depends on the World Bank and other international resources to help make this vision a reality. The idea for the organization was formed in 1944 at the Bretton Woods Conference, and the IMF became operational in 1945.

International System of Units (SI)

The International System of Units (SI) is the international standardization for measurement, commonly known as the metric system. The SI is made up of seven base units including length (meter-m), time (second-s), amount of a substance (mole-mole), electric current (ampere-A), temperature (kelvin-K), luminous intensity (candela-cd), and mass (kilogram-kg). The system is used by nearly every country in the world and was officially signed into existence in Paris during 1875.

Internet Assigned Numbers Authority (IANA)

The Internet Assigned Numbers Authority (IANA) is an international body that keeps track of the IP addresses, domain names, Domain Name Systems (DNSs), and protocol parameter identifiers used on the internet. IANA also keeps track of specific numbers, symbols, and different types of media (video, audio, text, etc.) on the internet. The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for upholding many of IANA’s standards for websites in the United States and around the world.

Internet Computer Protocol (ICP)

Internet Computer Protocol (ICP) is the name of the underlying blockchain system of the DFINITY project. ICP is an Ethereum, Polkadot, and Cardano competitor that claims it is capable of running at web speed while possessing the potential to become infinitely scalable and reduce computational costs to a fraction of the current industry standard. The Internet Computer Protocol is designed to host decentralized finance (DeFi) platforms, enterprise IT systems, websites, and other types of internet infrastructure. The ICP consists of a network of sub-blockchains governed by an ownerless master blockchain called the Network Nervous System (NNS).

Internet Corporation for Assigned Names and Numbers (ICANN)

The Internet Corporation for Assigned Names and Numbers (ICANN) is an international body based in the U.S. that is in charge of maintaining many of the internet’s databases and their relationships with names and numbers on websites, often through domain name service (DNS) providers. ICANN is made up of many international partnership organizations and contributors from around the world that help maintain the operational efficiency and integrity of the internet. It is also largely focused on maintaining international policies that help uphold the transparency, utility, privacy, and security of the internet.

Internet Layer

The internet layer is made up of the main data transmitting communication components that allow the internet to operate, such as the Transmission Control Protocol (TCP) and the Internet Protocol (IP). The internet layer, along with the link layer, are the layers that the rest of the internet are built on. While somewhat ambiguous, the internet layer typically attaches to routing systems, telecommunications infrastructure such as electronic circuits, the Ethernet, and networking centers that host and transmit much of the data that makes up the internet.

Internet Meme

A meme is typically an image or short video with added text, often intended for humor, that is widely shared and circulated by internet users through a variety of social media platforms. Within online meme culture, certain popular meme formats are continually changed over time to react to recent news, pop culture, and other global events.

Internet of Things (IoT)

The Internet of Things (IoT) refers to physical objects that are connected to the internet to enable features. IoT devices include appliances, home media systems, and security systems among a rapidly increasing list of other devices. IoT products offer increased functionality, share data, and interact with each other.

Internet Service Provider (ISP)

An internet service provider (ISP) is a term for a company or organization that provides users with internet access. The services they provide range from simple internet access to domain name registration, web hosting, and other more advanced services. ISPs are typically private companies, but in many countries, they can also be nationalized services.

Interoperability

As initially designed, many early blockchains couldn’t communicate with each other. Interoperability is the ability of various blockchain protocols to work and interact with each other (Bitcoin and Ethereum for example). The ability to send crypto (coins, tokens) and data between chains is a primary goal of interoperability systems that will expand the reach and network effects of the blockchains that can interact with each other. Other features that increase interoperability include wrapped cryptocurrencies, Layer-2 solutions and sidechains, and the ability of smart contracts and decentralized applications (dApps) to communicate between chains.

InterPlanetary File System (IPFS)

The InterPlanetary File System (IPFS) is a network for storing files and transferring verifiable data in a peer-to-peer (P2P) manner. Developed by Protocol Labs, the IPFS is complementary to Filecoin, which is a blockchain designed to incentivize persistent data storage. Both protocols, while complementary, can be used separately. Notable crypto projects that utilize IPFS or offer integrations with it include The Sandbox, Rarible, Unstoppable Domains, and the Flow blockchain.

Intrinsic Value

In finance, intrinsic value refers to an estimation of the value of an asset or company that has been calculated through financial modeling. The intrinsic value of an asset is not always the same as its market value.

Inverse Synthetic Cryptocurrencies

Inverse synthetic cryptocurrencies are synthetic assets offered on the Synthetix protocol that inversely track the price of the cryptocurrency they represent, and are represented with an 'i' prefix, as in the case of iBTC. If the price of bitcoin (BTC) increases, the price of iBTC decreases. This type of synthetic crypto product may also be available on other crypto protocols.

Investment Trust

An investment trust, or closed-end trust, is a financial enterprise that pools shareholder funds for investment in certain asset types that make up a diversified larger portfolio. Investment trusts differ from mutual funds or unit trusts because they represent real shares in a company itself, rather than units in each individual stock within the portfolio. The demand for investment trusts is often quite high because of the limited number of shares offered by the company providing the service. Most investment trusts have full control over the portfolio they invest in, which is subject to change through certain legal amendments.

Invisible Internet Project (I2P)

The Invisible Internet Project (I2P) is a distributed, encrypted private network layer that exists on top of the internet. I2P anonymizes user traffic on the network and enables communication resistant to censorship and third-party monitoring. I2P is integrated with the privacy-centric Monero cryptocurrency to optimize anonymity on its network.

IOTA

IOTA is a distributed ledger system that focuses on transactions serving the Internet of Things (IoT). IOTA utilizes Tangle, which uses a Directed Acyclic Graph (DAG) data structure instead of a blockchain-based architecture. Its DAG structure places transaction confirmation on IoT nodes rather than the block-based system of blockchain. IOTA offers zero-fee transactions and claims to have a high transaction throughput.

IP Address

An Internet Protocol (IP) address is a numerical identification that is assigned to all devices connected to a computer network that make use of the internet for online communication. Generally, an IP address has two main purposes: to provide a host or network interface identification tag and also to identify the device’s current location. IP addresses are always calculated algorithmically and allocated to devices by the Internet Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names and Numbers (ICANN).

Isolated Margin Trading (Derivatives Trading)

Isolated margin trading is a form of margin trading that allows the trader to limit their losses to the initial margin set, thus limiting the amount of margin being allocated to each position. Because highly leveraged positions are more likely to be liquidated in volatile markets, traders are able to limit their risk for individual positions by using isolated margin. For example, if a trader’s position is liquidated using isolated margin mode, only the isolated margin balance is liquidated, instead of the entire available account balance. The opposite of isolated margin trading is cross-margin trading.


J

Jager

The smallest denomination of BNB Chain (BNB), divisible to 8 decimal places (1 jager = 0.00000001 BNB).

Java Programming Language

Java is a popular general purpose programming language often utilized for client-server web applications.

Java Virtual Machine (JVM)

A type of virtual machine (VM), the Java Virtual Machine (JVM) converts Java programming language bytecode files into machine code so they can be processed by the operating system (OS). The JVM’s primary functions are to manage program memory and allow Java programs to run on any device or OS. An integral part of Java programs, the JVM works in conjunction with the Java Development Kit (JDK), which is the development platform, and the Java Runtime Environment (JRE), which executes and runs the program.

JavaScript (JS) Programming Language

JavaScript (JS) is a popular programming language that is used to create a variety of web applications.

JavaScript Object Notation (JSON)

JavaScript Object Notation (JSON) is a data interchange format and open standard file format that utilizes human-readable text to transmit and store data.

John Bollinger

John Bollinger is an author, financial analyst, and technical and fundamental analysis expert best known as the creator of the Bollinger Bands technical charting indicator. The Bollinger Bands technical indicator is represented by a high and low line on a chart (used to track an asset’s volatility and whether it is overbought or oversold) with a mid line equally between the two. Bollinger has always been an advocate of the relationship between both technical and fundamental analysis instead of focusing on their differences.


K

Kademlia Routing (Harmony)

Kademlia routing is a routing mechanism used to carry out cross-shard messages in the Harmony blockchain's adaptive state sharding system. Information about all the Harmony network nodes across different shards is stored in a routing table. By using Kademlia-based routing, messages between nodes on different shards travel much faster than normal gossip broadcasting to reach the destination shard. Through this process, the Kademlia routing mechanism significantly reduces the overall network load, resulting in a blockchain that is quite efficient at carrying out cross-shard messaging.

Keep Network (KEEP)

Keep Network provides a privacy layer for public blockchains that enables users and apps to privately transfer and store data in off-chain containers called 'keeps.' KEEP is the network's native token. Participants can earn fees denominated in KEEP for participating in the maintenance of keep containers.

KEEP Token

KEEP is the native token of the Keep Network, a protocol that allows public blockchain users and apps to privately transfer and store data in off-chain containers called 'keeps.' Users can stake KEEP tokens to be randomly selected to earn fees by performing services on the network such as encryption or data storage.

Keosd

Keosd is a key manager daemon used within the EOSIO blockchain system for storing private keys and signing digital messages.

Kernel

The most important part of an operating system (OS), the kernel controls most of the components and functions of a computer, smartphone, or related hardware device. Every OS has a kernel inside it that connects the hardware to the software and processes of the device. The kernel determines how the central processing unit (CPU) operates, monitors and manages storage memory, handles software requests, and handles other key functions and tasks necessary for a device to function optimally and reliably.

Key

A cryptographic key is a string of bits that is used by an encryption algorithm to convert encrypted ciphertext into plaintext and vice versa as part of a paired key access mechanism. Keys are usually randomly generated and, unlike a password, are not intended to be memorized by users.

Key Management Interoperability Protocol (KMIP)

The Key Management Interoperability Protocol (KMIP) facilitates the exchange of data between cryptographic key management servers and clients. It plays a key connective role in the function of crypto wallets and other decentralized products. KMIP was established by the Organization for the Advancement of Structured Information Standards (OASIS), a nonprofit consortium focused on the development and adoption of open, global information-sharing standards.

Keylogger

A keylogger is a software program that copies or records the keystrokes that a user inputs through a keyboard to a mobile device, computer, or related system. Keyloggers are typically employed with the intent of stealing sensitive information such as passwords, pin numbers, or other confidential data — often with the intent of financial gain, or to steal personal information needed to hack into a website, bank account, crypto wallet, computer network, or hardware or software system.

Know Your Customer (KYC)

Know Your Customer (KYC) is the compliance process instituted by regulators for businesses to verify the identity and level of risk of their customers. This process normally requires users to provide official identity verification using a passport, driver’s license, or similar documents. KYC regulation requires financial firms to collect personal data on their customers and ensure the legitimacy of the person or client to whom they may provide services.

Kraken (Cryptocurrency Exchange)

Kraken is a major U.S. crypto exchange founded by CEO Jesse Powell in 2011. It offers derivatives trading, spot trading, and other related services.

Kyber Network (KNC)

The Kyber Network is a blockchain protocol that aggregates token liquidity from across the Ethereum ecosystem and facilitates the exchange of tokens without an intermediary.


L

Lachesis (Fantom)

Lachesis is the consensus mechanism employed by the Fantom blockchain network. Lachesis is an asynchronous Byzantine Fault Tolerant (aBFT) consensus mechanism that uses a leaderless Proof-of-Stake (PoS) structure. It provides speed and security to the Fantom protocol.

LAND (The Sandbox)

In The Sandbox game, LAND is a digital piece of real estate in the metaverse measuring 96x96 meters. LAND is an ERC-721 token. When a player combines multiple LANDS into one property, it is called an Estate.

Large Cap

In the blockchain space, "large cap coin" refers to a cryptocurrency asset that has a large market capitalization. The market capitalization, or total value of a cryptocurrency asset and its underlying blockchain enterprise, is determined by the number of circulating coins that are accessible to the public, multiplied by the price per coin. As a subjective term, there is no specific market cap threshold that signifies that an asset is a large cap coin.

Larva Labs

Larva Labs is the creator of Cryptopunks, a collection of 10,000 unique non-fungible token (NFT) avatars, and Meebits, a collection of 20,000 generated, unique 3D NFT characters.

Last Irreversible Block (LIB)

The last irreversible block (LIB) is the last block to have been validated on-chain and cannot be modified or altered. Found on blockchain protocols that utilize an Asynchronous Byzantine Fault Tolerant (aBFT) consensus mechanism, the block confirmation process is two-fold. First, block producers propose what's called an irreversible block with a record of transactions. Then, if a majority of block producers acknowledge the proposed block, it achieves irreversible status, and the transactions are considered validated.

Last Mile Delivery

Last mile delivery is the final movement of a product from a transportation hub to the final delivery destination. In most instances, this is the most complicated and resource-intensive step of the product’s delivery lifecycle.

Latency

In trading, latency (not to be confused with network latency) refers to the time elapsed between the placement of an order and the execution of that order. High latency presents an undesirable delay between actions, while low latency incurs minimal lag that often amounts to just milliseconds. High latency can significantly and negatively affect trading strategies, particularly for dynamic assets, as market prices may fluctuate in the time elapsed between placement and execution.

Law of Excellerating Returns

The “Law of Accelerating Returns” theory developed by Ray Kurzweil in 1999 states that the technological advancement of the 21st century will be 20,000 times that of the previous century. This theory signifies that technological innovation is accelerating at a rate that is unprecedented in human history. The Law of Accelerating Returns has in many ways changed the public's perception of Moore’s Law which states that the number of transistors in an integrated circuit (IC) doubles every year, representing a doubling in technical innovation.

Law of Supply and Demand

The law of supply and demand is among the most foundational laws of economics used to explain how market economies allocate resources and establish the prices of goods and services. Usually, increased availability of a specific resource means that a lower price will be paid for it. Conversely, if it is difficult to acquire a product or service, its demand will result in an increased price, but if there is a similar product or service that is readily available, its cost will go down. Products and services should ultimately reach a price equilibrium in relation to their supply and demand.

Layer-0 Blockchain

A Layer-0 blockchain is often considered a base layer that Layer-1 blockchains and Layer-2 scaling solutions are integrated with. Though the exact classification of a Layer-0 blockchain can be ambiguous, the main purpose of a Layer-0 is to facilitate the creation of an ecosystem of interoperable blockchain networks that work together simultaneously. As such, Polkadot and Cosmos are often considered Layer-0 blockchains because their networks only serve to facilitate the security, connectivity, and interoperability of blockchains built on top of their respective platforms. Although numerous Layer-1 platforms such as Ethereum, Avalanche, Solana, and others fulfill some of these purposes by connecting many blockchains together, they are not considered Layer-0 networks.

Layer-1 Blockchain

A Layer-1 blockchain is typically a name used to describe a main blockchain network protocol such as Ethereum or Bitcoin. The name Layer 1 comes from its relationship with Layer-2 scaling solutions such as state channels, rollups, nested blockchains, and plasma sidechains. Layer-1 blockchains are simply the main network that a Layer-2 scaling solution attaches to in order to improve the scalability and transaction throughput of the mainchain, or Layer 1. Layer-1 blockchains can also be known as the parent chain or root chain, among other classifications.

Layer-2 Scaling Solution

Layer-2 scaling solutions are protocols that integrate into blockchains like Bitcoin and Ethereum as separate, secondary layers built to increase transaction throughput and reduce transaction costs. These Layer-2 solutions use technologies such as sidechains, state channels, Zero-Knowledge Rollups (zk-Rollups), and a variety of other Layer-2 solutions. Examples of Layer-2 solutions include Lightning Network (for Bitcoin), SKALE Network (for Ethereum), and Arpa Chain (blockchain agnostic).

Leader

On the Solana network, a leader is the transaction validator that adds entries to the blockchain ledger. To ensure equitability and decentralization, a 'leader schedule' determines which validator becomes a leader at a given time.

Leaf Node

Leaf nodes are found at the base layer of a Merkle tree. Leaf nodes represent crypto transactions in the form of transaction hashes — more commonly referred to as transaction IDs (TXIDS).

Leakware or Doxware

Doxware is a type of ransomware that first infects a computer, then threatens to leak sensitive or proprietary information held on the machine unless a ransom is paid.

Leased Proof of Stake (LPoS) (Waves)

Leased Proof of Stake (LPoS) is a modified version of Proof of Stake (PoS) that allows network participants to lease out their stake to validating nodes on the protocol. In return, these nodes share a certain percentage of their earnings with the leaser, allowing users to profit from block-producing nodes without actually having to participate in network validation themselves. Leased Proof of Stake is the consensus method that the Waves platform makes use of. It combines with the Waves-NG protocol to facilitate scalability and transaction throughput.

Ledger

A ledger is a record-keeping system for tracking financial transactions. Blockchains are often referred to as distributed ledgers.

Leg

A leg is one element of a multi-step derivatives trading strategy in which the trader combines several options contracts, futures contracts, or a mixture of the two, in order to profit from arbitrage or a spread, or to hedge a trading position.

Legacy System

A legacy system in computing is defined as an outdated system or technology that is still in use but that badly needs replacement or upgrades in order to remain relevant in the marketplace. In blockchain, legacy systems may be systems that need to be heavily modified to create lasting value and use for many different purposes. The ongoing upgradability of blockchain systems is critical to the widespread adoption and long-term utility of the technology.

Lending Pool

Lending pools are a type of liquidity pool designed to facilitate peer-to-peer (P2P) lending. When borrowing from a lending pool, users must provide ample asset collateralization. For example, if the collateralization ratio to borrow against USD coin (USDC) is 200%, and the user supplies $1,000 USDC, the user would be unable to borrow more than $500 USD. In turn, users who lend their assets are rewarded with a certain percentage of the total amount they lent. Smart contracts automate the lending and borrowing process with different predefined lending rates depending on the assets and protocols involved.

Leverage

In the context of investing, leverage is the use of borrowed money to fund an investment. If a position, individual, or organization is 'highly leveraged,' it means they are utilizing a large percentage of borrowed money. Leverage generally refers to a loan offered through a broker on an exchange that is used to increase the availability of funds for margin trading. It is often used to increase purchasing power for derivatives trading — essentially trading with borrowed funds. While there are potential benefits to using leverage, there is also an increased risk for loss of capital. For example, if a trade is opened with 10x leverage, this means that purchasing power is multiplied by a factor of 10, and that if the price of the asset fluctuates, the investor will lose or gain 10x the normal amount.

Libp2p

Libp2p is a modular network stack of protocols, libraries, and specifications built for peer-to-peer (P2P) applications and systems that allows developers to make use of plug-and-play networking within their distributed applications. The system began as the networking layer for the InterPlanetary File System (IPFS), but later evolved into its own project. It is built to solve problems related to data transport, digital identity, security, routing, content discovery, and other uses. Libp2p has implementations in JavaScript, Go, Rust, Python, and C++.

Library (Software Library)

In computer science, a library is a collection of specialized resources that are utilized by computer programmers for software development. These resources can include documentation, messaging templates, configuration data, and pre-written code among other things.

Light-Client Node

A light client, or light node, is software that connects to full nodes in a blockchain network. Unlike full nodes, light nodes do not keep a full copy of the blockchain, or communicate directly with the blockchain. Instead, light clients rely on full nodes as intermediaries. Most crypto wallets are light clients and can be used to send and receive crypto transactions and to verify account balances, but are less functional than full node variations.

Lightning Network

The Lightning Network is a Layer-2 scaling technology that operates on top of blockchains like Bitcoin. It creates a private, two-way channel between users that enables multiple transactions to take place off the main blockchain. These transactions are subsequently recorded as one single transaction on the main blockchain. This process extrapolated over many transactions reduces network congestion and increases scalability.

Limit Order

A common function on trading interfaces, a limit order only buys or sells an asset at a specific price. Traders typically set a buy limit order at a price lower than the current market price in anticipation of a move towards a more favorable buy-in price. In contrast, a trader usually sets a sell limit order higher than the current market price to receive a better sell price. These orders remain unfilled if the asset price does not reach the price dictated by the limit order. By contrast, market orders are always filled at the current trading price.

Limited Purpose Trust Charter

A limited purpose trust charter is a specialized license issued by a U.S. state government which enables the receiving company to perform a specific set of functions, such as acting as a depositor or safekeeper for specific types of securities. A company which legally operates in accordance with the policies laid out in a limited purpose trust charter is called a "limited purpose trust company."

Linear Processing

Linear processing is a way of processing data in a straight line on a computer infrastructure or a distributed blockchain network. Linear processing typically processes one computation at a time in succession using a single core processor, while parallel processing is able to simultaneously complete multiple computations at the same time to increase transactional throughput and total processing power. This could be compared to having one horse pull your chariot vs. four horses pulling your chariot.

LINK (Chainlink)

LINK is an ERC-677 token that is the native token of Chainlink's decentralized network of oracles. It is used to reward node operators for providing external data to smart contracts. Additionally, smart contract creators can require nodes to deposit LINK as a penalty fee to ensure that they fulfill requests for external information.

Linux

Linux is an operating system which was originally built and designed by Finnish computer scientist Linus Torvalds in 1991. Linux is famous in technological circles because of its robust security, overall speed, efficiency, free distribution, platform compatibility, diverse hardware configurations, and more. As well, Linux has become well known for excelling in multi-user network environments. Linux is based on the Linux Kernel and is designed in a similar manner to Unix. Linux has a very different user interface compared to traditional operating systems like Microsoft Windows and macOS, but can use both.

Linux Foundation

The Linux Foundation is a nonprofit consortium based in San Francisco that is dedicated to facilitating the growth of the Linux operating system (OS) and open-source software development in general. The consortium allows for widespread collaboration and education between members, and hosts numerous events and conferences each year. The Linux Foundation consists of over 1,000 members across the globe, including some of the largest technology companies in the world such as Facebook, Microsoft, and Google.

Liquid Market

A liquid market is a market that possesses strong liquidity. Liquidity refers to the ability to buy or sell an asset at the current market price without affecting it. Orders on liquid markets should execute immediately — or shortly — after an order is placed. Examples of liquid markets would include stock, commodity, and fiat currency trading — as well as most large-cap cryptocurrencies. In general, less liquid markets would include fine art and real estate, which typically don’t have as many participants and can’t be sold without waiting (weeks or more) or altering the asset price.

Liquid Proof of Stake (Tezos)

Liquid Proof of Stake (LPoS) is a consensus mechanism modeled after the concept of liquid democracy. Liquid democracy is a system that allows individuals to both vote directly on issues, or to elect delegates to vote on their behalf. Delegates can also transfer the voting responsibilities given to them to another delegate — a process which is referred to as transitivity. If the individual who delegated their vote does not agree with the way their delegate voted, the individual can rescind their vote and vote directly. In LPoS systems, users stake their tokens to earn the right to participate in the blockchain's consensus process, and participate either directly or via a delegate.

Liquid Staking (Fantom)

Liquid Staking is a feature that allows stakers to mint the sFTM coin on a 1:1 ratio to their staked FTM coins, in order to provide collateral in Fantom Finance, which is a suite of Fantom DeFi apps. This functionality allows users to get more use out of their staked FTM. Collateralized Liquid Staking services through the Fantom network help users participate in Fantom Finance by making use of:

  • fUSD: a Fantom-based stablecoin that’s pegged to the U.S. dollar
  • fSwap: a synthetic asset decentralized trading platform
  • fLend: a liquidity pool from which users can lend or borrow

Liquidation

The term liquidation refers to the process whereby a trader has an open leveraged position – often via a futures contract – that goes against their intended goal, resulting in the loss of the entire initial position. For example, let’s say a trader opens a position to buy $1,000 USD worth of ether (ETH) at a current price of $2,000 per ETH with 10X leverage, betting the price will go up, but the market moves the other way and the price drops below their $1,500 USD/ETH liquidation point — resulting in the complete loss of their initial investment.

Liquidity

In regards to an asset, liquidity refers to the ability to exchange an asset without substantially shifting its price in the process, and the ease with which an asset can be converted to cash. The easier it is to convert the asset to cash, the more liquid the asset. With regard to markets, liquidity refers to the amount of trading activity in a market. The higher the trading volume in the market, the more liquid the market. Liquid markets tend to increase the liquidity of assets.

Liquidity Aggregator

A liquidity aggregator accumulates liquidity from centralized and decentralized sources into one location to increase liquidity, reduce price slippage, and facilitate more efficient trading activity — particularly on decentralized exchanges (DEXs).

Liquidity Mining

In decentralized finance (DeFi), liquidity mining refers to a community-based liquidity incentive mechanism whereby traders provide assets to a specific pool, lock them in, and earn interest in the form of tokens (usually the native token of the platform).

Liquidity Pool

A liquidity pool is a crowdsourced pool of coins or tokens that are locked in a smart contract and used to facilitate trades between those assets on a decentralized exchange (DEX).

Liquidity Premium

A liquidity premium is compensation that is given to investors to encourage investment in assets with poor liquidity. Conversely, a highly liquid asset has high trading volume and is easily converted into cash without affecting the asset's price. For example, long-term bonds may typically have poor liquidity, and therefore usually carry a higher interest rate when compared to more liquid short-term bonds. The higher return on the long-term bond is the liquidity premium given to the investor because it has a higher investment risk. As a rule, the poorer the liquidity of an investment, the higher the liquidity premium.

Liquidity Provider (LP)

In the crypto ecosystem, a liquidity provider (LP) is a user who deposits tokens into a liquidity pool. In return for supplying liquidity, users are typically awarded LP tokens that represent the share of the liquidity pool the user owns. These users are usually incentivized to hold LP tokens to receive a percentage of trading fees and other crypto rewards.

Liquidity Provider (LP) Token

A liquidity provider token (LP token) is a token that is created and awarded to a user that deposits assets into a liquidity pool. LP tokens represent the share of the liquidity pool that the liquidity provider owns and the LP typically receives a percentage of liquidity pool trading fees as a financial incentive. LP tokens can usually be transferred, exchanged, and staked.

Listing

A crypto exchange listing is when an exchange initially offers trading pairs for a specific crypto asset. When an asset is listed on a reputable exchange and given a major trading pair such as bitcoin (BTC) or ether (ETH), it signifies trust in the project and its founders. A major exchange listing usually indicates the newly listed asset possesses sufficient liquidity. Crypto exchange listings are similar to when a traditional company's shares are first listed for trading on a specific stock exchange which similarly signifies that the company is trusted by the exchange.

Litecoin (LTC)

Litecoin (LTC) is a cryptocurrency that was introduced in 2011 by Charlie Lee. Litecoin was created by forking Bitcoin's code and retains many characteristics of Bitcoin, while being optimized for lower cost transactions. It is considered to be the first altcoin, and was the second cryptocurrency to be widely accommodated on digital currency exchanges and accepted in the wider economy.

Liveness

As it relates to concurrent computing, liveness refers to an application's ability to execute in a timely manner, so that a distributed system is able to continually execute computations. This property allows a system to make progress despite the fact that its computational processes may need to take turns to be completed correctly instead of being carried out in a simultaneous manner. The opposite of liveness is idle, meaning that a system is unable to perform computations quick enough for the system to operate optimally.

Livepeer Token (LPT)

Livepeer Token (LPT) is the native token of the Livepeer network. Users who wish to carry out the work of transcoding and distributing videos on the network must hold LPT.

Loan-To-Value (LTV) Ratio

The loan-to-value (LTV) ratio expresses the ratio of a loan to the total value of collateral — usually in the form of a percentage. In other words, the LTV is a balance of the loan when compared to the value of the collateral asset. In traditional finance, lenders assess a borrower’s credit score to determine creditworthiness. In a blockchain context, the borrowing process can be executed algorithmically via a blockchain collateral transfer. This typically removes the need for a credit assessment. The LTV ratio is determined as:

LTV = LA (loan amount) ÷ CA (collateral amount)

Locker Ransomware

Locker Ransomware is a type of ransomware that locks victims out of their devices until a ransom fee is paid.

London Bullion Market Association (LBMA)

The London Bullion Market Association (LBMA) is an international trade association that represents the world's over-the-counter (OTC) gold bullion market. The LBMA has over 150 member firms which trade, refine, produce, buy, sell, store, and transport precious metals.

London Good Delivery

Set by the London Bullion Market Association (LBMA), London Good Delivery is a specification of the required attributes of the gold and silver that is used for settlement in the London Bullion Market. The specification also defines the ways in which gold and silver bars should be weighed, packed, and delivered, while also delineating requirements and standards for approved refineries.

London Stock Exchange Group (LSEG)

The London Stock Exchange Group (LSEG) is one of the world’s largest financial companies and the largest stock exchange service provider in the United Kingdom and Europe. LSEG is made up of several subsidies, major stock exchanges, and related entities in Europe and the United States, which includes acquisitions and mergers with Deutsche Börse, FTSE Russell, and others. The corporation was founded in 2007 and offers products and services to customers around the world in several disciplines including clearing and settlement, infrastructure, data and analytics, custody, and more.

Long Position (Longing)

Going long (also known as "longing") is an investment process whereby an investor purchases a security, derivative, cryptocurrency, or other asset type that they believe will increase in value (especially over the long term), as opposed to shorting where the investor expects the price of a specific asset to drop in value.

Loom (LOOM)

Loom is an Ethereum-based platform that was initially focused on providing scalability for decentralized applications (dApps). It later pivoted to focus on enterprise blockchain applications for industries such as healthcare.

LoRaWAN

LoRaWAN is a Low Power, Wide Area (LPWA) networking protocol that enables Internet of Things (IoT) devices to connect to the internet. LoRaWAN relies on patented LoRa technology, which uses radio frequency to provide long-range connectivity. LoRa stands for long range, and the network serves as a wireless platform for widely distributed IoT devices.

Lovelace

The smallest denomination of cardano (ADA), divisible to 6 decimal places (1 lovelace = 0.000001 ADA).

Low

The low, or lowest price, is one of four main data points used for day trading on the stock market. The other three are called opening price, high, and close — and all four are collectively known as OHLC. The low is generally classified as the lowest price obtained during the last 24-hour trading period since the markets opened. Cryptocurrency markets are open 24 hours a day, every day of the year unlike the traditional stock market, which is closed for trading on weekends.

Low-Level Programming Language

Low-level programming languages are programming languages that have very little abstraction of programming concepts, which means they tend to be more complex and less efficient than high-level programming languages. They are written using a structure similar to machine code or assembly language. They are written similarly to a processor’s instructions and often take much longer to execute when compared to high-level programming systems because of their complexity. Other characteristics of low-level programming languages include memory efficiency, lack of portability (the ability to be used with different computing systems), and higher difficulty for debugging and maintenance.

Lump Sum

A lump sum is an amount of capital that pays an outstanding fee in one installment.


M

Machine Learning (ML)

Machine learning (ML) is a subset of artificial intelligence (AI) and is the study of algorithms which optimize through experience without being programmed to do so. Machine learning algorithms find patterns in large data sets in order to make data-based claims and predictions.

Machine Learning Prediction

A machine learning (ML) prediction is the result of a machine learning algorithm analyzing a historical data set. The ML prediction can then subsequently be applied to new data sets, where it can be used to forecast outcomes like the future price movement of a stock.

Machine to Machine (M2M)

The term machine to machine (M2M) refers to communication between devices that occurs without human input. In the blockchain industry, this frequently relates to automated payments facilitated through smart contracts. Automation eliminates the role of gatekeepers and intermediaries, which significantly reduces costs.

Mainchain

A mainchain is a term used to describe the main, Layer-1 network of a blockchain network protocol such as Bitcoin or Ethereum. The name ‘mainchain’ generally means it is the most powerful blockchain and most important blockchain network within a specific blockchain ecosystem. Generally, other blockchain protocols and decentralized applications are built ‘on top of’ the mainchain. As an example, many of the most prominent decentralized finance (DeFi) projects are constructed to run on top of the Ethereum network's mainchain.

Mainnet

A mainnet (also referred to as a mainchain) is a fully developed and released version of a blockchain network. This stands in contrast with a testnet, which is generally used to perform tests and experiments on a blockchain before a mainnet is released. Testnets are used while a blockchain is live for experimentation and development as to not disrupt the mainchain.

Maker (MKR)

Maker (MKR) is the governance token of MakerDAO, an Ethereum-based protocol that issues the Dai stablecoin and facilitates collateral-backed loans without an intermediary. MKR is a governance token that allows holders to vote on changes to the protocol, like the addition of new collateral assets and protocol updates.

Maker Protocol (MakerDAO)

MakerDAO is the Ethereum-based protocol that issues Dai, a stablecoin that tracks the value of the U.S. dollar. MakerDAO also facilitates collateral-backed loans without an intermediary. The platform is governed by the holders of its native Maker (MKR) tokens.

Malware

Malware refers to any type of 'malicious software,' software that is specifically designed to cause damage to computers and computer systems. Examples of malware include viruses, trojan horses, and ransomware, among others.

Management Information System (MIS)

A Management Information System (MIS) is a computer-based system that leverages both hardware and software components to manage a company or organization's internal and external operations. MISs are used to manage, organize, analyze, and compile information needed to make better overall business decisions with the purpose of obtaining higher levels of business profitability. Management Information Systems utilize manpower, technology, and other means to allow for better short-term and long-term decision-making processes.

Margin Call

A margin call occurs when the value of an investor's margin account — a type of account that lets investors purchase securities with borrowed money — falls below the broker's required minimum amount. Specifically, a margin call is a broker's demand that an investor deposit additional money or securities into the account to restore it to the minimum value or face liquidation.

Margin Trading (Margin)

Margin trading refers to the process of using borrowed funds from a broker or exchange to trade a financial asset through a leveraged position. This leverage can vary widely, from 2 – 150 times your collateral. The higher the leverage used, the higher the margin trading liquidation risk. If a trade goes against a trader (i.e. the wrong direction), it can result in the permanent loss of the entire initial position as the trader’s collateral is liquidated. Margin trading is not recommended for inexperienced traders due to its higher risk profile and potential for large financial losses.

Mark to Market

Mark to market, also known as fair value accounting or marked to market, is an accounting practice that values assets in terms of current market price, as opposed to a static book value.

Market Capitalization (Market Cap)

In the blockchain industry, market capitalization, or market cap, refers to the value of the entire supply of a cryptocurrency or token. Market capitalization is calculated by taking the market price of one coin or token and multiplying it by the total number of coins or tokens in circulation.

Market Depth

Market depth generally refers to a specific market’s adeptness at absorbing large market orders without changing the price of the underlying security. An assessment of market depth takes into consideration the overall number and breadth of open orders, bids, and offers for a specific asset. If the market depth of an asset is deep (with a large amount of liquidity) it means that a very large order is often needed to change the price significantly. Market depth should also be considered the same as liquidity depth.

Market Maker

In finance, a market maker — or liquidity provider — is a company or individual that buys and sells large amounts of assets in order to ensure that the market remains liquid. While not always necessary when organic trading volume is high, many exchanges — both stock and crypto — utilize market makers to ensure liquid markets. Market making gives traders ample trading liquidity, low slippage, and higher trade execution speeds — particularly for larger orders. Market makers “create a market” to earn income, taking a cut of the bid-ask spread of the assets they provide liquidity for.

Market Order

The most common type of trade made by retail investors, a market order is used to purchase or sell an asset at the current market price. Market orders are the fastest and most efficient way to purchase an asset when trading, and are typically filled instantaneously when strong liquidity and trading volume is present. Market orders are placed within an online order book on an exchange trading interface, usually either on a computer or mobile device.

Market Sentiment

Used in financial markets, market sentiment refers to the general attitude of investors and market participants towards overall market conditions (or those of a specific asset) and where they see them moving pricewise. A sustained uptrend with increasing prices typically indicates a bullish market sentiment, while a sustained downtrend with decreasing prices indicates a bearish market sentiment. Normally, the overall market sentiment is derived by compiling multiple data points which could include metrics from fundamental analysis (FA), technical analysis (TA) indicators, and market history price charts of various time frames.

Market Signal

A market signal, also known as a trading signal, is an indication to buy or sell assets that is based on some form of technical or fundamental analysis. Traders can generate market signals using a variety of criteria, such as earnings reports, trade volume analysis, or through myriad technical indicators based on market metrics.

Markets Integrity Committee (MIC)

The Polymarket Markets Integrity Committee (MIC) is a body whose members help ensure the legitimacy, trust, and operational efficiency of the Polymarket platform.

Marlowe Programming Language

Marlowe is a programming language designed for subject matter experts with little to no developing and programming experience. Embedded in Cardano’s Haskell language, it allows for easy to write — and understand — on-chain contracts that are well-suited for financial products and instruments.

Mastercoin

Rebranded as Omni in 2015, Mastercoin was designed to enable the issuance of new currencies, assets, and tokens on top of the Bitcoin blockchain.

Maximum Supply

Maximum supply refers to the maximum number of coins or tokens that will ever exist in the lifetime of a specific crypto asset, such as the maximum number of bitcoin (BTC) or ether (ETH). This classification is analogous to the number of fully diluted shares of an asset that is traded in a traditional stock market. The maximum supply is different than the circulating supply (which represents the number of tokens circulating in the market publicly) and the total supply (which represents the number of tokens that have already been created, minus any burned tokens).

Medium

Launched in 2012, Medium is a blogging platform that hosts articles written by a combination of amateur and professional writers. Medium has an in-house staff of paid writers and also incentivizes independent writers through a compensation program based on reader engagement. While some articles are free, some are behind a paywall and require a paid membership to access them. In the blockchain industry, Medium has become a popular place for blockchain teams to reach their communities, post technical updates, and share project-related news.

Medium of Exchange

A medium of exchange is an asset that is widely accepted in exchange for goods and services. Fiat currency is an example of a medium of exchange today, but historically has included everything from shells to precious metals.

Meebits

Meebits is a collection of 20,000 generated, unique 3D NFT characters created by Larva Labs. Meebits have an accompanying no-fee trading marketplace.

Megabyte (MB)

A megabyte (MB) is a unit of measurement for digital data storage that is made up of 1,000,000 bytes of data. Bytes are the original basic unit of data storage, but have since grown to include many larger measurements including kilobytes (KBs), gigabytes (GBs), and terabytes (TBs) — making use of the International System of Units (SI) measurement scale. MBs are normally used to measure data storage on a computer or computer network, or for external USB storage devices or hard drives, and other related software or hardware.

Membership Service Provider (MSP)

A membership service provider (MSP) is a component within some blockchain networks that is used to manage memberships for different users, or nodes, and their digital identities. MSPs are used to verify, authenticate, and identify different users and give them permission to make use of a blockchain network. MSPs are customized to fulfill specific customer requirements determined by the creator of the network, and also provide interoperability between various membership standards and architectures.

Memecoin

A memecoin is a cryptocurrency or crypto token based on a viral joke or cultural reference. Projects built around memecoins rely heavily on social media hype to attract new users/investors. This means that while certain memecoins may have purported use cases and sound cryptoeconomics, these projects can be strongly hype-driven and often lean heavily on the strength of their marketing efforts and community initiatives to drive adoption.

Memorandum of Understanding (MOU)

A memorandum of understanding (MOU) is a document that outlines an agreement reached between two or more parties. MOUs are not legally binding, but often indicate that the parties will likely sign a binding contract in the future.

Mempool

A mempool is where an unconfirmed transaction waits after being verified by a node and before being included in a block. The mempool makes use of the Replace by Fee (RBF) mechanism, which allows transactions with higher transaction fees to supersede earlier transactions with lower fees paid. When many transactions are pending in the mempool, network traffic becomes more congested and the average confirmation time increases. Network nodes must check to ensure that transactions within the mempool are valid by verifying correct signature schemes, that outputs do not exceed inputs, and that funds have not been double spent.

Merkle Root

A Merkle root is found at the top of a Merkle tree and represents the transaction hashes located at the bottom of its associated Merkle tree. These transaction hashes are then repeatedly hashed in pairs until a singular Merkle root is left. The resulting Merkle root can then be used to validate every transaction hash located in its Merkle tree.

Merkle Tree

A Merkle tree is a data structure composed of data-converting hashes that is utilized by blockchains for the secure verification of information. A Merkle tree summarizes all the transactions in a block by producing a digital fingerprint (i.e., a single hash) of the entire set of transactions.

Mesh Network

A mesh network is a network topology that makes use of a decentralized network architecture characterized by a non-hierarchical, dynamic, and direct connection to a high number of nodes. The intention is for all nodes within the network to cooperate with each other in order to increase the performance of the entire system. Mesh networks are generally autonomous, self-configuring, and self-organizing, encouraging a dynamic distribution of computational workload that can help the network remain stable even if several of the nodes in the system fail. This can in turn result in a more secure and more fault-tolerant network structure with lower operational costs.

Metachain (Elrond Network)

The Metachain operates like a control center for Elrond and is designed to run within its own specialized shard to allow communication with other shards and carry out cross-shard operations within the Elrond Network. The Metachain’s main purpose is not to process transactions, but instead to notarize and finalize shard block headers, store and maintain the network’s validator registry, trigger new epochs, and process various tasks for fishermen.

Metadata

Metadata is a form of data that is made up of other data. For example, the metadata of a file might describe when the file was created and what type of file it is.

MetaMask

MetaMask is an Ethereum-focused blockchain wallet that allows users to connect to decentralized applications (dApps) without running an Ethereum full node. MetaMask is also used to integrate to numerous decentralized exchange (DEX) platforms. Initially available only in a desktop variation, the mobile MetaMask wallet was released in September 2020.

Metaverse

A metaverse is a shared virtual reality world.

Metropolis (October 2017)

Metropolis was an upgrade to the Ethereum network that took place in October of 2017. It succeeded Homestead, and was the final phase of Ethereum before the Serenity phase was initiated in 2020. Metropolis delivered a more full-featured user interface by opening the doors for dApp development and tokenization, which in turn fostered the 2017 ICO boom. Throughout Ethereum’s history, it has been clear that the continued development of an increasingly scalable, secure blockchain network has been a constant goal — as has an open-source, community-based commitment to governance around the proposal and development processes.

Micro Cap

In the blockchain space, "micro cap" refers to a cryptocurrency asset that has an extremely small market capitalization. The market capitalization, or total value of a cryptocurrency asset and its underlying blockchain enterprise, is determined by the number of circulating coins that are accessible to the public, multiplied by the price per coin. As a subjective term, there is no specific market cap threshold that signifies an asset is a micro cap coin.

Micropayment

A micropayment is a transaction, typically online, that involves a small sum of money—sometimes as small as a fraction of a cent.

Microtransaction (MTX)

A microtransaction (often abbreviated as MTX) allows users to purchase goods via micropayments, often in a custom store interface within apps where in-game items are being sold. As examples, Apple's App Store calls them "in-app purchases" and Google refers to them as "in-app billing." While microtransactions are particularly common within the mobile gaming sector, they are also employed in a number of other online environments. Microtransactions are also very similar to micropayments (a term more commonly used outside of the gaming context). Both terms denote small purchases by a customer in an online environment.

Mid Cap

In the blockchain space, "mid cap coin" refers to a cryptocurrency asset that has a medium-sized market capitalization. The market capitalization, or total value of a cryptocurrency asset and its underlying blockchain enterprise, is determined by the number of circulating coins that are accessible to the public, multiplied by the price per coin. As a subjective term, there is no specific market cap threshold that signifies that an asset is a mid cap coin.

Middleware

Middleware is a component of a computer system or network that exists in the middle of the system, often to add to the functionality of the entire platform. Middleware can also be considered the service layer. In a blockchain context, middleware is made up of various systems that help decentralized applications (dApps) expand their utility. In blockchain, examples of middleware include smart contracts, oracles, databases, digital identities, file storage, and various connectivity devices. The service layer is also made up of application programming interfaces (APIs), multi-signature technology, digital assets, blockchain governance systems, and other components.

Mimblewimble

Mimblewimble is a privacy-focused blockchain design first proposed in 2019 by the pseudonymous Tom Elvis Jedusor. Mimblewimble's novel design proposes a way to maintain transaction data privacy while executing transaction verification that does not require network nodes to store the entire history of the blockchain. Grin and Beam are open-source implementations of Mimblewimble tech.

Miner

Miners are an essential component of every Proof-of-Work (PoW) blockchain consensus protocol, and are responsible for validating new transactions and recording them on the blockchain ledger. Miners validate these transactions by solving complex math problems, which results in the minting of new coins while reinforcing the network's security and trustworthiness. In order to incentivize users to allocate processing power to mine new blocks, miners are typically rewarded a fraction of a network's native currency with every successfully mined block.

Minimum Collateralization Ratio (MCR)

The minimum collateralization ratio (MCR) is the minimum ratio of debt to collateral that will not trigger liquidations, which can occur when the price of an asset rises such that the collateral no longer exceeds the set MCR. For example, imagine a user initially deposited $2,000 USD to create an asset worth $1,000 USD (a collateralization ratio of 200%). If the price of the asset then rose above $1.50, the collateralization ratio would decrease below 150% and the position would be liquidated.

Minimum Viable Product (MVP)

A Minimum Viable Product (MVP) is an early version of a product that has enough features such that a company is able to trial the product and collect data on how customers or clients may use it.

Mining

Mining is the process of using computing power to verify and record blockchain transactions. Mining also results in the creation of new coins, which miners earn as a reward for their efforts. Mining is utilized in Proof-of-Work (PoW) blockchains.

Mining Algorithm

A mining algorithm is a component of a Proof-of-Work (PoW) blockchain. A mining algorithm is typically a cryptographic puzzle that requires significant computational power to solve. This secures the network while financially incentivizing the miners that secure it (through mining rewards). Popular blockchain mining algorithms include secure hash algorithms (SHAs) SHA-256 and SHA-3 — as well as Ethash, Scrypt, and Equihash.

Mining as a Service (MaaS)

Mining as a Service (MaaS) is a cloud product that allows you to purchase mining power (or hash rate) from a cloud mining provider, typically measured in megahashes per second (mh/s) and purchased in time intervals, which can vary from a week to several years. Also referred to as cloud mining, MaaS tends to refer to the selling of hash rate from the cloud mining provider’s point of view — as a way to monetize their existing hash rate and mining hardware.

Mining Farm

A mining farm is a physical location, often quite large, that stores many specialized computers that are designed to mine specific cryptocurrencies. The most commonly mined cryptocurrency is bitcoin (BTC), but mining farms for other crypto assets also exist. Mining farms are typically very expensive to launch because of the costs of their exorbitant electricity requirements, the ongoing maintenance of mining rigs, and extensive cooling systems. However, it is becoming more common for forms of renewable energy to power crypto mining farms to combat these inefficiencies.

Mining Pool

A mining pool combines — or “pools” — the hash rate of the crypto miners that join it to mine blocks and distribute the associated block rewards. This is done so miners can have a more reliable rate of return on their mining and allows smaller mining operations to compete with larger mining farms. Mining pools are specific to a blockchain and typically charge a fee of 0 – 2% of all block rewards.

Mining Reward

A mining reward, also referred to as a block reward, are native assets of a network that miners receive for successfully mining blocks of transactions. A mining reward can vary over time. For example, a Bitcoin block reward decreases by 50% every 210,000 blocks.

Mining Rig

A mining rig is a system used to mine cryptocurrency. This rig can either be a device that is specifically designed and built for mining, or a personal computer that is only used to mine cryptocurrency on a part-time basis.

Minting

Minting is a process that is used to create new tokens for a blockchain network. Minting requires no resources and is used to increase the circulating supply. It is often carried out by validator nodes (in systems that contain these types of nodes). Cryptocurrencies that are minted often have no upper supply limit and tend to rely on the constant growth of the project’s economic system in order to remain valuable. Crypto minting is similar to the minting of fiat money within the traditional finance and banking process, in that there is in theory no limit to the amount of money that can be printed, except that the printing must be controlled to prevent excessive inflation/devaluation.

Mirror Asset (mAsset)

Short for “Mirror Assets,” mAssets are synthetic assets issued by the Mirror Protocol that mimic the price behavior of real-world assets from leading enterprises around the world.

Mirror Protocol

Mirror Protocol is a separate blockchain protocol operating on top of the Terra blockchain network. It enables the creation of fungible synthetic assets called mirror assets, or mAssets. mAssets "mirror" the ongoing real-time value of share prices from leading enterprises around the world such as Tesla (mTSLA), Apple (mAAPL), Microsoft (mMSFT) and a host of others. Mirror Protocol makes use of its utility token MIR and can be used to create mirror assets and for numerous other decentralized finance (DeFi) uses within the Terra ecosystem.

Mirror Token (MIR)

Mirror token (MIR) is the native token of the Mirror Protocol. It functions as a governance token, allowing its holders to vote on changes to the protocol. Additionally, MIR is distributed as a reward to users who provide Mirror Asset (mAsset) liquidity on automated market makers (AMMs).

Mixer (Crypto Mixer)

Cryptocurrency mixers (also known as tumblers) provide a custodial mixing service where a user deposits cryptocurrency to be mixed for privacy reasons. Although coin mixing doesn’t guarantee complete privacy, it makes tracing transactions more difficult. These services are sometimes used to launder “dirty coins,” which are garnered through criminal activity. This is done by mixing dirty coins with coins from different wallets, then transferring the “cleaned” coins to another wallet. While cryptocurrency mixers are also used for non-criminal purposes, some countries have cracked down on their use altogether. Service providers typically charge a 1-3% fee for this type of service. These services seem to be waning in popularity as newer, non-custodial options have appeared.

Mobile Wallet

A mobile wallet is a cryptocurrency wallet that is installed on a smartphone. Mobile wallets are typically 'hot' wallets, meaning they are connected to the internet.

Modern Portfolio Theory (MPT)

Modern Portfolio Theory (MPT) is a mathematical framework used to construct a portfolio of assets to maximize the expected return based on a specific level of risk. MPT is considered a formalized extension of investment diversification (owning a wide variety of assets within a portfolio). Its framework states that an asset’s risk and return should not be evaluated on its own, but instead by how it contributes to the entire portfolio’s overall risk and return potential. Renowned economist Harry Markowitz ideated MPT in a 1952 essay that later resulted in him winning the Nobel Memorial Prize in economics.

Moment (NBA Top Shot)

Moments are tradable non-fungible tokens (NFTs) developed for the Dapper Labs NBA Top Shot collectable platform that contain a video clip of a specific game highlight and other relevant information, such as statistics about a specific game and the player featured in the video clip. Each NBA Moment has a unique serial number and a provably fixed total supply cap, and makes use of the Flow blockchain. Moments vary in terms of scarcity and value. As of spring 2021, there are five tiers of Top Shot Moments NFTs including Genesis Ultimate, Platinum Ultimate, Legendary, Rare, and Common.

Monero (XMR)

Monero is a privacy-focused Proof-of-Work blockchain that was created in 2014. Its privacy features include anonymizing transaction amounts and the addresses of transacting parties. Its native asset is XMR.

Monetary Authority of Singapore (MAS)

The Monetary Authority of Singapore (MAS) is the central bank and main financial regulatory authority of Singapore. The MAS is responsible for ensuring the regulatory compliance, stability, and efficiency of Singapore’s economic system pertaining to banking, investment, monetary policy, insurance, securities, and the financial sector in general — as well as for the issuance of the Singapore dollar (SGD).

Monetary Policy

Monetary policy refers to the economic policies a government makes to ensure the sustainable economic growth and macroeconomic prosperity of a nation. Monetary policy is typically carried out by a nation's central bank to control the money supply, interest rates, the ebb and flow of money through a country's economy, and other parameters that shape a country's economy. Monetary policy can also be tied to larger geographical regions like the European Union, which makes use of the European Central Bank (ECB) and other constituents to ensure the long-term economic prosperity of the European Union.

Money Service Business (MSB)

Money service business (MSB) is a legal term used to describe any company that transmits or converts money, cashes checks, carries out foreign currency exchange, facilitates payments and remittance services, and other related services. Larger global MSBs include PayPal, Western Union, MoneyGram, Revolut, and TransferWise, among others. MSBs have strict regulatory and compliance guidelines they must adhere to, including Know Your Customer (KYC) and Anti-Money Laundering (AML) procedures to avoid potential fraud, theft, and misuse of funds by malicious actors. MSBs provide services similar to banks and must hold a valid money transfer license.

Money Transfer License

A money transfer license is a licensing certification that online global payment service providers or money service businesses (MSBs) must obtain through different regional, international, and national regulatory bodies which allow users in various jurisdictions to send and receive different types of fiat currencies. In the United States, the Money Transfer Regulators Association (MTRA) and other important regulatory bodies oversee the legal framework that MSBs must adhere to.

Money Transfer Regulators Association (MTRA)

The Money Transfer Regulators Association (MTRA) is one of the main regulatory bodies that oversees the standards — like strict licensing, Know Your Customer (KYC), and Anti-Money Laundering (AML) guidelines — that Money Service Businesses (MSBs) in the United States must adhere to in order to operate. The MTRA works on an international, national, and state level to provide a transparent system for the exchange of money for users in the United States and around the world, though much of its focus is on the United States.

Moon

When an asset dramatically increases in price during a relatively short period of time, the asset is often said to have mooned. The term is particularly common in cryptocurrency markets, where many crypto assets have displayed volatile behavior, and where some assets have been known to not only dump in price (losing a large percentage of their initial value) but also moon in price (increasing in value substantially within a relatively short period of time).

Moore’s Law

Moore's Law is an assertion made by Gordon Moore in 1965 stating that due to technological advances in microchips, the power and speed of computers would double every two years, along with a correlational decrease in cost.

More Viable Plasma (MoreVP)

More Viable Plasma (MoreVP) is a variation of Plasma, a Layer-2 Ethereum scaling technology introduced by Vitalik Buterin and Joseph Poon. MoreVP bundles transactions together and verifies them off of the blockchain before returning them in a batch to be verified by Ethereum. OMG Foundation utilizes MoreVP.

Motoko Programming Language (DFINITY)

Created by the DFINITY Foundation, the Motoko programming language was designed to build blockchains (subnets), decentralized applications (dApps), and other tools on the Internet Computer (ICP) protocol. While based on the WebAssembly (WASM) programming language, Motoko was designed to be more adaptable, secure, and efficient than the traditional WASM language. Motoko also compiles down to WASM because of its backwards-compatible web versatility and browser functionality. This also allows any language that can compile to WASM the ability to deploy code on the ICP protocol.

Move to Earn (M2E)

Move to earn (M2E) is an adaptation of the web3 gaming concept play to earn (P2E), in which users are rewarded with crypto coins/tokens or other in-game assets in exchange for completing certain physical activities. As is the case with P2E, players completely own their in-game assets and in most cases are free to transfer or exchange their rewards for other crypto and/or fiat currency.

Moving Average (MA)

A moving average (MA) is a specialized method used to measure different data points by producing a series of averages of different data subsets related to the full data set. In a financial context, an MA is a stock indicator that is usually used for technical analysis (TA) to help predict the trends and direction of markets, asset prices, investment returns, and other data types. A moving average has many variations, including the Simple Moving Average (SMA), Cumulative Moving Average (CMA), and Weighted Moving Average (WMA), which are used to measure different types of data in a predetermined format.

Moving Average Convergence Divergence (MACD)

The moving average convergence divergence (MACD) is a trading indicator used in technical analysis that utilizes moving averages to analyze the momentum of an asset.

Mt. Gox

Mt. Gox was a centralized cryptocurrency exchange that lost more than 700,000 bitcoin (BTC) in a 2014 hack. Created by Jed McCaleb in 2010, Mt. Gox was sold to Mark Karpeles in 2011 who operated it from Japan. Mt. Gox filed for bankruptcy and liquidation proceedings after the 2014 hack. Creditors are still awaiting compensation for their lost funds.

Multi-DLT Application (mDapp) (Quant)

Multi-DLT applications (mDapps) are decentralized applications (dApps) that operate via Quant’s interoperable Overledger solution. These mDapps allow for the deployment of applications on many different types of blockchain platforms at the same time, allowing for the extra customizability needed to realize many specific uses. Multi-DLT applications are meant to be simple and easy to create and less technically challenging for software developers to deploy. According to Quant, mDapps are truly interoperable because of their ability to be used on any Distributed Ledger Technology (DLT) system and their ability to be programmed in nearly any programming language.

Multi-Factor Authentication (MFA)

Multi-factor authentication (MFA) — which includes two-factor authentication (2FA) and several other related mechanisms — is an electronic authentication method through which a device user is given access to a website or application only once they successfully present two or more data types (or factors) as an authentication mechanism. MFA often requires a user to further verify their identity after entering an account password (for example, by inputting a randomized code generated through a secondary device or application). The purpose of MFA is to mitigate the possibility of various cybersecurity risks to the authentication process that can stem from hacks or human error.

Multi-Hop Routing

In the context of the Orchid protocol, 'hops' refer to the way data is routed, specifically the encryption and masking of web traffic by a virtual private network (VPN). Multi-hop routing refers to the routing of traffic through multiple VPNs.

Multi-Ledger Token (MLT) (Quant)

Multi-Ledger Tokens (MLTs) are specialized tokens employed by the Quant Overledger interoperability blockchain platform. MLTs are used to create stablecoins that are compatible with different blockchains, as well as supporting the deployment of central bank digital currencies (CBDCs). MLTs are commonly used employed by banks, FinTech enterprises, and various micropayment and marketplace platforms. MLTs are also utilized for cross-border payment services and for trading and investing between consortium blockchain systems. MLTs allow for the transfer of ownership between different enterprises, meaning that transactions are recorded and stored throughout their entire lifecycle, thus creating a cryptographically verifiable source of truth.

Multi-Level Byzantine Fault Tolerance (Theta Network)

Multi-Level Byzantine Fault Tolerance is Theta’s consensus mechanism that utilizes a small subset of nodes to speed up approvals and is therefore faster and more resource-efficient than traditional Proof-of-Work (PoW) networks. The configuration relies on a smaller subset of 10-20 nodes, called the “Validator Committee,” to give the initial approval of a transaction before passing it on to the “Guardian Pool” — a much larger group of nodes responsible for fully validating transactions and adding them to Theta’s blockchain ledger. This design helps achieve a balance between transaction throughput, consistency, and decentralization.

Multi-Signature (Multi-Sig) Wallet

A multi-signature (multi-sig) wallet is a wallet which requires multiple keys to sign a transaction before it can be executed. Non-multi-sig wallets require only one signature to authorize transactions.

Multiplayer Online Battle Arena (MOBA)

Multiplayer online battle arena (MOBA) is a video game genre that is very similar to real time strategy (RTS) gaming. MOBA often involves groups of teams competing against each other in a large battle arena setting with computer-assisted units supporting each side. The goal of competing teams is to protect their terrain and to overthrow their adversaries by eliminating opposing team members and taking possession of their territory. The World of Warcraft franchise is often considered a distinct subset of RTS or MOBA gaming.

Mutant Ape Yacht Club (MAYC)

Mutant Ape Yacht Club (MAYC) is a collection of 20,000 Mutant Ape non-fungible tokens (NFTs). Owners of all 10,000 Bored Ape NFTs were given Mutant Serum, which allowed them to mint a Mutant Ape. The other Mutant Apes were minted during a public sale.

Mutual Fund

A mutual fund is an investment fund that is made up of a large pool of capital collected from many investors in order to invest in a large number of asset types including stocks, bonds, and derivatives instruments. Mutual funds are managed by investment management experts whose job is to allocate the fund’s assets to produce strong investment returns for the fund’s investors. Mutual funds enable individual investors to access a professionally managed portfolio of various assets that allow each shareholder to proportionally contribute to the gains or losses of the entire fund.

Mutual Insurance Company

A mutual insurance company is an insurance company that is entirely owned by its members. The primary objective of a mutual insurance company is to provide coverage for its members, who also play an influential role in company governance.

Mutualized Proof of Stake (MPoS)

Mutualized Proof of Stake (MPoS) is a consensus mechanism that is used by the Qtum blockchain. Unlike Proof of Stake (PoS), MPoS divides each block reward between the block producer and the nine previous block producers. A block's producer receives 10% of the block reward immediately, and the remaining 90% is distributed after waiting for 500 blocks. This is done to disincentivize malicious attacks on the network.

My Story™ (VeChain)

My Story™ is a blockchain-based digital assurance solution created by VeChain and DNV (formerly DNV GL). My Story™ enables consumers to scan a QR code on a product to learn about the product's lifecycle and information related to quality, social, environmental, and ethical issues.


N

Naked Call

A naked, or “uncovered,” call is an options strategy in which an investor sells a call option for a stock or security without actually owning the underlying security. Since the investor is selling the right to something that they do not own, it requires less collateral to sell a naked call than a covered call, in which an investor fully backs the call option with holdings of the underlying asset. As a result, naked call trading strategies are riskier than covered calls, because the investor must have sufficient funds to buy shares of the underlying asset to sell to the counterparty at the agreed on price in the event the counterparty buying the naked call chooses to execute the option agreement.

NASDAQ

NASDAQ, based in New York City, is the second largest stock exchange in the world by market capitalization, second only to the New York Stock Exchange (NYSE). The stock exchange is a global electronic marketplace for buying, selling, and trading securities that was launched in 1971. NASDAQ was created by the National Association of Securities Dealers (NASD) which later became the Financial Industry Regulatory Authority (FINRA). Most of the largest tech stocks in the world, including Amazon, Apple, Google, Tesla, and Facebook are listed on NASDAQ, which makes its influence nearly immeasurable globally.

NASDAQ Composite Index

The NASDAQ Composite Index is a stock index made up of more than 2,500 commodities listed on the NASDAQ stock exchange. Almost half of the index is made of stocks that represent technology enterprises. In order to be listed on the NASDAQ Composite Index, the asset must be a stock from a traditional company, meaning that preferred stocks, exchange-traded funds (ETFs), and most other securities are not included. The NASDAQ 100 (the top 100 non-financial NASDAQ stocks by market capitalization) makes up over 90% of the NASDAQ Composite Index.

National Securities Clearing Corporation (NSCC)

The National Securities Clearing Corporation (NSCC) was established in 1976 as a registered clearing corporation regulated by the U.S. Securities and Exchange Commission (SEC). The NSCC is a subsidiary of the Depository Trust & Clearing Corporation (DTCC), which provides clearing, settlement, and risk management for the U.S. financial industry. The NSCC also provides multilateral netting so that registered brokers can offset buy and sell positions into a single payment obligation to reduce their exposure and financial capital requirements.

National Stock Exchange (NSE)

The National Stock Exchange (NSE) is the largest and most reputable stock exchange in India. Launched in 1992, the NSE became the first stock exchange to offer clients automated electronic trading and various investment products on a country-wide scale. One of the most well-known products that the NSE offers is its NIFTY 50 stock index which was launched in 1996. The NIFTY 50 index allows investors to invest in the 50 largest stocks that make up the vast portion of India’s economy. As of May 2021, the NSE had a market capitalization of approximately $3.1 trillion USD.

Near-Field Communication (NFC)

Near-Field Communication (NFC) is a protocol that enables devices to communicate wirelessly when they are no more than 4cm apart. NFC devices can be used as keycards and to facilitate contactless payments. VeChain utilizes NFC to track products in supply chains.

NEM Foundation

The NEM Foundation was established in Singapore in 2016 to promote the growth of the NEM ecosystem. The foundation markets NEM technology and pursues projects in support of its development.

NEM N1S1

NEM N1S1 is the official name of the original NEM blockchain protocol. In 2021, NEM released Symbol, a new and separate blockchain protocol that builds upon the strengths of the original NEM chain while incorporating new features. The two blockchains are not compatible.

Neo (NEO)

NEO and GAS (not to be confused with the gas fees native to the Ethereum network) are the two native cryptocurrencies of the Neo blockchain protocol. NEO acts as the primary currency for transactions and gives holders the right to vote on network proposals. Users can also earn GAS through staking their NEO. GAS is also used to pay for network usage: transaction fees, storage fees, and fees associated with executing smart contracts. All NEO coins were minted at the establishment of the protocol, and GAS coins are minted with every new block.

Neo File Storage (NeoFS)

NeoFS, or Neo File Storage, is a distributed, decentralized object storage network designed to allow decentralized applications (dApps) to store files in a similar fashion to file storage protocols like Storj and Filecoin. The NeoFS platform allows users to rent out storage in exchange for Neo GAS coins or use GAS to store files on the network.

NeoID

NeoID is NEO's digital identity solution. It allows various assets and node holders to be evaluated through a blockchain-based identification system. This means that Consensus Node ownership can be pegged to real organizations or individuals to ensure their validity. NeoID’s integration helps ensure the validity of network Consensus Nodes and their constituents. NeoID also helps facilitate the registration and usage of compliant financial assets on the NEO network. This functionality has great potential for use with stablecoins, synthetic assets, security tokens, non-fungible tokens (NFTs), and other decentralized finance (DeFi) applications.

Nested Blockchain

A nested blockchain is a decentralized network that utilizes a main blockchain to set parameters for the broader network, while executions are undertaken on an interconnected web of secondary chains. Multiple blockchain levels are built on this mainchain, with these levels using a parent-child connection. The parent chain delegates work to child chains that send it back to the parent after completion. The underlying base blockchain does not take part in network functions unless dispute resolution is necessary. The distribution of work under this model reduces the processing burden on the mainchain to improve scalability.

NET

NET is the amount of network bandwidth a user is allowed to utilize on the EOSIO network. NET is calculated in bytes of transactions, and users must stake EOS coins to use it.

Net Interest Income (NII)

Net interest income (NII) is a financial metric used to measure the difference between revenue generated and interest paid on different types of assets such as securities, loans, mortgages, and other financial instruments. NII is dependent on several factors including the interest rate and whether the interest rate is fixed or variable. Banks and other financial institutions typically utilize the net interest rate to determine the difference between liabilities and interest-bearing assets so they know the income they have generated on a particular investment or loan.

Net Present Value (NPV)

Net present value (NPV) is a measurement of cash flows over a specific time period that is often used to determine profitable budgeting strategies and capital allocations for different investment types. NPV is calculated by comparing variations between cash inflows and cash outflows. NPV takes into consideration the time needed to create money, comparing an initial amount of cash spent to the present value of return. Further, NPV often makes use of four main metrics including time, present value, future value, and discount rate to determine if an investment return is positive or negative.

Network Baseline Model (Filecoin)

The Network Baseline Model is Filecoin's schedule for minting tokens, which is tied to growth in the protocol's storage capacity. While tokens are only minted via block rewards, 70% of rewards are distributed in proportion with the growth of the total storage capacity of the network. The remaining 30% of rewards are distributed according to an exponential decay model, in which block rewards are greatest at the protocol's inception and diminish over time.

Network Congestion

Network congestion occurs when the speed or quality of a network's service is reduced due to an overwhelming volume of transactions. Congestion can occur when a network experiences an unusual spike in activity that surpasses the volume the network was designed to handle, or in the event of certain malicious attacks such as a Distributed Denial-of-Service (DDoS) attack.

Network Effect

A network effect occurs when a network grows from an initial small reach to having an extremely large network, thus increasing the utility of the goods and services it provides. The internet itself is probably the greatest example of a network effect. When the internet was first created it had very few users, but as it grew, its overall power and usefulness increased remarkably. In a blockchain context, blockchain protocols such as Bitcoin and Ethereum have the greatest network effect because of their size, trustworthiness, and the utility they provide to a very large number of users.

Network Latency

Network latency, or network lag, is the time it takes for data to be transferred from its source to its destination. Low network latency (meaning very fast data transmission times) is a critical characteristic of a high-performance blockchain or computer network because the faster the network is able to process data, the more suitable it is for large-scale enterprise use. Network latency has a direct relationship to transaction throughput and the number of transactions per second (TPS) a computer network can perform.

Network Nervous System (NNS) (DFINIITY)

The Network Nervous System (NNS) is an autonomous software system from DFINITY that helps facilitate the capabilities of the Internet Computer Protocol (ICP) by managing its overall economic and network structure. NNS is hosted within the ICP network itself and is an integral part of the system of protocols that securely interweaves the compute capacity of node machines to enable the operation of the Internet Computer in a self-governing and adaptable manner. The Network Nervous System operates as an autonomous “master” blockchain that makes use of a specialized public key to validate all transactions that take place on the Internet Computer Protocol.

Network Pruning

Network pruning is a process whereby developers modify a computer network — in this case specifically a blockchain network — to make it more lightweight and resource efficient. This process is typically carried out by training a complex, over-burdened network to be more efficient, then "pruned down" based on specific criteria, and finally fine-tuned to achieve comparable performance to its original version. Network pruning is generally realized when a blockchain network’s full nodes become pruned nodes or light nodes (which are sometimes called light-clients).

Neuron (DFINITY)

A neuron is a mechanism within the Internet Computer Protocol (ICP) by which network participants can time-lock their ICP utility tokens in exchange for voting power, which can be leveraged to vote on community governance proposals and earn voting rewards. Neurons can also be programmed to follow and copy the voting patterns of other trusted neurons, to automate the voting process. As neurons grow older, their voting power and voting rewards increase. To withdraw deposited ICP tokens, neurons must be "dissolved," at which point the released ICP tokens can be used for other purposes.

New York Department of Financial Services (NYDFS)

The New York Department of Financial Services (NYDFS) is a New York state government department responsible for regulating financial services and product offerings. The NYDFS's purpose is to facilitate the growth and health of the financial industry in New York, spur economic development in a justly regulated and compliant fashion, and ensure the honesty, safety, and soundness of financial products and services in the region. The NYDFS works to ensure that financial products and services are offered in an honest and transparent manner through equitable business practices that eliminate financial fraud, unethical conduct, and other types of criminal behavior.

New York Stock Exchange (NYSE)

The New York Stock Exchange (NYSE) is an American stock exchange. It is the world's largest stock exchange by market capitalization of listed companies.

Nick Szabo

Nick Szabo is a famous and well-respected cryptographer and software engineer who is known for the creation of Bit Gold (a predecessor to Bitcoin) and for the creation and development of smart contracts. Szabo’s initial goal for smart contracts was to bring what he refers to as the “highly evolved" practices of contract law to the design of ecommerce protocols between strangers on the internet. Nick Szabo is also considered by some to be one of the potential individuals that created Bitcoin, but he has denied on several occasions allegations that he is Satoshi Nakomoto.

Nifty Gateway

Nifty Gateway is a platform that provides users with an easy way to buy, exchange, and manage non-fungible tokens (NFTs). The platform offers a broad array of digital art and collectible NFTs, and provides a fiat on-ramp, therefore enabling users to obtain NFTs with fiat as well as cryptocurrencies. Gemini acquired Nifty Gateway in November 2019.

Nightfall Blockchain (Ernst and Young)

Nightfall is a series of blockchain protocols developed by major global accounting firm Ernst and Young (EY), with the latest rendition being Nightfall 3. The Nightfall blockchain is meant to operate as a hybrid network because it makes use of a semi-public architecture and is meant to be employed as a distinct version of the Ethereum network. Nightfall is characterized as being extremely fast and cheap as it is designed to help eliminate Ethereum’s high gas fees. It also allows for state-of-the-art private transactions via Zero-Knowledge Proof (ZKP) cryptography.

Node

In blockchain tech, a node is a computer that is connected to a blockchain network that serves a number of purposes essential to the maintenance of a distributed system. Some nodes validate transactions, while others observe activity on the blockchain. Nodal network structure is also a key aspect of maintaining security on a blockchain network.

Node.js

Node.js is an open-source, cross-platform JavaScript runtime environment that operates on Google Chrome’s V8 JavaScript engine. Node.js is used to execute JavaScript code outside of a web browser and allows developers to use JavaScript to write command line tools for server-side scripting to create dynamic web page content before it is sent to the user’s browser. Node.js allows developers to create a JavaScript-based paradigm for web, blockchain, and application development that unifies an individual programming language instead of using different languages to create frontend and backend scripts.

Nodeos Core (EOSIO)

Nodeos is the core service daemon that runs in the background of every EOSIO node on the EOSIO network. A nodeos can be utilized to validate transactions, process smart contracts, produce and confirm blocks, and to record transactions onto the EOSIO blockchain network protocol.

Nominated Proof of Stake (NPoS)

Nominated Proof of Stake (NPoS) is a variation of the Proof-of-Stake (PoS) consensus mechanism employed by the Polkadot blockchain network's main Relay Chain and Polkadot-based parachains (independent blockchains or specialized shards). Instead of using the traditional PoS methodology, NPoS is used to select validators through Polkadot network nominators. Nominators typically only choose validator nodes they trust but they can lose DOT, Polkadot's native cryptocurrency, if they choose malicious validator nodes through a process called slashing.

Nominator (Polkadot)

A nominator is a node that is used to secure Polkadot’s main Relay Chain by selecting trustworthy validator nodes and staking DOT, Polkadot's native cryptocurrency. In this process nominators algorithmically choose network validators by bonding their DOT assets to produce blocks on the Polkadot network, and in exchange receive a portion of validator node rewards. However, nominators are also susceptible to slashing (losing some of their DOT) if the validator nodes they select behave in a malicious manner.

Non-Custodial

Non-custodial and custodial are classifications that are used to classify the services that a financial institution provides to their customers to manage securities or other assets, including crypto. In the blockchain industry, non-custodial means that the user has full control over their crypto and is required to manage their own private keys (specialized algorithmic passwords needed to generate transactions and manage assets). This typically means that no external entity is responsible for the management, insurance, and transaction of the assets held.

Non-Custodial Wallet

Non-custodial wallets are cryptocurrency wallets that are controlled only by the person who created the wallet, meaning, the creator of the wallet has full control of their private keys (a specialized algorithmic password used to effect crypto transactions).

Non-Deterministic (ND) Wallet

A non-deterministic (ND) wallet is a type of non-custodial cryptocurrency wallet that is made to generate, store, and manage numerous private keys that are independent from each other. Non-deterministic wallets often store their private keys in pairs (because they utilize randomness) and were developed shortly after the Bitcoin blockchain network first went live. The main problem with ND wallets is that their backup keys must be created each time a new wallet is created. This problem was later mitigated by wallets that made use of BIP-32 technology (a deterministic key generator).

Non-Fungibility

Non-fungibility means that a specific asset is distinguishable or unique from another asset that is similar in nature. A non-fungible token (NFT) is a specialized type of cryptographic token that operates within a blockchain platform and is not interchangeable with any related asset. NFT’s are typically indivisible and cannot be divided or altered in any way.

Non-Fungible Token (NFT)

A non-fungible token (NFT) is a special type of cryptographic token that represents a unique digital asset that cannot be exchanged for another type of digital asset. This characteristic is in contrast to cryptocurrencies like bitcoin (BTC) and litecoin (LTC) that are fungible in nature. NFT's are created via smart contract technology and are classified with token standards that vary based on the blockchain protocol they utilize.

Non-Fungible Token (NFT) Collection

A non-fungible token (NFT) collection is a specific group of NFT collectables that are focused on the same topic or interest. NFT collections are typically developed by the same company or artist and offered either in an online NFT marketplace or via a play-to-earn (P2E) metaverse or gaming platform. Well-known collections include CryptoPunks, Artblocks, Cool Cats, and Bored Ape Yacht Club (BAYC).

Non-Fungible Token (NFT) Marketplace

A non-fungible token (NFT) marketplace is an online platform that allows users to buy, sell, and trade various types of NFTs. OpenSea and Rarible were some of the first NFT marketplaces that launched. Other prominent NFT marketplaces include NBA Top Shot, SuperRare, Nifty Gateway, Binance NFT Marketplace, and Coinbase NFT. There is also a growing number of NFT marketplaces that exist in many play-to-earn (P2E) metaverse and gaming projects such as Axie Infinity, The Sandbox, Decentraland, Gala Games, and others.

Non-Leaf Node

Non-leaf nodes are found in the body of a Merkle tree. They are located above the leaf-node layer (which is at the bottom of a Merkle tree) and below the Merkle root (found at the top of a Merkle tree). Through hashing functions, these nodes connect the leaf nodes and the Merkle root of a Merkle tree.

Nonce

A nonce (which stands for "number only used once") is a number that is added to all the data in a block prior to the hashing of that block in the Proof-of-Work mining process.

Noninteractive Distributed Key Generation (NIDKG)

A bespoke cryptography protocol released by the Dfinity Foundation, Noninteractive Distributed Key Generation (NIDKG) uses forward secrecy, Zero-Knowledge Proofs (ZKPs), and other advanced cryptography features to secure the Internet Computer Protocol (ICP). ICP has nodes that migrate between its subnets; the NIDKG protocol allows nodes to securely join new subnets by making it possible to publicly and secretly reshare private keys and acquire their share of the subnet signing key.

Notional Volume

Notional volume is a distinct measurement of trading volume in a particular time frame and is often considered in context with market value, which is the current price of a security that can be purchased or sold through a brokerage or exchange service. As an example, let's say a call option representing 100 shares of a specific stock with a strike price of $30 may actually trade on the market for $1.50 per contract (100 x $1.50 = $150 market value) but its notional value is $3,000 (100 x $30). This is an example of the classification of notional volume.

Numeraire (NMR)

Numeraire is a blockchain-based protocol that is designed to be an algorithmic institutional trading platform. Numeraire utilizes a crowdsourced predictive-trading analysis platform to host weekly trading competitions and is designed to allow users to make better trading and investment decisions. The project’s underlying cryptographic asset NMR contributes to the widescale implementation of the Numeraire blockchain ecosystem.


O

Observers (Elrond Network)

Observers are specialized network nodes that are designed to read and relay interface information. Observer nodes can be classified as Full, meaning they possess the entire history of the blockchain, or Light, meaning they store only the last 2 epochs of the network’s history. It should be noted that Observers are not obligated to stake EGLD coins to participate in the network and are not rewarded for their services.

OceanDAO (Ocean Protocol)

OceanDAO is a community-led grants proposal system that exists as part of the Ocean Protocol platform. As a decentralized autonomous organization (DAO), OceanDAO enables community governance by allowing OCEAN token holders to vote on funding grants for community projects and ongoing ecosystem development. One of OceanDAO's primary objectives is to help the Ocean Protocol ecosystem become fully decentralized over time, a goal the Ocean team has been striving for since the project’s inception.

Odysee

Odysee is a site created by the team behind the LBRY blockchain and its suite of downloadable LBRY apps that allow users to watch and post videos. Odysee is the web browser-based version of the decentralized video streaming LBRY network and was formerly known as lbry.tv.

Off-Chain

Off-chain is a classification that refers to any type of transaction or mechanism (including governance, tokenized asset creation, consensus design, etc.) that occurs outside of a blockchain network protocol. An off-chain mechanism is typically executed outside of the actual blockchain network through other mechanisms that complement on-chain methodologies. For example, voting by a governance council or a steering committee to determine the governance structure of a blockchain ecosystem and its underlying protocol is an off-chain process.

Off-Chain Governance

Off-chain governance is usually a voting mechanism that takes place off a blockchain protocol, typically in a face-to face fashion by several interrelated constituents. This procedure often refers to a means of establishing rules for the on-chain protocol and overall blockchain ecosystem, oftentimes through a voting process that works to determine the overall direction of the project. Off-chain governance also takes into consideration the underlying global blockchain community and several on-chain parameters to realize a stronger overall governance system.

Office of Foreign Asset Control (OFAC)

Part of the U.S. Department of the Treasury, the Office of Foreign Asset Control (OFAC) is responsible for enforcing economic and trade sanctions that are in the interests of U.S. foreign policy and national security. These targets include foreign regimes, terrorists, drug traffickers, and others engaged in illegal activities. The OFAC also has the power to freeze assets, impose fines, and ban entities from operating within the U.S.

Offshore Account

An offshore account is a bank account or related service that is located outside of the account holder’s home country, often to secure favorable regulations as they relate to tax avoidance and asset protection. Offshore banking locations are usually island nations that are used by entities or high-net-worth individuals (HNWIs) to set up companies, investments, and other business types with the goal of saving money on operating costs by paying lower tax rates. Offshore banking and financial service providers, though theoretically legal, can often be used for illicit purposes like money laundering, criminal activity, and tax evasion.

OKEx (Cryptocurrency Exchange)

OKEx is a cryptocurrency exchange that was founded in 2017 by CEO Jay Hao. The China-based exchange offers services to both institutional and retail investors in the form of features such as spot trading, derivatives trading, and staking. OKEx launched its own blockchain, the OKExChain, in the first half of 2021. This chain is built using a modified version of the Cosmos Tendermint consensus mechanism, Cosmos SDK, and the Cosmos Inter-Blockchain Communication (IBC) protocol.

OKEx Chain

OKEx Chain is the proprietary blockchain designed by the OKEx cryptocurrency exchange for building blockchain-based trading architecture. The OKEx Chain is designed to increase the speed, security, and privacy of the decentralized finance (DeFi) framework needed to build a decentralized exchange (DEX) — one that makes use of transparent trading rules and community-based operations that allow users to control their own assets. OKEx Chain employs the Cosmos SDK and the Cosmos Tendermint consensus mechanism, as well as the Cosmos Inter-Blockchain Communication (IBC) protocol to carry out cross-chain asset and data transfers needed to realize full chain-to-chain interoperability.

OMG Foundation

The OMG Foundation (previously known as OMG Network and OmiseGo) is a non-custodial, Layer-2 scaling solution that is built to compliment the Ethereum network by drastically decreasing transaction times and increasing overall network scalability. This is realized by enhancing Ethereum’s ability to send and receive the Ethereum network’s underlying asset (ETH) and Ethereum-based ERC-20 tokenized assets. OMG Foundation makes use of a specialized Layer-2 scaling technology called More Viable Plasma (MoreVP) to make this functionality possible. As well, the OMG Foundation leverages the network’s utility asset (OMG) to drive the blockchain platform and its overall ecosystem.

On-Balance-Volume (OBV) (Technical Indicator)

The On-Balance-Volume (OBV) metric is a technical indicator that analyzes changes in daily trading volume to determine broad market sentiment. This market sentiment can help make price predictions that are generally more actionable than the green or red histograms typically found on price charts.

On-Chain

On-chain is a classification that refers to any type of transaction or mechanism (including protocol governance, tokenized asset creation, consensus design, etc.) that occurs within a blockchain network protocol. An on-chain mechanism is typically executed automatically through the use of cryptographic and algorithmic code underlying a blockchain platform.

On-Chain Data Availability (OCDA)

On-chain data availability (OCDA) is a hybrid approach to data storage that allows users to choose if their data is stored on-chain or off-chain. OCDA was launched as one of the newly developed features with the release of Loopring 3.0. While this feature is off, and data is stored on-chain, the network achieves 2,025 transactions per second (TPS). However, if OCDA is on and data is stored off-chain (by using Validium mode), throughput can reach 16,400 TPS. However, at that speed, network security is that of a consortium blockchain and not always ideal. These dynamic scalability solutions are known as volitions. In short, OCDA and zk-Rollup technology work together to allow Loopring 3.0 to become comparable to non-custodial exchanges by matching their centralized, custodial competitors' performance by facilitating very fast asset exchange and transaction times.

On-Chain Governance

On-chain governance takes place inside a blockchain network protocol. This procedure often refers to a means of establishing rules for the protocol and its ecosystem, typically through the use of automated algorithms. On-chain governance general takes into consideration the global blockchain community by allowing the blockchain’s crypto holders to vote on protocol upgrades, changes, and alterations. Both on-chain and off-chain governance systems work together to improve the blockchain ecosystem (and its underlying protocol) as it matures over time.

One-Time Password (OTP)

A one-time password (OTP) is a special authentication code that is typically used to log into a specific network or service through a mobile device. OTPs are typically time sensitive and only last until the next code is generated (usually every 30 seconds). OTPs are often used through a mobile authentication application such as Google Authenticator, Okta Verify, or Authy. OTPs are more secure than a password and are typically used to supplement them as a security measure.

Ontology Trust Anchor

A Trust Anchor is a qualified third-party trustor which provides authentication services on the Ontology blockchain via a three-tiered mechanism that includes: (1) “verifiers” that verify and make use of trust from the (2) “trustee” which is entrusted by the (3) trustor (or trust anchor). Each of the three types of constituents work together to transparently verify data both cryptographically and algorithmically on Ontology. Trust anchors can be government agencies, universities, banks, third-party authentication service providers, or biometric technology companies, and constitute a portion of Ontology’s multi-faceted trust network — much of which consists of multi-source authentication protocols.

Ontorand Consensus Engine (Ontology)

The Ontology blockchain protocol makes use of the Ontorand Consensus Engine (OCE) consensus mechanism. OCE is an upgraded version of the Delegated Byzantine Fault Tolerance (dBFT) consensus protocol that also makes use of verifiable random function (VRF) and Proof-of-Stake (PoS) technology. OCE is based on Onchain’s Distributed Networks Architecture (DNA) which was designed by the creators of NEO. OCE can theoretically achieve near-infinite scalability and requires a relatively low hashing rate, with block-creation speeds limited only by a user’s internet speed.

Opcode

Opcode is short for operation code and refers to low-level human readable programming instructions. On Ethereum, opcode refers to the 140 unique commands that can be executed by the Ethereum Virtual Machine (EVM), the environment and rule-set in which Ethereum smart contracts and accounts exist. Writing programs in a low-level language like opcode is possible, though much more difficult than using a high-level language like Solidity. Basic examples of opcode commands are ‘PUSH’ and ‘POP’, which respectively add and remove data from the EVM.

Open

The open, or opening price, is one of four main data points used for day trading on the stock market. The other three are called low, high, and close — and all four are collectively known as OHLC. Traditionally, stock market trading was carried out during regular market hours, often only between 9am and 4pm local time, with markets closed on weekends. Cryptocurrency markets are open 24/7, so even though there is theoretically no opening price for crypto assets, the OHLC is still included on most charting platforms to signify the opening time of the regular stock market each day.

Open Finance

Open finance refers to the integration of bank and third-party blockchain-based technological applications that are designed to transform the traditional finance sector. Open finance aims to enable financial institutions, large enterprises, and central banks to conduct their business practices in a more transparent, efficient, automated, and data-driven manner. There are three main parameters that must be implemented to facilitate the creation of a resilient and transparent open finance ecosystem. Firstly, to establish a settlement layer consisting of different stablecoins; second, to onboard enterprises and construct a data layer to help enable the technology; and lastly, to allow financial institutions to create financial products using trusted enterprise data.

Open Representative Voting (Nano)

Open Representative Voting (ORV) is the consensus mechanism of the Nano network. Nano users elect representatives by delegating the balance of their accounts to the representative of their choice. Representatives vote on the validity of transactions, and blocks are confirmed when a quorum is reached.

Open Source

Open source refers to the public availability of computer software source code under a license that the copyright holder grants users the right to use, analyze, modify, and distribute to anyone, at any time, for any purpose. Open-source software is often developed by various software engineers in a collaborative manner, and can be augmented from its original intended application to suit other use cases. Open-source software development frameworks are prominent in the development of blockchain protocols because open source represents the trustless, public, borderless, neutral, open, and censorship-resistant attributes that blockchain systems and cryptocurrencies have become known for.

OpenSea

OpenSea is a popular peer-to-peer marketplace for buying, selling, and auctioning digital non-fungible tokens (NFTs). OpenSea, like many of its competitors, allows users to buy, sell, and discover different types of digital art, ranging from collectible digital versions of Nike basketball shoes, to paintings of famous crypto entrepreneurs like Vitalik Buterin, and anything in between. The OpenSea marketplace, like most NFT marketplaces, accepts payment for NFTs in Ethereum’s coin ether (ETH).

Opera Mainnet (Fantom)

Opera is the Asynchronous Byzantine Fault Tolerant (aBFT)-powered mainnet that makes use of the Fantom Lachesis protocol. Opera is a permissionless and open-source development framework designed specifically for the construction of decentralized applications (dApps) on the Fantom network. The Opera mainnet is made up of a wide range of smart contract capabilities that can interact with the Ethereum network due to both systems' support of the Solidity programming language and integration with the Ethereum Virtual Machine (EVM).

Operating System (OS)

An operating system (OS) is a computer system’s software that is responsible for fulfilling various tasks that allow the device to operate. An OS is responsible for managing computer hardware and software and provides common services for computer programs. Operating systems are responsible for tasks such as memory management, disk management, loading and execution, booting of the device, process management, data security and privacy, external device control, as well as providing a good user interface (UI). The most well-known computer operating systems are Microsoft’s Windows and Apple’s MacOS, alongside mobile phone operating systems like Google’s Android and Apple’s iOS.

Optimism (Ethereum Scalability Stack)

Optimism is an application designed to operate inside of the Ethereum network to increase Ethereum’s scaling and transaction throughput via Optimistic Rollup (OR) technology. ORs are a specialized scaling solution designed to make transactions on the Ethereum network more efficient, faster, and cheaper. Optimism makes use of the Optimistic Virtual Machine (OVM) to facilitate Ethereum Virtual Machine (EVM) integration to allow developers to write scalable smart contracts on Ethereum. Not to be confused with a sidechain, Optimism lives inside the Ethereum network as a series of smart contracts that have the ability to execute Ethereum transactions.

Optimistic Rollup (OR)

An Optimistic Rollup (OR) is a type of Layer-2 scaling solution that runs on top of the Ethereum network. Optimistic Rollups are similar to the Plasma scaling implementations used for Ethereum, but in contrast to Plasma, Optimistic Rollups allow for the operation of an Ethereum Virtual Machine (EVM) compatible Optimistic Virtual Machine (OVM), which enables increased functionalities for Optimistic Rollup technology. The name ‘Optimistic Rollup’ refers to how ‘optimistic’ aggregators tend to run without committing fraud and instead provide proofs in case of fraud, while ‘rollup’ is from the process of implementing transaction bundles that are ‘rolled up’ and that thus allow network transaction speeds to increase exponentially.

Optimistic Virtual Machine (OVM)

The Optimistic Virtual Machine (OVM) is a virtual machine (VM) created by the Optimism blockchain team to help scale Ethereum through Optimistic Rollup (OR) technology. The OVM was designed to make Ethereum transactions faster and cheaper; it also provides a framework for developers to scale smart contracts with its Ethereum Virtual Machine (EVM) Layer-2 compatibility. This technology has been implemented on the Uniswap decentralized exchange (DEX) in partnership with Optimism.

Options Contract

An options contract is a derivatives contract that facilitates an agreement between two parties to carry out a potential transaction for an underlying security at a predetermined price (referred to as the strike price) on or prior to the expiry date of the contract. Options contracts are typically categorized into either a put option or a call option, both of which are bought to speculate on the direction of a stock or stock indices, or sold to generate income. Typically, a call option is purchased as a leveraged bet on the potential appreciation of a stock or index, while a put option is purchased to potentially profit from future price declines.

Options Market

An options market is an investment marketplace for options derivatives contracts which facilitate an agreement between two parties to carry out a potential transaction for an underlying security at a predetermined price on or prior to the expiry date of the contract. Options markets allow investors to bet on the potential direction of an asset, which are categorized as either a put option — a leveraged bet on the potential increase in price of a stock or index — or a call option, with the hope of profiting from future price depreciation.

Oracle

Oracles are third-party information service providers that send external real-world data to a blockchain protocol (often to a smart contract or numerous smart contracts). Oracles give blockchain network protocol’s significantly more power because they are able to exponentially secure, verify, and strengthen the validity of data that a blockchain network receives and makes use of (because blockchains and smart contracts are often closed systems). Oracles can be decentralized and rely on numerous data sets, or centralized and controlled by a single entity. Currently, one of the main uses of blockchain-based oracles is to provide price and data feeds needed for the trustless execution of smart contracts used by financial mechanisms in the DeFi sector.

Oracle Problem

The oracle problem refers to innefficiencies regarding the introduction of external data to isolated blockchain systems. By default, on-chain network protocols are unable to obtain external data. Isolation makes blockchains very secure and reliable, but also makes it difficult to obtain and share outside data used by smart contracts. Data oracles exist to bring reliable, off-chain data to internal, on-chain environments. When a blockchain network is unable to receive this data to allow it to operate correctly, it is known as the oracle problem.

Orchestrator (Livepeer)

On the Livepeer network, an Orchestrator is a user who supplies computing resources to the network, sends video to Transcoders, and ensures that videos are transcoded correctly.

Orchid Blockchain Protocol

Orchid is a peer-to-peer marketplace for virtual private networking (VPN) providers and users that allows any user of the network to purchase bandwidth (off-chain and without gas fees and the congestion of the Ethereum network) from a participating VPN service provider. The Orchid network utilizes a payment mechanism called a probabilistic nanopayment for users to purchase bandwidth by paying in Orchid’s native utility token (OXT).

Order and Execution Management System (OEMS)

Caspian’s Order and Execution Management System (OEMS) is a software platform, exchange aggregator, and suite of tools for advanced trading and portfolio management designed for institutional investors.

Order Book

An order book is an electronic list of buy and sell orders for a specific security, asset, or financial instrument (or in the blockchain industry, a specific cryptocurrency asset) organized by price level. Order books are typically accessed through an exchange service provider's online interface — such as a computer or mobile device — and help traders and investors improve market transparency by providing critical trading and investment data. An order book is composed of the number of shares or financial assets (or tokens) being bought and sold at specific prices in a sequential order (with the green portion of the interface being the buy list, and the red portion, the sell list).

Order Ring (Loopring)

An order ring is a process whereby a ring miner completes an order by using a Loopring smart contract to determine how to best fill the order. If the ring miner can execute the order on either side of the trade, the smart contract will execute an atomic swap — a direct transfer from the smart contract to the user's wallet. Order rings also facilitate ring-matching, which is the process of fulfilling orders by stringing them together. Order rings differentiate the Loopring protocol from other decentralized exchanges like Waves, IDEX, and Bancor. Order sharing is also made possible by order rings. When the Loopring smart contract cannot execute an order in a single trade, order sharing will split orders into partial components until the full original order amount is fulfilled.

Order Slicing

Order slicing is a strategy used by institutional investors with large amounts of capital to make large purchases or trades (generally via an order book and online exchange interface) of a specific asset in smaller, more spaced-out increments. Order slicing is done to prevent huge price fluctuations in the market and to maintain privacy. Order slicing is also used to gain a better overall average entry price, and to protect investment capital.

Organization for the Advancement of Structured Information Standards (OASIS)

The Organization for the Advancement of Structured Information Standards (OASIS) is a multi-partnered international nonprofit body that helps facilitate the standardized development of open-source software, blockchain, Internet of Things (IoT), artificial intelligence (AI), and other related technologies. OASIS works with several hundred technology partners around the world to create a regulatory and compliant framework for global software development and collaboration. OASIS was founded in 1993 and its headquarters are located outside of Boston, Massachusetts.

Orphan Block

An orphan block (generally referred to as a stale block) is a block that has not been accepted within a blockchain network due to the lag time when two blocks are mined simultaneously. Theoretically, a soft fork is created when two blocks are mined at the same time, but this is only a practicality because orphaned blocks typically only create four blocks in a row outside of the main network they originated from. Orphaned blocks are valid and verified blocks that exist in isolation from the initial blockchain and serve no purpose after they are rejected.

oToken (Opyn Protocol)

oTokens represent options contracts and are used to customize automated derivatives strategies by inputting specific variables such as the derivative’s time of expiration, strike price, strike asset, and whether it’s a call or put option. They can then be deposited into token vaults on Ribbon Finance, Curve, SushiSwap, Alpha Finance, and other DeFi protocols integrated with Opyn. This structure can allow users to execute specific investment strategies and earn weekly-compounding yields.

Ouroboros Praos

Heavily researched, peer-reviewed, and security-vetted, Ouroboros Praos is the Proof-of-Stake (PoS) consensus mechanism securing the Cardano blockchain. Currently using staking pools run by node operators, they secure the network by writing blocks to the chain in exchange for newly minted ADA, Cardano’s native cryptocurrency. Its unique design is considered highly scalable, innovative, and a secure way to do PoS consensus.

Over-Optimization

Over-optimization is a process that occurs when traders create a trading algorithm (often using excessive curve-fitting) on a computerized system that looks great in theory, but when it is actually used in a real-time market trading scenario does not perform as desired. This occurs when the algorithmic trading system is too complex for the computer to handle it, resulting in an overloaded computational system.

Over-the-Counter (OTC) Trading

Over-the-counter (OTC) trading is typically a process where an agreement to purchase a specific asset is completed between two parties without the need for a centralized exchange (CEX). OTC desks are usually used to purchase large quantities of an asset in order to improve transparency, save time and fees, and to maintain security of the asset purchased. Usually, OTC trading involves a third-party custody solution. Also, OTC desks often trade assets or securities that are unlisted on regular crypto exchanges, because smaller exchanges do not meet the regulatory requirements to list the specific asset.

Overbought

Overbought is a subjective term that refers to an asset that has recently traded at an increased price relative to its perceived intrinsic or fair value, and may be expected to drop in price in the near term. However, an overbought price condition can last for a substantial amount of time, meaning that an immediate price decrease is not always the result in the short-term. Technical indicators are one of the main methodologies used to identify oversold or overbought assets by using data from many metrics such as relative strength index (RSI), Bollinger Bands, trading volume, and other metrics.

Overledger Network (Quant)

Overledger is the Quant Network's interoperability blockchain platform. The system uses an application programming interface (API) designed for financial services for banks including stablecoin minting, CBDCs, supply chain management, payments and micropayments, marketplace creation, and invoice financing, among others. Overledger also allows developers to create applications on Bitcoin, Ethereum, and Ripple as well as for enterprise uses such as on R3’s Corda, and Hyperledger’s Besu and Fabric platforms.

Oversold

Oversold is a subjective term that refers to an asset that has recently traded at a reduced price relative to its perceived potential for a near-term bounce or price increase. However, an oversold price condition can last for a substantial amount of time, meaning that an immediate price increase is not always the result in the short-term. Technical indicators are one of the main methodologies used to identify oversold or overbought assets by using data from many metrics such as relative strength index (RSI), Bollinger Bands, trading volume, and other metrics.

OXT

OXT is Orchid’s native utility crypto asset that helps facilitate Orchid’s VPN-based blockchain network infrastructure and community. The Orchid network utilizes a payment mechanism called a probabilistic nanopayment for users to purchase bandwidth by paying in OXT. OXT is also used by VPN providers to stake to the Orchid network. Orchid is a peer-to-peer marketplace for virtual private networking (VPN) providers and users that allows any user of the network to purchase bandwidth from a participating VPN service provider.


P

Paper Wallet

A paper wallet is an offline crypto storage method (a piece of paper) that includes a user’s private key, public key, and wallet address. They are used to store and transact cryptocurrencies (when connected to an exchange or blockchain node). Paper wallets were primarily used around the time Bitcoin was first created but are no longer common and have been replaced by more efficient hardware and software wallets. Paper wallets are considered "cold" wallets.

Parachain (Polkadot and Kusama)

Parachains are Polkadot-based independent blockchains that connect to and run off of the Polkadot network’s main Relay Chain Parachains can also be considered shards (with entire blockchains inside them). Parachains run in parallel to the Relay Chan and process transactions through parallelization by using sharding and exhibit extremely fast transaction times. Parachains are able to host their own blockchain-based tokenized assets within their independent network and control their own governance processes by paying to use a parachain slot by attaching to the main Relay Chain. Parachains also run on the Rococo Relay Chain on the Kusama network (both the Polkadot and Kusama networks have the capacity to operate 100 parachains via their corresponding Relay Chain).

Parachain Slot (Polkadot and Kusama)

Parachains are Polkadot-based independent blockchains that connect to and run off of the Polkadot network’s main Relay Chain. Parachains can also be considered shards (with entire blockchains inside them). Parachains run in parallel to the Relay Chan and process transactions through parallelization by using sharding and exhibit extremely fast transaction times. Parachains are able to host their own blockchain-based tokenized assets within their independent network and control their own governance processes by paying to use a parachain slot by attaching to the main Relay Chain.

Parachain Slot Auction (Polkadot and Kusama)

A Parachain Slot Auction is a process that allows potential parachain blockchains to compete with each other in the hopes of securing a parachain slot on the Polkadot Relay Chain or the Kusama Rococo Relay Chain, for lease periods between 6 months and 2 years in length. These lease periods can also be extended for longer via re-election. In order to secure a parachain slot, potential parachains must bond or stake KSM or DOT coins within a validator node on either the Polkadot or Kusama networks. For Polkadot, parachain slot auctions take place on Polkadot’s main Relay Chain, while for Kusama, they take place on the Rococo Relay Chain.

Parallel Augur (ParaAug)

Parallel Augur (ParaAug) is the system that was designed to enable the use of two separate user interfaces (UIs) — two different Augurs — to allow for various DeFi and prediction market use cases on the Augur platform. More specifically, there is one Augur for ETH (AugurETH) and one for DAI (Aug v2). AugurETH is a parallel deployment of Augur v2 that supports trading functions and holds its own order books. The ParaAug infrastructure will also support upcoming deployments of an Augur Automated Market Maker (AugurAMM), Betting Exchange UI, and Layer-2 or off-chain trading.

Parallel Processing or Parallelization

Parallel processing is a way of processing data in a parallel or side-by-side format on a blockchain network (or via other types of computer network infrastructure) in order to execute multiple calculations simultaneously. Parallel processing is often used in sharding and other methods to increase transaction processing times and scalability on a computer network. Parallelization is another name for parallel processing, and is becoming an increasingly dominant paradigm for computer architecture design. Parallelization is often performed using a multi-core processing system that makes use of several core processor units at the same time to increase system performance.

Parent Chain

A parent chain is a classification used to describe the relationship between the mainchain and various subnetworks or sidechains in a blockchain network ecosystem. Parent chains are typically Layer-1 main blockchain networks that are responsible for not only maintaining the consensus of the network, but also for running smaller blockchains on top of them.

Parity Technologies

Parity Technologies is a blockchain development firm that focuses on building distributed computing platforms and applications that are designed to empower the next generation of decentralized services for Non-Governmental Organizations (NGOs), large enterprises, consortiums, governments, start-ups, and more. Parity’s main focus is on creating solutions that make use of cutting-edge cryptography and decentralized consensus architectures that are designed to provide enhanced scalability, security, upgradeability, and interoperability. Parity Technologies is directly affiliated with (and partially owned by) the Web3 Foundation, Polkadot, and Kusama.

Participation Node (Algorand)

Participation Nodes are the most powerful nodes that make up the Algorand blockchain network and are responsible for running Algorand’s Pure Proof of Stake (PPoS) consensus mechanism. Any network participant can participate in the proposing and voting procedure by staking ALGO and generating a valid participation key in order to become a Participation Node. Algorand’s PPoS consensus mechanism utilizes a two-phase block production process consisting of proposing and voting. Participation Nodes are coordinated by another type of Algorand network node — Relay Nodes — which facilitate communication among participation nodes and do not directly participate in proposing and voting.

Passive Yield

Passive yield is any type of income that is generated from an investment; however, this term usually refers to investments that are held on a medium to long-term basis. Specifically in relation to blockchain technology and crypto investing, a passive yield is typically realized when an investor purchases a cryptocurrency with a specific amount of investment capital (for example, by buying ETH or BTC with a fiat currency like the U.S. dollar) and earns interest on that crypto over time.

Passphrase

A passphrase is a specialized type of password which is structured as a specifically ordered sequence of words, which is used to access a particular account, device, or system. Since passphrases are typically composed of individual coherent words rather than an abstract string of letters, numbers, and symbols, they are often easier to remember than random passwords, although passphrases offer a similar — and at times even higher — level of security when properly applied. Within the blockchain industry, passphrases are commonly used as a security mechanism which helps users protect their cryptocurrency assets by mitigating the risk of an account hack and/or unauthorized third-party access.

Password Manager

A password manager is an online program that stores and manages a user's passwords. It can also generate and retrieve complex passwords.

Path Payment

Within the Stellar blockchain’s technical framework, a path payment refers to a payment that is sent in one currency and received in another (for example a payment sent in USD and received in EUR). Path payments are processed via Stellar’s decentralized exchange (DEX), are atomic in nature, and are processed as a single transaction to mitigate the risk of the end user receiving a type of asset that they do no not want. Remember, a path is a specialized type of trade, or chain of trades, that exists on Stellar’s SDEX order book (an order book is a list of buy and sell orders for a particular asset).

Pattern (Technical Formation)

In charting technical analysis (TA), a pattern is a measurement of an asset’s price that acts in a distinctive manner. Technical patterns are as varied as traded assets themselves and make use of various support and resistance levels, trend lines, and technical formations such as flags, triangles, wedges, channels, and more. By studying and identifying patterns, traders use several data points to predict the potential price movements of an asset, with hopes of maximizing profitability. Patterns are also used to identify certain trends for technical indicators that make up a large part of technical analysis.

Pattern Day Trading

A pattern day trader (PDT) is a regulatory classification for a trader who executes more than four margin trades per day during five consecutive business days. The PDT designation places specific limits (to limit excessive risk and detrimental habit-based trading) on trading for a trader and can result in an exchange banning a trader for up to 90 days in order to remain compliant with NYSE (New York Stock Exchange) regulations.

Pax Dollar (USDP)

Formerly known as Paxos standard (PAX), pax dollar (USDP) is an ERC-20 stablecoin that is backed at a 1:1 ratio to the U.S. dollar. Created by Paxos Trust Company — which also issues the Gemini dollar (GUSD) and pax gold (PAXG) stablecoins — every USDP is backed by proven dollar reserves. Parent company Paxos is a Trust Chartered company that adheres to regulations required for financial businesses operating in the United States.

PAX Gold (PAXG)

PAX Gold (PAXG) is an ERC-20 stablecoin created to help investors maintain the benefits of purchasing gold without the drawbacks of the traditional gold investment process. Each PAX Gold asset is pegged on a 1:1 ratio to one troy ounce (t oz) of a 400-ounce London Good Delivery gold bar that is stored in Brinks Security vaults in London. PAX Gold is backed by proven London Bullion Market Association-accredited (LBMA) gold bars and fully redeemable for actual, physical gold.

Payment Rail

A payment rail is a form of digital infrastructure designed to transfer money from one individual or business to another without using a bank account (though payment rails can be linked to a bank account). There are many different types of FinTech-based payment rails, including:

  • Credit cards like Visa or Mastercard
  • Payment service providers such as PayPal or Venmo
  • Blockchain network protocols

The concept references the proximity of the user and the payment being sent or received. The "far side" of the transaction is the “hidden” portion of the transaction, while the “the near side” is made up of whoever is sending the transaction.

Peer to Peer (P2P)

A peer-to-peer (P2P) network structure as it relates to blockchain technology is generally considered decentralized and is designed to operate in the best interest of all parties involved, as opposed to benefitting mainly a single centralized entity. A peer-to-peer blockchain network works by connecting different computers (or nodes) together so they are able to work in unison. This process creates a censorship resistant, open, public computing network that allows important data and other functionalities to be shared across the network.

Peer-to-Peer (P2P) Lending

Peer-to-peer (P2P) lending is a process of lending money (or crypto, and other assets) to an individual or business enterprise (usually without a centralized intermediary) through a decentralized online service provider that matches lenders with borrowers. Peer-to-peer lending service providers typically offer their services in a cheaper and more transparent way with less operational overhead, when compared to a traditional financial institution. This generally results in lenders and borrowers getting better rates and better service overall. Recently, P2P lending has become more commonplace in the blockchain industry with the exponential rise of the DeFi sector.

Peer-to-Peer (P2P) Marketplace

A peer-to-peer (P2P) blockchain-based marketplace is a marketplace that is typically more decentralized and transparent than many of its traditional competitors. Peer-to-peer marketplaces are designed to operate in the best interest of all parties involved, as opposed to mainly benefitting a single centralized entity. A peer-to-peer blockchain marketplace works by connecting buyers and sellers together to create an open, global, computational marketplace that can be used fairly by all parties involved. Many blockchain platforms have built P2P marketplaces that run within their blockchain networks' protocols.

Peer-to-Peer (P2P) Network

A peer-to-peer (P2P) network structure as it relates to blockchain technology is generally considered decentralized and is designed to operate in the best interest of all parties involved, as opposed to mainly benefitting a single centralized entity. A peer-to-peer blockchain network works by connecting different computers (or nodes) together so they are able to work in unison. This process creates a censorship resistant, open, public computing network that allows important data and other functionalities to be shared across the network.

Peer-to-Peer (P2P) Trading

Peer-to-peer trading takes place directly between two or more network participants in a decentralized, low-risk manner; often on a blockchain-based decentralized exchange (DEX) or crypto wallet. This process removes the centralized middleman allowing the users of the platform to pay minimal or zero fees to use the service. At this time, many crypto wallets are developing instant exchange within a single wallet interface that allows a user to switch instantaneously between different types of cryptocurrencies and fiat currencies. However, a lack of liquidity (for both mobile wallets and DEXs), and a small overall user-base are significant barriers for the widespread implementation of this technology.

Peg

Pegs are a mechanism that ties the value of one asset to another at a 1:1 equivalent basis. Pegs primarily exist to facilitate the trading of non-similar assets, which is currently hindered because of the reliance on distinct blockchain protocols. Pegging also allows users to exchange specific assets that are pegged at a 1:1 ratio to their native asset (for example, the BEP-2 Binance Chain version of bitcoin (BTC) is pegged to the original Bitcoin network version of BTC) while potentially benefitting from lower transaction fees and shorter confirmation times.

Peg (Stablecoin)

A peg is a predetermined price used to establish the exchange rate between two assets. Normally, most assets fluctuate with market forces, but stablecoins are pegged to assets like the U.S. dollar to maintain price stability and to safeguard investors against market volatility. Generally, stablecoins are given a hard peg or a soft peg. Different stablecoin types maintain their peg by different mechanisms. These include backing the stablecoin 1:1 with fiat currency reserves, crypto-collateralized stablecoins, supply-modifying stablecoins, and other peg-maintaining designs.

Peg-Zone

A peg-zone is a mechanism employed by the Cosmos ecosystem to allow blockchain protocols — such as Bitcoin and Ethereum — which can lack settlement finality (for example because they employ probabilistic finality), to interoperate with the Cosmos Network. Normally, Cosmos makes use of the Inter-Blockchain Communication protocol (IBC) to interoperate with other chains. However, IBC can only be used correctly if both the starting and destination chains are able to achieve settlement finality. To solve this problem, peg-zones were built to serve as a translator zone or “finality gadget.” Peg-zones generally employ a 2-way peg, meaning that assets can be sent between chains in both directions.

Pension (Individual Retirement Plan)

A pension, individual retirement plan, or individual pension plan, is an amount of money that is recurringly deposited into an individual's account — often via an individual retirement account (IRA) — through their employer, often over many years for their retirement savings. Pension plans vary greatly in nature, but are typically made in the form of regular, equal monthly payments and begin at a specific age (usually 65) after the individual chooses to stop working indefinitely.

Permaweb

The permaweb is a human-readable layer built on top of the Arweave protocol. The permaweb allows you to view the collection of websites and decentralized applications (dApps) hosted by Arweave. The permaweb is intended to be visually similar to the traditional web and can be accessed via traditional web browsers.

Permissioned Ledger (Permissioned Blockchain)

A permissioned ledger or permissioned blockchain is a blockchain system that employs an additional security system that consists of an access control layer that allows only certain parties to make use of the network. This means that accessing the network is often prohibited unless the user possesses a specialized security key or password, meaning that certain tasks can be carried out only by specific network participants with pre-determined access. Because of this structure, permissioned ledgers are very different from public blockchain systems like the Bitcoin and Ethereum networks.

Permissionless Innovation

Permissionless innovation is a classification that references the decentralized nature of blockchain-based network protocols and blockchain technology. Permissionless, as the name suggests, means that the users and developers of the network do not need permission from anyone to transact and use network services. Theoretically, anyone can use a permissionless network without access being granted by a centralized authority. Open public blockchains are generally permissionless in nature, while closed private blockchain systems are permissioned.

Permissionless Ledger (Permissionless Blockchain)

A permissionless ledger or permissionless blockchain is a decentralized network that can be used without obtaining permission from a centralized authority or any other entity. Permissionless ledgers are typically constructed in an open and decentralized manner employing the use of their own cryptocurrency. Permissionless networks operate in a peer-to-peer (P2P) manner and are generally considered open, public, borderless, neutral, censorship-resistant, transparent, and immutable. Permissionless blockchains are the opposite permissioned blockchains whereby users must have special permission to use the network.

Perpetual Swap

A perpetual swap, or a perpetual futures contract, is a derivative trading instrument that allows an investor to buy or sell an asset at an unspecified time period in the future. Perpetual swaps are typically cash-settled with no expiry date when an investor opens a position. When opening a position, payments are sometimes exchanged between holders of both sides of the contract (for both longs and shorts) meaning that the direction and amount of the settlement is based on the difference in the underlying asset and the contract price, and also, if relevant, the difference in leverage between both sides.

PFP

Previously the term PFP simply stood for “profile picture.” However, as non-fungible tokens (NFTs) became more popular, social media users began using their NFTs as their social media avatars. This gave rise to a new class of NFTs, specifically designed for this purpose, that are now referred to as PFPs.

Phishing

A phishing attack is a common computer-based attack method that is used to obtain sensitive information like email addresses, private key addresses, mobile phone numbers, and credit card details from an unknowing victim. Phishing attacks are carried out by malicious third parties posing as trustworthy entities like co-workers or institutions of authority to gain access to accounts. While phishing attacks are a common form of technological crime, they are confidence tricks more than they are hacks.

Physical Bitcoins

Typically physical metal coins (that are designed to look like Bitcoin) that have a private key hidden under a tamper-proof sticker or hologram, physical bitcoins can be purchased pre-loaded with cryptocurrency (or without any). The Casascius Coins were the first popular physical coin that was sold that held bitcoin (BTC). You can purchase other physical coins that support cryptocurrencies like litecoin (LTC) and bitcoin cash (BCH). The physical exchange of these coins is a blockchain transaction because the recipient is now in possession of the hidden private key. Generally, these physical coins are single-use, and once redeemed, cannot be reused.

Plaintext

Plaintext is an information format that refers to unformatted text in a computer environment that can be understood or deciphered by an individual or computer-based software system. In regards to security, plaintext processed over the internet must be equipped with an added layer of security to remain confidential. The process of encryption through the use of an encryption algorithm or cipher converts plaintext into ciphertext, which is encrypted data that is unreadable.

Plasma Chain

A plasma chain is an off-chain, Layer-2 scaling solution. A plasma chain is simply a specific type of non-custodial sidechain through which users may withdraw their funds and revert back to the mainchain in the case of errors or security breaches.

Platform

A blockchain platform usually refers to any type of distributed blockchain network that can be used to develop, create, and run applications or other related technology on top of it. "Platform" is one of many terms that can also be used to refer to a blockchain network protocol in its own right, but often the term refers to a network's capability of hosting other network services that are built and constructed to run as an extension of the network itself.

Platform as a Service (PaaS)

Platform as a Service (PaaS) or Application Platform as a Service (aPaaS) is a specific category of cloud computing infrastructure similar to Software as a Service (SaaS) that allows customers to create, manage, and run a cloud computing platform and host applications. PaaS provides a simple and effective way to launch cloud-based applications without the need for software engineers to develop and launch the applications individually. PaaS cloud computing can be designed for different types of computer network systems, including for use with distributed blockchain cloud computing solutions.

Play To Earn (P2E)

Play to earn (P2E) describes a type of gaming whereby users earn incentivized rewards by participating in ongoing gameplay. Typically, play-to-earn gaming allows players to earn in-game rewards that can be exchanged for other assets with real-world value — such as bitcoin (BTC) and USD. In a blockchain context, P2E gaming allows users to collect non-fungible tokens (NFTs) in the form of new characters and items that allow users to progress through the game quicker and more efficiently, further incentivizing their ongoing participation. Popular P2E platforms include Axie Infinity, The Sandbox, and Illuvium.

Plutus (Cardano)

The Plutus platform is a smart contract development platform designed by IOG and the Cardano blockchain ecosystem. Plutus smart contracts consist of both on-chain computerized code that runs on the blockchain, as well as off-chain or client code that runs on a user’s machine. Plutus smart contracts are written in the programming language Haskell.

Point of Sale (POS)

Point of sale (POS) can refer to the physical or virtual location of a customer’s purchase of an item, or the actual physical point-of-sale device (typically a special handheld or stationary electronic device present in a storefront). POS systems, location, and configuration enable marketers to target customers for new products and service offerings and gain a wealth of information about customers and prospects.

Politeia (Decred)

Politeia is an off-chain, structured governance system implemented by Decred with the goal of fostering an environment of open communication. Politeia is designed to encourage users to share ideas and provide a framework for voting on implementing them.

Polkadot

Polkadot is a decentralized blockchain network protocol designed to allow independent blockchain networks to connect and transfer data between one another through cross-chain interoperable technology. Polkadot was founded by former Ethereum co-founder and Chief Technology Officer (CTO) Dr. Gavin Wood. Polkadot makes use of the GRANDPA (GHOST-based Recursive Ancestor Deriving Prefix Agreement) and BABE (Blind Assignment for Blockchain Extension) mechanisms to form a hybridized Nominated Proof-of-Stake (NPoS) consensus methodology. Polkadot employs DOT as the network’s native asset, which is used to sign, send, and receive transactions, employ governance parameters, and to conduct other processes within the Polkadot blockchain ecosystem.

Polkadot Relay Chain

The Relay Chain is the main protocol and most powerful component of the Polkadot network. It is responsible for maintaining network consensus with the help of the hybrid GRANDPA and BABE Nominated Proof-of-Stake (NPoS) consensus mechanism. The Relay Chain utilizes validators, parachains, collators, fishermen, and nominators to ensure the network works correctly at all times and is used as a main control center to interact with external blockchains through bridges and internal Polkadot-based blockchain protocols (parachains). The Relay Chain also utilizes the DOT asset to allow various nodes in the ecosystem to work correctly and for other uses.

Ponzi Scheme

A Ponzi scheme is a type of fraudulent investment or scam, often characterized by promising dramatically high rates of return and minimal risk to investors. Ponzi schemes generally function by offering profits to earlier investors with funds obtained by later investors. They often seek to make victims believe profits are coming from legitimate business, when in fact the alleged ‘profits’ are funds taken from later investors to create a perception of profitability among earlier investors. A Ponzi scheme and a pyramid scheme are related concepts. Ponzi schemes tend to eventually bottom out when the flood of investment capital from new investors starts to die off.

PoolTogether

PoolTogether is a decentralized open-source blockchain protocol that makes use of “no-loss prize pools.” The system works by allowing users to deposit their crypto into a specific pool and receive prize-redeemable tickets in exchange. If a user has tokens deposited into the liquidity pool, they have a chance to win prizes. PoolTogether built this model to incentive token holders to increase the overall liquidity of the protocol, as well as to allow the developers of the project to passively earn income for lending out users' assets while facilitating the prize redemption model.

Portfolio

An investment portfolio is a collection of potentially diverse financial investments like cryptocurrencies, stocks, commodities, cash, exchange-traded funds (ETFs), and other assets. Traditionally, stocks and bonds are likely to comprise a large portion of an investment portfolio, but the exact allocation of different assets in any given portfolio is subject to individual preference. Diversification, risk tolerance, and time parameters are all crucial factors when assembling and adjusting an investment portfolio. Portfolios can be managed by their owner or by a financial advisor, investment enterprise, or another financial entity.

Portfolio Manager

A portfolio manager is a person or group of people that are responsible for managing investments for a client. Portfolio managers work to mitigate risk, implement investment strategies, and manage day-to-day trading for different types of investments. These can include cryptocurrencies, stocks, bonds, derivatives, and mutual, exchange-traded, or closed-end funds, or any other forms of investments. Portfolio managers often are employed by banks, investment and trading institutions, or other related businesses and work directly or indirectly with their clients.

Position Management System (PMS)

Caspian’s Position Management System (PMS) is an algorithmic portfolio and trading position management system that allows users to manage their trading positions across multiple exchanges and wallets, monitor real-time and historical P&L data, and access other advanced metrics that simplify and improve the trading and investment process.

Position Trading

Position trading is an investment strategy that prioritizes long-term investments in assets. Instead of actively trading daily short-term market fluctuations like a day trader, position traders hold an asset for many months and years and value sustained growth. Amongst cryptocurrency investors, position trading is referred to as holding, or "HODL" in crypto-colloquial terms.

Post-Mine

Post-mining is a practice that creates new coins after the initial launch of a blockchain project, but before public mining is possible. Post-mining often occurs between the crypto supply snapshot date — when coin balances are tallied so newly minted coins (or tokens) can be airdropped or traded on exchanges — but before the platform’s code has been implemented and outsiders are able to mine. The post-mining procedure, like its pre-mining counterpart, has occasionally come under criticism for allowing founding teams to have too much impact on the price of the coin or token in question.

Post-Quantum Cryptography

Post-quantum cryptography, also referred to as quantum-resistant or quantum-proof cryptography, is a specific type of cryptographic computing architecture that utilizes public-key cryptography (PKC) and is characterized by the ability to prevent quantum computing attacks. At this time, most experts in the field believe that existing computing systems are quantum-resistant, however, the potential for quantum computing attacks designed to exploit current computing infrastructure remains a real possibility. For this reason, the ongoing research and development of quantum-proof computing systems remains a high priority for cryptographers and computer scientists across the globe.

Post-Trade

Post-trade is the classification of processes that are carried out after the buying and selling of assets through a stock market, online exchange, or related investment service provider. Post-trade typically involves the clearing and settlement of investment assets, the provision of custodial investment services, and other related processes that allow the value chain to operate optimally. Post-trade services are often quite complex and require market participants to adhere to strict regulatory, compliance, and legal guidelines.

Practical Byzantine Fault Tolerance (pBFT)

Practical Byzantine Fault Tolerance (pBFT) is a consensus mechanism designed to improve upon the Byzantine Fault Tolerant (BFT) consensus mechanism in order to more fully protect against Byzantine faults which occur in distributed networks. Originally created in the early 1990s by Barbara Liskov and Miguel Castro, pBFT is used to maintain consensus on a wide variety of distributed computer systems and blockchain platforms. Designed to work in asynchronous systems and optimized for low overhead, pBFT was designed to solve many of the problems associated with typical Byzantine Fault Tolerant consensus methods.

Pre-Mine

Pre-mining is a practice that creates a specific number of coins for a blockchain project before a public sale occurs, often awarding them to the developers and founders of the project. Pre-mining is similar to selling a stake in a company to existing founders and employees prior to the company going public. Without a pre-mine, a project's first coins usually go to investors who participate in the public Initial Coin Offering (ICO). Pre-mining has sometimes been criticized for allowing founding teams to have too much impact on the price of an asset prior to exchange listings and initial release.

Pre-Mining

Pre-mining refers to the mining of a cryptocurrency asset (by the project’s creators and core software developers) before a project is introduced to the public and its underlying blockchain network protocol goes live for the first time. Pre-mining allows the founders of a project to possess a pre-designated pool of funds, which is often used to ensure the longevity of the project. However, pre-mining can sometimes be seen as a controversial practice because the creators of the project are able to own the assets before a market price is set.

Pre-Sale

A pre-sale is held by some blockchain enterprises after the private sale has been completed, but before the public sale, whereby a specific allocation of coins is sold to prospective investors. This pre-sale is often held to give institutional investors, and smaller investment funds that missed out on the private sale, a chance to contribute. Often family members and close friends of project founders, as well as high-net-worth individuals (HNWIs), are given this early funding round investment opportunity prior to the Initial Coin Offering (ICO) or similar public offering, such as an Initial Exchange Offering (IEO).

Prediction Market

Prediction markets — sometimes called predictive markets, ideas futures, event derivatives, virtual markets, or information markets — are exchange-traded markets created solely to bet on the outcome of specific real-world events coming to fruition. Prediction market prices generally trade between 0 and 100%. Basically, a prediction market is a way for speculators to bet on the resolution they expect for a specific data set, event, or desired outcome in the real world. Prediction markets can also facilitate betting on the outcome of future events through derivatives trading utilizing extremely high leverage, and other complex financial instruments.

Predictive Algorithm

Predictive algorithm analytics is a software-based methodology that uses data mining, machine learning, and predictive modeling technology to analyze the impact of current data on future outcomes. Today, predictive algorithms are used by large corporations like Amazon and Facebook to algorithmically determine the most effective way to increase sales on products and services. Predictive algorithms are also increasingly being used to create more personalized digital experiences and targeted strategies in a growing number of sectors.

Pretexting

Pretexting is a social engineering technique used in cybercrime in which an attacker typically poses as a trusted figure such as a bank official, head of a company, or law enforcement officer through communication channels with the intention of defrauding a victim. By posing as a trusted figure, the attackers manipulate victims into sharing sensitive data or capital, often through digital channels.

Pretty Good Privacy (PGP) Key

Pretty Good Privacy (PGP) is a commonly used encryption method for online communications. Using PGP, a message is converted to unreadable and encrypted text (ciphertext). Only the message recipient has the PGP key, which can convert the message back into readable text (plaintext). Thought to be very secure and private, PGP uses a combination of symmetric and public-key cryptography (PKC).

Price Discovery

Price discovery is the process of determining the accurate price of an asset in the marketplace. This process is often used in the options and futures markets, or when an asset or class is new. When an event takes place that may have an effect on the price of an asset — like a major product release or executive shake-up at a publicly traded company — the short-term price will fluctuate until the event has been factored into the price. The reaction of the market represents the period of price discovery. For investors and traders, this phenomenon typically benefits individuals with more experience, knowledge, and access to changing market data.

Price Movement (Price Action)

Price movement, or price action, is the occurrence of a change in price over time for a specific asset in the market. Price action forms the foundational basis for market trading and charting interfaces.

Price-to-Earnings Ratio (P/E Ratio)

The price-earnings ratio (also known as the P/E ratio, P/E, or PER) is the ratio of a company's share price relative to the company's per-share earnings. The ratio is used to determine the relative value of a company’s shares, and whether the share price is currently overvalued or undervalued. The price-earnings ratio can also be used to compare a company’s current value to its historical value, or to compare different aggregated markets against each other over a period of time. The P/E ratio is a key tool for fundamental analysts determining an asset's intrinsic value.

Primary Market

The primary market is the portion of the capital market that is responsible for the issuance and sale of equity-based securities directly by the issuer for the first time. Primary market stock issuances usually take place through Initial Public Offerings (IPOs), private placements, preferred allotments, and rights issuances. Primary markets are usually the initial source of a new security which is typically sold to enterprises, governments, and other parties to obtain financing through debt-based or equity-based securities. In contrast, the secondary market is usually made up of traditional stock markets such as the New York Stock Exchange (NYSE) or NASDAQ.

Primary Network (Avalanche)

The Primary Network is a special subnetwork (subnet) within the Avalanche blockchain ecosystem. All members of custom subnets — or blockchains that are created on the Avalanche platform — must also be a member of the Primary Network which requires them to stake 2000 AVAX coins. The Primary Network’s main purpose is to validate, secure, and facilitate the different uses of the Exchange Chain (X-Chain), Platform Chain (P-Chain), and Contract Chain (C-Chain) of the Avalanche network — which are three independent networks responsible for different tasks on Avalanche.

Prime Rate

The prime rate (prime) is the interest rate central and often commercial banks charge borrowers with the strongest credit ratings, typically large corporate entities. In the United States, the federal funds rate, the overnight rate banks utilize to lend to each other, is determined by the Federal Reserve. The federal funds rate serves as the basis for the prime rate, while the prime rate serves as the starting point for most retail bank interest rates, including for mortgages, personal loans, and small business loans.

Principal

The term principal can have multiple meanings in the financial industry, but typically refers to the original sum of money borrowed in a loan agreement. For example: If a borrower takes out a $500,000 mortgage, the principal is $500,000. The fee for providing the loan service is often a percentage-based interest calculated atop the remaining principal.

Principal-Agent Dilemma

The principal-agent dilemma is a conflict in priorities found between a person, entity, or group (principal) and a party who has been authorized to act on their behalf (agent). The dilemma is a result of misaligned incentives when an agent is incentivized to act towards their own benefit over the benefit of the principal, or those they are enacted to represent. The principal-agent dilemma is evident throughout business, finance, and markets, and often requires changing a system’s reward structure to balance the priorities of both sides — which is the principal endeavor of incentive alignment.

Privacy Coin

A privacy coin is a cryptocurrency that is mainly designed to help preserve the privacy of its users and its underlying network protocol — usually by concealing identity and transaction data during the exchange of crypto assets. Typically, blockchain networks that are focused on privacy make use of Zero-Knowledge Proofs (ZKPs) or zk-SNARKs — cryptographic proofs used for concealing information in a cryptographically verifiable fashion that is essentially immutable and tamper-proof. Monero, Zcoin, and Zcash are some of the most well-known privacy-focused blockchain systems.

Private Blockchain

A private blockchain system is a distributed network that operates with key differences to an open public blockchain protocol like Ethereum or Bitcoin. Private blockchains are often governed by a single entity and used by large organizations — enterprises and government, for example — that require access management, censorship rights, and privileged privacy models. While private blockchains are built with speed and scalability in mind to serve the needs of the client organization, they are not decentralized or secured by a distributed network.

Private Investment in Public Equity (PIPE)

Private Investment in Public Equity (PIPE) is an investment type that doesn't involve capital allocation in publicly traded companies, opting instead for private company investment. Private equity investing is typically carried out by investment funds that directly buy, sell, and invest in companies that are not publicly traded on a stock exchange. Private equity investing is usually dominated by large institutional investors, pension funds, venture capitalists, and other accredited investors because of their ability to influence the direction of the companies they invest in — and the potential to generate greater returns than with publicly traded companies.

Private Key

Public-key cryptography (asymmetric cryptography) is a specialized cryptographic system that utilizes pairs of lengthy alphanumeric keys that only function when used in tandem. Public keys represent a wallet address that can be distributed to others. Private keys are to be known only by their owner and grant access to funds. The generation of these keys is made possible by the usage of cryptographic algorithms based on mathematical problems to produce a one-way function.

Private Sale

A private sale is generally the first round of funding that is allocated to a blockchain startup prior to the pre-sale and public sale, or Initial Coin Offering (ICO). The purpose of a private sale is to give large institutional investors the opportunity to invest large amounts of capital to fund the development of projects early on. While this practice may be criticized because of its arguably centralized approach, it is often a viable way for startups to acquire the capital they need to realize their ongoing development goals.

Probabilistic Nanopayment

A probabilistic nanopayment is a specialized payment mechanism utilized on the Orchid blockchain platform, a blockchain-based VPN provider. Orchid users purchase network bandwidth by paying rapid-paced microtransactions in Orchid’s native utility token (OXT). Probabilistic nanopayments are used as representative placeholder transactions until OXT payments are consolidated and resolved. Probabilistic nanopayments play a definitive role in Orchid’s internal transaction management system by lowering costs and increasing network speed and transparency.

Procedural Programming Language

A procedural programming language is a language that is used to change the state of a network through a procedure call (a sequence of program instructions within a single unit). Procedural programming languages follow a completely different framework compared to scripting or functional programming languages because they are command-driven with complex semantics (the mathematical meaning of coding in sequences) and are generally compiled through a compiler instead of executed automatically. Examples of procedural programming languages include C, Java, Rust, and others.

Production Version (Stable Release)

The production version of a software release, which is sometimes also called the stable release, is the last release candidate (RC) version that has passed all testing to bring it to the release-to-manufacturing (RTM) phase. The production version may still have some bugs and inefficiencies which need to be addressed and modified prior to the final release to the public. The production version precedes the RTM phase, the general availability (GA) phase, and the golden master build (GM) phase. It is also quite common for the production version to have two distinct versions.

Profit and Loss (P&L)

Profit and loss (P&L) is a macro-level measurement of how much capital has been gained or lost through trading for an individual or institution. P&L is an important datapoint for institutional investment firms. Unrealized P&L represents the amount of profit or loss that a trader has taken since opening a particular position, and is a useful metric for trading derivatives.

Profit and Loss (P&L) Statement

A profit and loss (P&L) statement is a financial statement that summarizes revenue, expenses, and costs for a specific time period. A P&L statement is one of three main financial statements that a company issues on a regular basis (the other two are a balance sheet and cash flow statement). A P&L statement provides data about an enterprise’s ability to generate profit by increasing revenue, reducing costs, analyzing research and development (R&D) expenditures, and other means. A P&L statement is not to be confused with the P&L metric which may be displayed on exchange platforms to evaluate investment performance.

Programmability/Programmable

Programmability is the ability for a computerized system to be created through the process of software development (utilizing various types of programming languages) by writing informatic code to create computer or mobile-based applications, network infrastructure, and even entire blockchain network protocols. By being programmable, a blockchain network allows for the creation and automation of various mechanisms via smart contract technology and other similar methodologies. Often, programmable blockchain networks can offer much lower operational costs, better ease of use, more robust security, and enhanced openness — which can in turn lead to significant savings in time, money, and manpower when compared to other database solutions.

Proof of Access (PoA) (Arweave)

Proof of Acccess (PoA) is the consensus mechanism of the Arweave Protocol. In order to mine or verify a new block, miners must provide cryptographic proof that they have access to a recall block, which is a block from earlier in the blockweave’s history. For this reason, Arweave’s consensus algorithm is called Proof of Access, and is a variation of a Proof-of-Work (PoW) algorithm. PoA is intended to incentivize long-term data storage because miners must access older, random blocks from the blockweave’s history in order to mine new blocks and receive mining rewards.

Proof of Authority (PoA)

Proof of Authority (PoA) is a consensus mechanism utilized by many blockchain networks. PoA was originally created by Gavin Wood, co-founder of Ethereum and former Chief Technology Officer (CTO) of Ethereum. PoA is a consensus mechanism that leverages the value of identity and reputation instead of cryptographic assets or computational power. PoA relies on a limited number of nodes to verify transactions, and is often criticized for being too centralized. This trade-off is offset by remarkable scalability and transaction speeds.

Proof of Burn (PoB)

Through the Proof-of-Burn (PoB) consensus mechanism, miners intentionally destroy or “burn” tokens/coins to obtain a proportional right to mine new blocks and verify transactions. The more crypto a miner burns, the higher the chance that miner will be selected as the next block validator. By demonstrating their dedication to the network via intentional token/coin destruction rather than expending computational resources via powerful mining hardware, miners within a PoB setup are able to operate using far less energy than classic Proof-of-Work (PoW) systems. The PoB consensus mechanism is utilized by Counterparty, Slimcoin, Factom and several other blockchains.

Proof of Capacity (PoC)

Proof of Capacity (PoC) is a consensus mechanism that uses a miner’s available hard drive space to decide its mining rights and ability to validate transactions. Through the PoC mechanism, a list of possible cryptographic mining solutions is stored in the mining device’s hard drive even before the mining activity begins, with larger hard drives being capable of storing more potential solution values. PoC was designed to mitigate the energy inefficiencies and computation requirements of classic Proof-of-Work (PoW) mechanisms as well as the crypto-hoarding that can sometimes arise in various Proof-of-Stake (PoS) configurations.

Proof of Contribution (PoC/PoCo)

Proof of Contribution (PoC) is a consensus mechanism that is based on user contributions to the network. This process works by using specialized algorithms that monitor contributions of all the network’s nodes during each consensus round. The node that has the highest contribution value in each round is given the right to generate the next block. Proof of Contribution is considered to be a quite decentralized consensus model. Proponents maintain that it is extremely resistant to hard forks and can enhance the security and transparency of networks that implement it.

Proof of Coverage (PoC)

Proof of Coverage (PoC) is a consensus mechanism employed by the Helium Network. As a variation of Proof of Work (PoW), PoC relies on mining to achieve network consensus. However, miners on the Helium Network — known as Hotspots — double as wireless internet access points for Internet of Things (IoT) devices. As such, PoC incorporates nuanced mechanisms to track the participation of nodes — or Hotspots — and their continued provision of services.

Proof of Goods and Services Delivered

In Crypto.com blockchain network architecture, Proof of Goods and Services Delivered is a status that is cryptographically verified to prove that a payment was sent and received correctly between its Visa card and mobile wallet products into merchant accounts. This mechanism is used by payment merchants and customers to confirm the legitimacy of the payment process and ensure transparency.

Proof of History (PoH)

Proof of History (PoH) is a consensus methodology on the Solana blockchain that incorporates the measurement of time into a blockchain ledger with the intent of scaling and streamlining transactional throughput. While most blockchains operate without a timestamp, PoH functions like a decentralized clock that enables nodes on the Solana network to process transactions without devoting processing power to solving for discrepancies in minuscule differentiations in time and order.

Proof of Importance (PoI)

Proof of Importance is an innovative consensus algorithm developed by the NEM blockchain protocol and is a variation of Proof of Stake. The system allows a wide pool of users to participate in the addition of new blocks in exchange for receiving tokenized rewards. The rewards are determined in proportion to a score that quantifies the user's contribution to the network. Additionally, PoI encourages healthy activity of the ecosystem by preventing users from hoarding the XEM asset.

Proof of Replication (PoRep)

Proof of Replication (PoRep) is one of the consensus mechanisms used by the Filecoin network. Specifically, it is a process through which a storage miner proves to the blockchain protocol that it has created a distinct copy of a specific piece of data on the network’s behalf. This process is verified by the network through zk-SNARK cryptographic proof technology.

Proof of Service (Holochain)

Proof of Service is a relatively rare consensus mechanism that is used on certain blockchain protocols such as Holochain. In the case of Holochain, Proof of Service does not function like a traditional blockchain consensus mechanism, because the distributed hash table (DHT) plays the primary role in achieving network consensus. In this scenario, the Proof-of-Service protocol is merely designed to ensure that once a peer-to-peer transaction is completed, then the agent providing the service automatically issues an invoice and receives payment.

Proof of Service (PoSe)

The DASH blockchain features a masternode system referred to as Proof of Service (PoSe) on account of the critical services that masternodes provide to the DASH network. Proof of Service is the mechanism on the DASH blockchain network used to determine if a stake-bearing masternode is providing the correct services in good faith to users who have contributed coins to it.

Proof of Spacetime (PoSpacetime)

Proof of Spacetime (PoSpacetime) is a consensus mechanism utilized by the Filecoin network. It allows the blockchain to prove its capacity, and in doing so, it can cryptographically verify that the entire file is being stored in an unaltered fashion for an agreed-upon time frame. Proof of Spacetime is made up of two distinct subsets: 1.) Window Proof of Spacetime (WindowPoSpacetime) and 2.) Winning Proof of Spacetime (WinningPoSpacetime).

Proof of Stake (PoS)

Proof of Stake (PoS) is emerging as one of the most widely used blockchain consensus mechanisms in existence. PoS networks incentivize participants to stake native coins in a network of validator nodes. Upon the close of a transaction block, validator nodes are eligible to be randomly chosen to validate block data, thus generating the subsequent block, and earning native coins as a reward. A robust nodal network offers increased network security, resiliency, and computational power. Proof-of-Stake systems also generally enable validator nodes to contribute democratically in decentralized platform governance through voting on key updates and decisions. While still a recent innovation, PoS networks are already proving they can be faster and more scalable than Proof-of-Work (PoW) blockchains, in addition to being more energy efficient.

Proof of Storage (PoStorage)

Proof of Storage (PoStorage) is a consensus algorithm used by the Filecoin network to prove that network participants are indeed providing the specified amount of storage that they claim to be. This storage space is verified by the network through zk-SNARK cryptographic proof technology.

Proof of Validation (PoV)

Proof of Validation (PoV) is a unique Proof-of-Stake consensus mechanism that works to achieve consensus by evaluating the stake of validator nodes. Typically, each node within the system keeps a copy of the sequence of transactions in blocks that are integrated into the blockchain as well as a copy of user accounts that are identifiable by a specific user’s public key or address. Accounts within the protocol bond or hold coins inside validator nodes. The number of coins bonded with the validator is proportional to the number of votes that a specific validator possesses, and can only be reduced when the coins are unlocked at a later date.

Proof of Work (PoW)

Proof of Work (PoW) is a blockchain consensus mechanism first popularized by the Bitcoin blockchain. Proof-of-Work systems rely on a mining process to maintain the network. Miners utilize electricity and computer hardware and compete to solve the complex cryptographic puzzles required to confirm transacted network data, and are rewarded with the network's underlying cryptographic coin for doing so. Proof-of-Work blockchain systems are more decentralized and secure than most networks, but typically struggle to achieve the network scalability needed for global adoption. Proof of Work is also criticized for its high energy intensivity.

Prospectus

A prospectus, as it relates to finance, is a formal disclosure document that describes an investment offering to potential buyers. It typically provides investors with details about a specific stock, mutual fund, bond, or another type of investment describing the company’s business model, financial statements, a list of material properties, and other important information. A prospectus is generally distributed by underwriters and brokerages to potential buyers who may purchase a security through an Initial Public Offering (IPO).

Protobuf

Protocol Buffers, or Protobuf, is a Google-based methodology developed for serializing structured data. The system allows interface description language to describe the structure of different data types. This ensures that different distributed database networks — such as blockchain systems — are able to incorporate the use of more software programming languages to be more adaptable as their capabilities expand.

Protocol

Blockchain protocol is a term that refers to a particular blockchain platform or blockchain network, such as the Bitcoin protocol. A protocol can also refer to a set of rules that define interactions on a blockchain network that involve consensus, network participation, and transaction validation.

Protocol Layer

The protocol layer is made up of the underlying blockchain consensus mechanism and nodes which make up the foundation of the entire blockchain. This layer can also include different types of external Layer-2 blockchain systems such as sidechains, as well as virtual machines. More commonly, the protocol layer refers to the underlying architecture that all Layer-1 blockchain networks are made up of. The protocol layer is composed of addresses that identify specific nodes, error reporting, interface identification systems, network synchronization and state changes, and the sending, receiving, and processing of network transactions.

Provenance

Provenance is the historical record of ownership of any tangible or intangible asset. Open public blockchain systems employ an optimal structure for tracking the provenance of assets because of their permissionless, immutable, and censorship-resistant features.

Pseudo-Anonymity (Pseudonymity)

Pseudo-anonymity is a classification used to denote a user in the blockchain space that has no visible identifier or information that can be directly linked to their real identity. The difference between anonymity and pseudonymity is that someone who is anonymous cannot be identified at all while a person that is pseudonymous uses a false name to conceal their true identity.

Public Address

A public address is a shortened version of a user’s public cryptographic key. Public addresses are used to receive transactions through a blockchain network protocol and are commonly used in place of a public key.

Public Blockchain

A public blockchain is a decentralized system that is designed for public use and is permissionless, meaning that it is possible for anyone to join, make use of, or contribute to network development. Public blockchain protocols employ cryptocurrencies, and are generally considered to encourage censorship resistance. These blockchains are designed to be borderless, open, neutral, and easily accesible. Public blockchain systems stand in contrast to private blockchain networks that are centralized and closed. Private blockchain network participants typically need special access or permissions to use the platform.

Public Key

A public key allows you to receive cryptocurrency transactions. It’s a cryptographic code that’s paired to a private key. While anyone can send transactions to a public key, you need the private key to “unlock” them and prove that you are the owner of the cryptocurrency received in the transaction. You can therefore share this key with the public, while your private key should be kept a secret. The public key that can receive transactions is usually an address, which is simply a shortened form of your public key.

Public Ledger

A public ledger refers to a shared database upon which transactions and associated details are recorded in multiple places simultaneously to facilitate the exchange of specific information and other data. In the blockchain space, a public ledger is generally a permissionless, decentralized protocol maintained by a network of nodes lacking a central authority. The name ‘public ledger’ comes from an old record-keeping system that was often used to record public information like agricultural commodity prices, news, and analysis.

Public Representative Node (P-Rep) (ICON Network)

A Public Representative Node (P-Rep) is the most powerful node that exists within the ICON Network. P-Reps are responsible for network validation and the creation of blocks and other important processes. There are 100 P-Reps that are responsible for the governance of the ICON Network (with 22 main P-Reps and 78 secondary P-Reps). P-Rep standings are always changing and are determined by the voting power of staked ICX by global ICON Network community members (known as ICONists).

Public Sale

A public sale, or Initial Coin Offering (ICO), is typically the third and final funding round that a blockchain startup offers after the private sale and pre-sale rounds. Public sales are generally open to retail investors, large investors, and the general public with the only prerequisite to participation being registration and the provision of valid Know-Your-Customer (KYC) identification. ICOs gained widespread popularity in 2017 — corresponding with the 2017 crypto bull market — and while they still exist, ICOs have more recently evolved into other funding models including Initial Exchange Offerings (IEOs) and Initial DEX Offerings (IDO).

Public-Key Cryptography (PKC)

Public-key cryptography (PKC) is a cryptographic system that utilizes alphanumeric keys that work together in a pair: public keys, which can be distributed to others, and private keys, which are known only by their owner. Public keys are used to receive cryptocurrencies on the blockchain. They are also used to send cryptocurrencies in conjunction with the use of the public key's corresponding private key. The generation of these keys is made possible through cryptographic algorithms that produce one-way functions. Public-key cryptography is also known as asymmetric cryptography.

Public-Key Infrastructure

Public-key infrastructure (PKI) is a set of policies, procedures, and hardware-software combinations needed to authenticate users and devices online. In practice, this involves one or more trusted parties digitally signing a digital document or decentralized ledger in order to certify that a particular cryptographic key belongs to a particular user or device. PKIs play a pivotal role in creating, managing, distributing, using, and storing digital certificates, and managing public-key encryption.

Pump and Dump (P&D)

A pump and dump occurs when a trader or investment firm buys a large amount of an asset — sometimes illegally — and later promotes, or “pumps” up the underlying asset with misleading information to encourage unsuspecting investors to buy in to increase its value. Shortly afterwards, they “dump” (sell) the asset at a higher price, which often results in losses to subsequent investors. In crypto markets, this often occurs when a whale buys a large quantity of a specific crypto asset that pumps the price. This tends to bring other investors which pump the price further and allows the whale to profitably “dump” his holdings.

Pure Proof of Stake (PPoS) (Algorand)

Pure Proof of Stake (PPoS) is Algorand’s variation on the traditional Proof-of-Stake (PoS) consensus mechanism. It is a decentralized Byzantine agreement protocol that is characterized by a low barrier to entry, requiring as little as 1 ALGO to become a participating node. PPoS strives for quick transaction processing and finality. It leverages a verifiable random function (VRF) to coordinate its participation nodes.

Put Option

A put option contract (the opposite of a call option) is a specialized contract that is sometimes used in derivatives trading. It gives an investor the right, but not the obligation, to sell an underlying security (or cryptocurrency, or other type of asset) at a specified price within a defined time period. When the option contract expires, the investor can choose to sell the underlying security or let the option contract’s value depreciate to zero. Put options can sometimes be used in combination with call options to form unique trading strategies.


Q

Qtum

Qtum is public Proof-of-Stake (PoS) blockchain protocol based on Bitcoin’s code but modified to allow smart contracts to run on top of its UTXO (Unspent Transaction Output) model. With Qtum Neutron, the blockchain is able to connect to several virtual machines (VMs) simultaneously. This allows Qtum to make use of the Ethereum Virtual Machine (EVM) and its own state-of-the-art x86 VM while leveraging the capabilities of its 1,000-node blockchain network.

Qualitative Analysis

Qualitative analysis uses subjective judgment to analyze an enterprise’s value or potential long-term growth based on non-quantifiable information such as management expertise, research and development, industry cycles, and other complex data. Qualitative analysis is the opposite of quantitative analysis, which focuses primarily on numerical data reporting and balance sheets. Both metrics are important to evaluate in order to gain a better perspective on a potential investment opportunity.

Quantitative Analysis

Quantitative analysis (QA) is a methodology that makes use of mathematical and statistical modeling and research in order to understand behavior. QA is used to express a given reality using numerical value and can be applied to measurement, performance, and valuation of different financial instruments. In finance, QA is used primarily to help predict the price of different financial instruments like derivatives, stocks, assets, and even entire economies. QA is also often used to predict changes in gross domestic product (GDP) for specific countries and to compile different financial data sets for certain regions around the world.

Quantum Bit (Qubit)

As it relates to the field of quantum computing, a quantum bit (qubit) is the basic unit of measurement similar to the classic binary bit that is used in traditional computing. Qubits make use of superposition states such as quantum entanglement and quantum superposition to allow quantum computers to operate in a widely used manner. Qubits help facilitate the use of post-quantum cryptography or quantum-resistant computing and other related technologies. Through the use of qubits, quantum computing frameworks are theorized to process computations much faster and more efficiently than their traditional counterparts.

Quantum Computing

Post-quantum cryptography, also referred to as quantum-restistant or quantum-proof cryptography, is a specific type of cryptographic computing architecture that utilizes public-key cryptography (PKC) and is characterized by the ability to prevent quantum computing attacks. At this time, most experts in the field believe that existing computing systems are quantum-resistant, however, the potential for quantum computing attacks designed to exploit current computing infrastructure remains a real possibility. For this reason, the ongoing research and development of quantum-proof computing systems remains a high priority for cryptographers and computer scientists across the globe.

Quasar Smart Contract (OMG Foundation)

A Quasar smart contract is a specific type of smart contract that was designed by OMG Foundation and Enya.ai to enhance their Plasma Layer-2 scaling solution. The Quasar smart contract framework is designed to solve the fast exit problem that users encounter when they try to withdraw their funds (it often takes 14 days for enterprise users to successfully withdraw their funds to Ethereum using traditional models). Quasar smart contracts also provide a framework that allows users to securely and quickly provide liquidity to the network and share exit fees with other users when initiating a withdrawal.

Query

In computing, a query is a specific request for information retrieval using a database or computer system. Queries can be entered into many types of computing platforms or databases, and are used both publicly and privately by retail users, enterprises, governments, and other constituents. As they relate to blockchain systems and computing, queries are often carried out through decentralized indexing and querying platforms that make use of a graph. Graphs are an abstract data type that is designed to make use of undirected graphs and directed graphs through the mathematical field of graph theory.

Quick Response Code (QR Code)

A quick response code (QR code) is a type of matrix barcode that uses a machine-readable optical label (typically scanned with a mobile phone) containing sensitive information about the item it is attached to. QR codes often contain data for a tracker, locator, or identifier that points to a mobile application or website. QR codes use four standardized encoding methods (byte/binary, alphanumeric, numeric, kanji) to store data.

Quorum (Governance)

A quorum is defined as the minimum number of members required to conduct business within a specific group. As it pertains to blockchain technology, quorum biasing denotes that if many voters participate, the vote is more legitimate than if, in turn, very few participate. This mechanism can be used to determine the fairness of specific proposed blockchain-based governance parameters, such as the minimum amount of participating tokens required for a vote to be valid. Typically, if a vote fails to reach the quorum, then it is automatically cancelled.

Quorum Blockchain (ConsenSys)

The Quorum blockchain is an enterprise blockchain system built by JP Morgan and several other main contributors. The platform was purchased by ConsenSys in 2021 in a deal that still allows JP Morgan to utilize the platform through collaborative efforts. Quorum is a modified version of the Ethereum network that is specifically tailored for business applications and other services. Though the classification of the Quorum blockchain is somewhat ambiguous, it is thought to be a consortium or hybrid blockchain platform because it possesses characteristics that are both public (open) and private (closed).


R

Race Attack

A race attack is a double-spend attack where two transactions are sent in quick succession and only one is confirmed to the blockchain. The goal is to purchase something with the unconfirmed transaction and then invalidate it before it’s confirmed. This enables you to get “something for nothing.” This is only possible if the receiver or merchant accepts an unconfirmed transaction.

Radio Frequency Identification (RFID)

Radio-Frequency Identification (RFID) uses electromagnetic fields to identify and track tags which are attached to objects. A RFID tag is made up of a very small radio transponder as well as a radio transmitter and receiver. RFID tags can be triggered with an electromagnetic pulse from a nearby RFID device reader to transmit digital data often underlying an inventory number back to the reader. This specialized number can be utilized to monitor products that have RFID tags attached to them, so the items can be authenticated, tracked, and located.

Random Beacon (Keep Network)

A Random Beacon is a specialized blockchain-based random number generator used by the Keep Network blockchain protocol to help employ its containerization private data model. The Random Beacon uses threshold signatures with digital signature relays to randomly select groups of KEEP token holders to be network transaction signers. Signers are responsible for creating new bitcoin (BTC) key pairs that are used to create tBTC tokens. Randomness is an integral component in creating secure and hack-resistant technical blockchain architecture.

Random-Access Memory (RAM)

Random-access memory (RAM) is a type of computer memory that can be read or changed in any order to store specific working data and machine code. RAM can be read or written in nearly the same amount of time regardless of the physical location of the data within the memory.

Range (Technical Formation)

Range, as it relates to technical charting and analysis, refers to a specific area where an asset’s price oscillates between points of technical support and resistance during a certain period of time. Range-bound assets typically bounce between the high resistance price that they won’t break above, and the low support price that they won't drop below. Certain technical analysis indicators such as the relative strength index (RSI) can also move up and down within a specific range.

Range-Bound

Range-bound is a classification in technical analysis (TA) where an asset’s price remains in a specific range. Assets that are range-bound typically bounce between a high resistance price that they cannot break above and a low support price that they won't drop below, often in a channel-like formation. Assets can also be said to be range-bound within other technical analysis parameters such as the relative strength index (RSI).

Ransomware

Ransomware is a type of malware or malicious software that blocks access to a user’s computer system or threatens to leak sensitive or personal data. The goal of most ransomware attacks is to extort a ransom payment in exchange for restoring access to sensitive encrypted data. Ransomware has become a powerful tool for bad actors targeting users that could potentially lose their all-important data. Ransomware attacks can pose a heightened threat to cryptocurrency users because demands are often sought in bitcoin (BTC) or other digital currencies to avoid unwanted detection.

Ransomware as a Service (RaaS)

Ransomware as a Service (RaaS) is typically a software-based program developed by malicious online cybersecurity experts that is sold to less knowledgeable cybercriminals in order to attack unsuspecting users with the goal of stealing sensitive data. Hackers often advertise their “service” on online marketplaces within the dark web and may ask to be paid in cryptocurrency for their products and services.

RaptorQ

Sometimes used on blockchains, RaptorQ is a form of erasure encoding used in computer science to separate data into encoded fragments (data blocks) so it can be securely sent to another location. RaptorQ’s encoding and decoding processes allow data to move in a more efficient manner than most alternatives. In the event that data is lost or corrupted during transmission, RaptorQ’s forward error correction (FEC) technology will enable you to recover and reconstruct it with a high probability of success.

Rarible

Rarible is one of the most well-known peer-to-peer marketplaces for buying and selling non-fungible tokens (NFTs). Rarible allows users to buy, sell, and trade all different types of digital art, from digital versions of Nike basketball shoes, to paintings of famous crypto entrepreneurs like Vitalik Buterin, and anything in between. The Rarible marketplace, like most NFT marketplaces in the industry, accepts payments for NFTs in ether (ETH).

Ravencoin

Ravencoin is a Proof-of-Work blockchain designed to allow anyone to issue tokens. Its native cryptocurrency is RVN. Ravencoin is a source code fork of Bitcoin.

Real Estate Investment Trust (REIT)

A real estate investment trust (REIT) is defined as a company that owns, operates, or finances income-generating real estate. REITs are generally modeled after mutual funds and pool the capital of numerous investors together, so a purchaser is not required to individually own property to potentially receive financial rewards.

Real-Time Strategy (RTS)

Real-time strategy (RTS) gaming is a video game genre that is synonymous with multiplayer online battle arena (MOBA) gaming. RTS often involves groups of teams competing against each other in a large battle arena setting with computer-assisted units supporting each side. The goal of competing teams is to protect their terrain and to overthrow their adversaries by eliminating opposing team members and taking possession of their territory. The World of Warcraft franchise is often considered a distinct subset of RTS or MOBA gaming.

Rebase Currency (Price-Elastic Currency)

In cryptocurrency, a rebase currency, or price-elastic currency, is constructed in a way that allows its circulating supply to increase or decrease automatically according to the coin’s price fluctuations. This contraction and expansion in price is called a rebase mechanism. Rebase currencies are similar to stablecoins in the sense that both have a rebalancing mechanism, although they function differently.

Recall Block (Arweave)

In the Arweave protocol, the recall block is the block from the earlier history of the blockweave. In Arweave’s blockweave data structure, each block is linked to both the recall block and the previous block in the chain. Additionally, miners must prove that they have access to the recall block in order to add new blocks to the blockweave.

Recapitalization

Recapitalization is the process of restructuring a company or related organization’s economic structure to make it more economically viable. This is often carried out by modifying the enterprise’s debt-to-equity ratio, or by other means. Recapitalization sometimes occurs after a substantial drop in a company’s share price in order to minimize taxes, prevent bankruptcy, or to allow investors to sell their shares and exit the investment.

Receipt Paradigm

A receipt paradigm is a receipt-focused transaction structure built for use with shard chains on the Ethereum Consensus Layer (formerly Ethereum 2.0). The paradigm's intended function is to help increase utility and usability of decentralized finance (DeFi) applications on the Ethereum network. As of early 2021, Ethereum plans to implement a “receipt paradigm” in which each shard chain will generate receipts for its respective internal transactions. Receipts will then be stored in the Beacon Chain’s shared memory — available for all other shards to view, but not to tamper with.

Reciprocally Analogous Virtual Machine (VM)

A reciprocally analogous virtual machine (VM) is a type of VM that is designed to communicate in a beneficial manner with another VM or blockchain/computer system. A VM is a cloud-based imitation of a computer system that is based on different types of computer architecture to provide the functionality of a physical computer system. VM’s may be made to emulate types of specialized hardware, software, or a combination of the two. Additionally, some VM’s are built to mimic different computer architectures and software applications and/or operating systems written for another type of computer or architecture.

Recovery Phrase (Mnemonic Phrase)

A recovery phrase, also referred to as a “seed phrase” or “recovery seed phrase," is a 12, 18, or 24-word code that is used as a backup access mechanism when a user loses access to a cryptocurrency wallet or associated private key. The seed phrase matches information stored inside a corresponding wallet that can unlock the private key needed to regain access.

Recovery Share

A recovery share is a security mechanism that allows a user to designate how many shares are created, and what percentage are required to regenerate a wallet and its public and private keys. For example, a user could potentially designate a 5-of-7 share threshold to determine the number of recovery shares needed to recover their wallet. Compared to a solitary recovery phrase, the recovery shares mechanism makes theft more difficult. However, it makes the wallet regeneration process slightly more complicated.

Recurring Buy

A recurring buy is a practice whereby an investor sets aside a specific sum of capital to buy a target asset at recurring intervals. This process occurs when an investor leverages a stockbroker or exchange to set a specific time to purchase an asset or multiple assets on a recurring basis.

Redundancy

In relation to data storage, redundancy refers to either the intentional or accidental practice of storing multiple copies of a particular piece of data, often in multiple different locations. Data redundancy is considered a best practice to ensure that data is safely kept, and will not be permanently lost should one host or one single copy of the data disappear.

Registered Investment Advisor (RIA)

A registered investment advisor (RIA) is an individual or investment company in the United States that is responsible for advising clients on their investment decisions and the composition of their portfolios. RIAs must be registered on a state level and with the Securities and Exchange Commission (SEC) in order to prove their qualifications and expertise. More importantly, RIAs have a legal responsibility to give their clients investment advice that is in their best interest. RIAs normally earn their revenue through a predetermined agreement based on a certain percentage of the client’s assets under management (AUM) each year.

Regulation T (Reg T)

Regulation T, sometimes referred to as Reg T, is a set of rules that was first implemented by the Federal Reserve Board in 1974 to reduce risk in securities transactions. Regulation T enables securities dealers to extend credit to their clients, while its main functionality is to control the margin requirements and stocks bought on margin by investors. According to Reg T, traders are able to receive up to 50% of a trade’s value via margin from their broker. This mechanism was put into place to control leverage trading risk and limit the total buying power of investors.

Regulatory Compliance

Regulatory compliance is the process of making sure specific enterprises meet certain guidelines introduced by government bodies — such as the Securities and Exchange Commission (SEC) in the U.S. These guidelines seek to protect investors, ensure consumer confidence, facilitate the transparency, efficiency, and fairness of markets, and reduce financial crime and system risk. Financial services organizations are further subject to regulations governing customer communications, advertising, management of client assets, customer understanding and suitability, conflicts of interest, customer dealings, capital regulations, and more.

Rehypothecation

Rehypothecation is a process that occurs when banks, brokers, exchanges, and other financial service providers use client assets for their own purposes to benefit both sides. For example, several blockchain enterprises use a portion of their clients' cryptocurrency holdings as collateral to be lent to institutional investors. In exchange, users receive incentivized rewards for holding their assets on the platform. Companies in the blockchain industry that make use of this process include Binance, Huobi, Crypto.com, Celsius Network, and BlockFi.

REKT

REKT is a slang term used to denote that a person is “wrecked,” meaning ruined, destroyed, or severely damaged. In the blockchain and crypto space, the term usually signifies that an investor has lost a large amount of capital from a trade or recent investment in a short period of time.

Relative Strength Index (RSI)

The relative strength index (RSI), in technical analysis, is a momentum indicator that’s used to measure the impact of recent price changes to calculate overbought or oversold conditions of an asset. The RSI is displayed as an oscillator, or line graph that moves up and down, and is measured between 0 and 100. It is commonly accepted that an RSI rating over 70 is overbought or overvalued, while an RSI rating under 30 is oversold or undervalued. The RSI metric (like all technical indicators) should only be used as one data point to analyze current market conditions.

Relay Node (Algorand)

In the case of the Algorand platform, Relay Nodes are used primarily to help maintain connections between other node types. This is accomplished by accumulating protocol messages from Participation Nodes and other Relay Nodes used to perform deduplication, signature checks and other validation checks to then re-propagate valid messages on the system. Relay Nodes are generally located on internet exchange points to decrease propagation time and can be run by anyone who uses the Algorand network.

Relayer (0x)

Relayers are 0x decentralized exchange (DEX) users who host off-chain order books, list buy and sell orders, and charge transaction fees. Relayers do not act as a trusted intermediary on the 0x platform, nor do they execute trades, however, their main purpose is to host order books externally to the 0x platform. Relayers help traders find counter-parties (other participants that transact within the network) and cryptographically move orders between them.

Release-to-Manufacturing (RTM) Version

The release-to-manufacturing (RTM) version, also called the golden master build (GM) version, refers to the version of software which is ready to be delivered for final release. The RTM version is typically released after the pre-alpha, alpha, beta, and release candidate versions. RTM is usually released before the general availability (GA) version is released to the public. As an example, when Apple releases an operating system (OS), they use the RTM version to make all future copies of the OS.

Remittance

A remittance is a payment from one place to another, and in most cases involves an individual transferring capital to an overseas contact. Typically, these payments are made via an online service provider, cryptocurrency wallet, or other tech-enabled financial conduit, and completing a cross-border money transfer using a blockchain-based transfer mechanism is oftentimes quicker and more cost-effective than sending a remittance through the traditional banking system. With the advent of blockchain technology and mobile cryptocurrency wallets, individuals can now transfer substantial amounts of capital essentially anywhere in the world within seconds while incurring minimal fees.

Remittance Network

A remittance network is a FinTech service provider that enables remittance payments to be sent both domestically and abroad. Examples of large-scale remittance service providers include PayPal, Western Union, and Revolut. As a third-party processor and validator of remittance payments, remittance networks act as a financial intermediary between customers and their contacts and often charge substantial service fees. Blockchain-enabled payment networks have been designed in part to help alleviate current cost and efficiency issues inherent in traditional remittance networks and avoid the need for third-party validators.

Remix (Ethereum Development Environment)

Remix is an integrated development environment (IDE) for writing Ethereum smart contracts using the Solidity programming language. Remix utilizes graphic user interfaces and other productivity tools to allow developers to quickly and easily write or test code. Remix is a web-based IDE, which means users can write and deploy code directly from their web browsers.

Remote File Inclusion (RFI)

Remote File Inclusion (RFI) is an attack used to target vulnerabilities in web applications that make use of malicious reference scripts or external files. In an RFI attack, the attacker's goal is to take advantage of the referencing function in an application to upload malware from a remote location using a different domain instead of accessing a file on a local web server. The end goal is often to steal information, compromise servers, and take over an application to modify its content.

Remote Procedure Call (RPC)

A remote procedure call (RPC) is when a computer utilizes a computer program that causes a procedure to execute via a distinct address space on another shared network or computer. This is done through coding and by using a local procedure call where the software engineer leverages location transparency so they don’t have to provide details on the remote interaction.

Ren (REN)

The Ren Network is a decentralized protocol of virtual devices called Ren dark nodes that provide network interoperability in order to enable cross-chain lending, exchanges, and other services between different DeFi protocols. To make this a reality, Ren makes use of a multi-party computation algorithm as a consensus protocol while using the Ren Virtual Machine (RenVM) to directly enhance liquidity on the Ethereum Network. This functionality enables the platform to lock assets on-chain and mint them individually. The Ren Network utilizes its own native token (REN), which primarily functions as a payment token to place orders within the network.

Repair Miners (Filecoin)

Repair miners are a proposed (as of June 6th, 2020) type of mining node within the Filecoin network that is presently in development. Repair miners, once enabled, will be able to facilitate self healing of the Filecoin protocol. At this time, the network is fully functional without the full implementation of repair miners and other types of miners that will be added in the future.

Replace by Fee

Replace by Fee (RBF) is a Bitcoin protocol tool developed by famous blockchain developer Peter Todd that allows one version of an unconfirmed transaction to be replaced with another transaction that pays a higher transaction fee. Via RBF, unconfirmed transactions are stored in the mempool, which is where valid transactions wait to be confirmed by the Bitcoin network. From there, these stored transactions can then be replaced with another transaction if the sender of that transaction offers to pay a higher transaction fee. As a result, while RBF can help reduce network congestion and help prioritize transactions in accordance with senders' willingness to pay, the mechanism is somewhat controversial because it alters the immutability of the involved transactions.

Reporting

Reporting as it relates to institutional investment is a process by which analysis tools are used to create reports and compile other data to monitor different aspects of a portfolio’s profitability. Reporting mechanisms can be used for long-term and short-term (trading) analysis. Specialized reporting tools allow institutional investment firms to analyze profit and loss (P&L) data, execution data, position size, entry type, exposure, and much more.

Request for Quote (RFQ)

A request for quote (RFQ) is a process whereby a company requests a quote or estimate for the purchase of goods, products, or services from another company. Request for quote is also sometimes called a call for bid (CFB) or invitation for bid (IFB). In a blockchain context, an RFQ is often used by a borrower to request potential loan terms from a DeFi or blockchain company, which can be related to specialized liquidity pools or other similar mechanisms.

Research and Development (R&D)

Research and development (R&D) is the process of modifying and improving a product or service during its initial developmental stage. R&D is often the first step in the development of innovative technological solutions that enterprises use to improve their business model, and is particularly critical for industries that involve complex design, engineering, software development, and technological applications. R&D is not only used to create and deploy products and services, but also to improve existing ones, meaning that R&D practices must be carried out in a detail-oriented, meticulous, step-by-step manner.

Reserve (RSV) Stablecoin

Reserve (RSV) is one of three tokenized assets that help ensure the operational efficiency of the Reserve Protocol. RSV is a stablecoin that acts as a digital representation of a fiat currency or other asset. It operates using verifiable cryptography while running smart contracts on a blockchain network protocol. RSV is pegged at a 1:1 ratio with the U.S. dollar.

Reserve Rights (RSR) Token

Reserve Rights (RSR) is the governance and utility token that contributes to the operational efficiency of the Reserve Protocol. RSR fluctuates in value — unlike its stablecoin counterpart, RSV — and is typically used by investors to speculate on the overall value of the Reserve Protocol by way of its asset price. Additionally, the RSR token also plays a large role in preserving the integrity of the Reserve Protocol.

Resharding

Sharding — also called horizontal partitioning — is a way to separate a network into multiple databases or networks. Resharding is the process of adjusting the number of shards in a data stream, typically done to adjust to network demands or increase data transaction throughput. While resharding has data transmission benefits, it can be challenging to reshard a network while retaining data availability and integrity. While found on shard-implementing decentralized blockchains, resharding is also utilized on centralized and distributed networks.

Retail Investor

A retail investor is a non-professional investor that buys and sells securities, mutual funds, cryptocurrencies, or other investment assets through a traditional or online brokerage firm, exchange, or other type of investment account. Retail investors typically buy securities or other assets for their own personal use and generally trade (or hold long-term) in much smaller increments when compared to institutional investors.

Retrieval Miner (Filecoin)

Retrieval miners, along with storage miners, are the two key components that make up Filecoin’s decentralized market structure. The Filecoin network benefits three main groups of users: (1) Retrieval miners who receive tokens by serving data, (2) storage miners, who receive tokens by providing storage, and (3) clients who pay to store and retrieve data. The retrieval market is built off-chain, and is powered by retrieval miners who help transmit data back and forth.

Return on Assets (ROA)

Return on Assets (ROA) is an indicator that is used to determine how profitable a company is relative to its total assets. This metric allows companies and other organizations to determine how efficiently their assets are being leveraged to generate earnings. ROA is displayed as a percentage and is calculated by dividing the enterprise’s net income by its total asset amount. The higher the ROA, the higher the relevant organization's asset efficiency. ROA is often used to compare similar companies or to benchmark a company's current operations against its past performance. The ROA indicator also takes into account a company’s debt level unlike other common metrics such as Return on Equity (ROE).

Return on Equity (ROE)

Return on equity (ROE) is a system used to determine profitability versus stockholder equity. ROE is generally determined by dividing net income by the total amount of equity. When ROE is calculated, it is sometimes called the return on net assets because it involves the subtraction of all debt and is based on net income instead of gross income. ROE is calculated to determine how much profit is generated for each dollar of equity invested and helps institutional investors gauge how well their company is performing.

Return on Investment (ROI)

Return on investment (ROI) is a measurement that is used to gauge the performance and profitability of an investment by comparing its current value to its initial cost. ROI is often displayed as a percentage and is calculated using the formula: ROI = (Current Value of Investment - Cost of Investment) / Cost of Investment. For example, if you invested $100 which grew to be worth $140, then the ROI would be represented as the net profits ($140 - $100 = $40) divided by the cost of investment ($100) which yields an ROI of $40/$100, or 40%.

RGT (Rari Capital)

As the ERC-20 governance token of the Rarible platform, RGT allows its holders to vote on changes to the platform and submit their own proposals to influence its development.

Ride Programming Language (Waves)

Ride is a functional programming language built to develop decentralized applications (dApps) and smart contracts on the Waves platform. Ride was constructed to address many of the most prominent shortcomings of other smart contract programming languages. To help facilitate the smart contract development process, Ride uses three main types of scripts to create different types of smart contracts including dApp scripts, account scripts, and asset scripts. Through Ride, accounts with scripts assigned to them become dApps or smart accounts while an asset with a script becomes a smart asset. This process differs from the development process often used with traditional programming languages like JavaScript, C, C++, and others.

Ring Miner (Loopring)

In the Loopring network, ring miners are a type of network mining participant that are responsible for filling orders before they're executed or canceled by using a process that circumvents traditional order books and the AMM mechanisms governing liquidity pools. Those who operate as ring miners receive a service fee in LRC tokens or split the margin on the order amount. This system ensures that miners receive fair compensation for their efforts while incentivizing them to get the best rate for traders since their margin is higher if the exchange rate is. Ring miners also reduce arbitrage opportunities because the underlying protocol should always have the best trade value.

Ring Signature

A ring signature is a mechanism that is used to conceal the details of a digital signature in order to hide the specific details of the relevant network transaction. This unique digital signature format can be used by any member of a group of users that is in possession of the correct cryptographic keys. Therefore, it is nearly impossible to determine which group member’s keys were used to produce the signature, which essentially allows the sender of a transaction to remain anonymous and untraceable. The name 'ring signature' is denoted by the ring-like structure of the signature algorithm, and Monero was the first blockchain network protocol to implement ring signatures in 2015.

RingCT (Confidential Transaction) (Monero)

Ring Confidential Transactions (RingCTs) are a mechanism used within the Monero blockchain platform which allows the amount in a transaction to be hidden, similar to now the system’s ring signature mechanism obfuscates the details of sending and receiving addresses. RingCTs drastically improve the unlinkability and untraceability of transactions within the Monero network by allowing for ring outputs of various transaction sizes, without compromising the anonymity of the transaction. This function was added to Monero in January of 2017 and made mandatory on the network in September 2017.

Rinkeby (Ethereum Testnet)

Rinkeby is Ethereum’s testnet and is built for testing smart contracts, network architecture, and other experimental Ethereum technology before it goes live on its mainchain. Rinkeby employs a Proof-of-Authority (PoA) consensus mechanism that allows only a small number of nodes to mine blocks on the network as opposed to Ethereum Execution Layer’s (formerly Ethereum 1.0) Proof-of-Work (PoW) architecture that allows any node with enough computational power to participate.

Ripple Gateway

Ripple Gateways are businesses that allow their customers to deposit their funds in exchange for Ripple IOUs, thereby providing an entry point into the Ripple network. Ripple Gateways allow their customers to transfer both traditional and cryptocurrency funds across the network, and are also used to transfer customer-owned Ripple IOUs to another address or withdrawal their funds by redeeming their Ripple IOUs. Each Ripple Gateway is designed with specific features which ensure the security of the underlying organization's network and the capital their institutional clients deploy within the network.

Risk Curve

A risk curve is a visual depiction of the trade-off between the risk and return for an investment on a graph. Generally, the horizontal x-axis is a measurement of the risk level, while the vertical y-axis is a measurement of the expected return. The curve implies that lower-risk investments plotted to the left might generate a lesser expected return, and that riskier investments plotted to the right might generate a greater expected return. Risk curves can contain multiple data points that represent different asset types or individual investments.

Risk Management System (RMS)

Caspian’s Risk Management System (RMS) is used to monitor trading and investment decisions to help ensure greater profitability (by taking into consideration specific risk-based parameters). The RMS can also be used to generate detailed risk metrics that allow traders to see the overall market more clearly. This functionality allows users to make better trading and investment decisions.

Roadmap

In the blockchain industry, a roadmap is a predetermined plan to carry out the short- and long-term goals of a blockchain project using a flexible or estimated timeline. For a developing blockchain project, a roadmap should explain the overall goal and long-term vision for the project, while also describing the developmental milestones to be achieved as the project progresses. The roadmap is also an important metric that potential investors consider when evaluating a project.

Rococo Relay Chain (Kusama)

The Rococo Relay Chain is the main blockchain built to run Kusama, and is designed to act as the control center behind the Kusama ecosystem. Rococo was built to facilitate the transfer of independent parachains to the Polkadot Relay Chain, as well as to aid in the operation of distinct parachains that might choose to build on Kusama long-term. Rococo’s main objectives are to provide cross-chain interoperability and communication among both internal parachains and external blockchain networks, and to serve as a testing ground for parachain optimization and deployment.

Roll-Up

Roll-ups are an off-chain aggregation of transactions inside a smart contract. Roll-ups are used to combine and process smart contract transactions off-chain before settling the final state on-chain. This is done to lower transaction fees given that the rising popularity of decentralized finance (DeFi) offerings has caused fees to increase substantially on some blockchain protocols. Roll-ups are considered a throughput solution, not a scaling solution, as they usually require additional hardware to settle transactions on-chain.

Ronin Sidechain (Axie Infinity)

Developed by Sky Mavis, the Ronin sidechain is an Ethereum-linked sidechain on which Axie Infinity operates. Ronin is a scaling solution intended to address issues that occur during times of high network congestion, such as slow transaction confirmations and high transaction fees. Sky Mavis also operates the Ronin bridge, which allows users to move their assets from Ethereum to Ronin.

Rootkit

A Rootkit is a specific type of Trojan malware designed to gain unauthorized root or administrative access to a target device or network. Many rootkits are specifically designed to subvert security software and contain a variety of tools that enable hackers to steal personal information, damage, or completely hijack an infected device. As a result, rootkits are notoriously difficult to detect and remove, and in some cases the only way to remove a rootkit from a device is to reinstall the device's entire operating system.

Roth IRA

A Roth IRA is a U.S. individual retirement account that offers tax-free growth on funds vested in the account and tax-free withdrawals from the account after the account holder meets certain criteria. More specifically, Roth IRA account holders that are at least 59.5 years old or older and have had their account open for at least five years are eligible to withdrawal the funds within their account any time they want without paying federal taxes.

Rough Consensus

Rough consensus is an informal process through which a community makes decisions about the future development of a protocol. In contrast with on-chain governance, rough consensus systems discuss changes at meetups and conferences and in online venues. Proposed changes are eventually turned into software updates, and stakeholders vote to accept or reject the change by running the update or not.

RSA Public-Key Cryptography

The Rivest-Shamir-Adleman (RSA) encryption algorithm is a public-key cryptography (PKC) model that is used for numerous types of data transmission on computer networks and blockchains. Like all asymmetric cryptography models, RSA makes use of a public and private key pair system to encrypt and decrypt data. The RSA encryption framework makes use of the factorization of two prime numbers and an auxiliary value to obtain a desired result. RSA cryptography was first developed in 1977 and is named after its three main developers: Ron Rivest, Adi Shamir, and Leonard Adleman.

Ruby Programming Language

Ruby is a high-level, interpreted, general-purpose computer programming language designed by Yukihiro "Matz" Matsumoto. Ruby supports a diverse range of other programming languages and can be utilized for many different situations in software development.

Rug Pull

A rug pull is a type of scam whereby a dubious blockchain project is "launched," only for the founding team to run away with investors' funds. Rug pulls typically occur in the decentralized finance (DeFi) ecosystem via a decentralized exchange (DEX) which enables malicious actors to create a cryptocurrency, list it on a DEX, and pair it with an asset like ether (ETH). Then, after a substantial number of unsuspecting investors exchange their ETH for the listed token, the founders withdraw funds from the liquidity pool, leaving investors holding essentially worthless assets.

Runtime

Runtime, or execution time, is the final phase of a computer program's lifecycle when the code is being executed through the computer’s central processing unit (CPU). Runtime can also refer to the period of time when a program is running, beginning when the program is executed (or opened) and ending when the program is closed. Generally, when a program is operating in the runtime phase, the application is utilizing Random Access Memory (RAM). Blockchains and computer networks are often designed with a pre-built runtime environment that implements portions of an execution model when needed.

Russell 3000 Index

The Russell 3000 Index is a market-capitalization weighted equity index. The index was founded in and based in Britain but it is used to track the performance of the 3,000 largest publicly held U.S. stocks that make up 98% of the U.S. stock market. The Russell 3000 Index is made up of the large-cap Russell 1000 Index and the small-cap Russell 2000 index. The index launched on January 1st, 1984, and is maintained by FTSE Russell, a subsidiary of the London Stock Exchange Group (LSEG).

Rust Programming Language

Rust is a multi-paradigm programming language designed to prioritize safety and performance. Rust is syntactically similar to C++ and has gained increased use across multiple enterprise industry applications. Microsoft is experimenting with Rust and has used the language to develop a range of security-oriented software components. Graydon Hoare at Mozilla Research initially created the language back in 2010 and Brendan Eich, the creator of JavaScript and founder of Brave Browser/Basic Attention Token, was one of the early contributors to Rust's development.

RVN (Ravencoin)

RVN is the native cryptocurrency of the Ravencoin blockchain.

Ryuk Ransomware

Ryuk ransomware attacks are a type of ransomware attack in which a malicious actor aims to render a target device/network's essential files inaccessible to its legitimate users so that the attacker can levy a ransom against the target. Once the essential files are corrupted, encrypted, or otherwise compromised, the victim is typically unable to regain access to these files on their own and are pressured to pay the demanded ransom amount, which is oftentimes hundreds of thousands of dollars per attack. Ryuk attacks are relatively common and regularly account for tens of millions of dollars' worth of damages each year.


S

S&P 500 (Standard and Poor’s 500)

The Standard and Poor’s 500 (S&P 500) is one of the most famous stock indices in the world. The S&P 500 is made up of 500 of the largest companies listed on stock exchanges in the United States and consists of many of the largest tech stocks on the planet. These include Apple Inc., Microsoft, Amazon.com, Facebook, Alphabet Inc. (class A & C), Tesla Inc., Berkshire Hathaway, JPMorgan Chase & Co., and Johnson & Johnson. The S&P 500 is so powerful that it is often analyzed to forecast the direction of the U.S. and global economies.

S&P Global Ratings

S&P Global Ratings is one of the largest credit rating agencies in the world and a subsidiary of S&P Global, which is best known for being the creator of the S&P 500 stock index. The purpose of S&P Global Ratings is to provide accurate data and information to potential market participants to measure the credit efficacy of enterprises, governments, financial entities, securities, and the overall financial sector. S&P Global Ratings works with numerous global financial regulators and the financial sector to provide detailed information to help sustain an equitable, transparent, forward-thinking global financial industry.

Safety Module (Aave)

Within the Aave economic framework, the Safety Module is a specialized security feature designed to mitigate the potential effects of an unexpected drop-off in liquidity, which might otherwise substantially reduce the AAVE token’s overall value. The Safety Module is built using the Balancer liquidity pool and allows for AAVE and ether (ETH) to be staked at a 4:1 ratio in order to earn rewards and vote on protocol changes. If necessary, up to 30% of the AAVE tokens staked in the Safety Module can be sold in order to provide liquidity to Aave.

Sandbox (Security)

Within a cybersecurity context, a sandbox is a security mechanism that is designed to mitigate the potential impact of system failures and/or software vulnerabilities by allowing programs to run independently of and separately from the device/network's primary operating system. A sandbox is often used to test out new implementations and code bases or audit untested programs to ensure that they behave as planned prior to deployment. Sandboxes are also commonly deployed while testing the performance and features of a Virtual Machine (VM).

Satellite (Storj)

Satellites are an essential part of Storj’s decentralized data storage network framework which audits Storj storage nodes to ensure that they are storing their assigned data and acting in an honest manner. Satellites receive payments for securing the network and periodically distribute payments to storage nodes for providing data storage. Additionally, Satellites also store the metadata of the network's segmented files, which enables clients to receive their files upon request.

Satoshi Nakamoto

Satoshi Nakamoto is the pseudonymous individual or group responsible for creating the Bitcoin protocol. Satoshi Nakamoto famously published the Bitcoin whitepaper in October 2008 and mined the first 'genesis' block on the Bitcoin network in January 2009. In April 2011, Satoshi Nakamoto posted on an online forum saying that he had “moved on to other things” and disappeared completely from the blockchain community. Since then, the true identity of Nakamoto has remained unknown, although there are a variety of unproven theories which claim to have unraveled the mystery of this individual/group.

Satoshis

Named after the pseudonymous individual or group that created Bitcoin, satoshis, or “sats,” are the smallest divisible unit of the bitcoin (BTC) cryptocurrency. Like all cryptocurrencies, bitcoin is divisible and there are 100 million satoshis in one bitcoin. Many crypto enthusiasts track the price fluctuations of their respective cryptocurrencies in terms of sats rather than fiat currencies, which reflects their skepticism of the traditional financial system.

Scalability

Within the context of blockchain technology, scalability is the capacity of a blockchain network to increase the transactional finality speed and throughput needed to improve processing times for transactions that are being sent and received via network protocol. The higher a network's scalability, the more efficiently it can send transactions and process different types of data. Scalability is one of the three main characteristics of a mature blockchain network, with the other two being decentralization and security.

Scaling Solution

A scaling solution is designed to improve the efficiency and computational output of a Layer-1 blockchain network. Scaling solutions are typically composed of Layer-2 protocols — such as sidechains and off-chain layers — that are designed to increase network transaction throughput and overall speed. There are many different types of scaling solutions including roll-ups, state channels, sharding, network interoperability tools, and more. Examples of Layer-2 scaling solutions include OMG Foundation, Polygon, Skale Network, and Lightning Network.

Scalp Trader (Scalper)

A scalp trader, or scalper, is a type of investor that typically enters and exits financial positions very quickly — usually within the span of minutes or seconds — with the goal of generating consistent profits from incremental movements in an asset’s price. To accomplish this, scalpers often use high-leveraged trading positions in a derivatives trading environment. Scalpers are often employed by large institutional investment firms, equipped with a suite of tools to help automate many of their trading decisions, and allocated a significant amount of investment capital in order to make their trades worthwhile.

Scareware

Scareware is a type of malware that utilizes social engineering to invoke fear, anxiety, and/or shock in a target in order to persuade them to purchase unwanted software. Scareware commonly takes the form of rogue security software, ransomware, or some other type of software that misleads a user into thinking that their device has been infected with a virus. If a user is sufficiently convinced by the scarware's urgent and dire warnings, they may be compelled to purchase additional software to eliminate the alleged "threat". Oftentimes this program a user downloads to fix the proposed issue is actually a malignant virus or a useless, resource-draining subscription-based service.

Schelling Point (Focal Point)

As it relates to game theory, a focal point or Schelling point is a solution or specific outcome that people automatically choose by default in relation to their surrounding environment. For example, the landscape design of a property is built around select focal points such as a water fountain, statue, and other points of contact that tend to draw attention from the human eye by default. In a blockchain structure this could mean that the attention of the user or designer is naturally directed towards a specific point or several focal points that make up the overall structure.

Schnorr-Signed ElGamal Encryption

Schnorr-Signed ElGamal Encryption is an encryption mechanism commonly employed by various types of public-key cryptography (PKC) systems that blockchains and other types of networks employ. The framework is designed to hide sensitive data using Schnorr signature technology and is characterized by Diffie–Hellman key exchange and other complex mechanisms. The standardized Digital Signature Algorithm (DSA) that most blockchain systems are based on is a variant of the Schnorr and ElGamal signature frameworks. The Schnorr-Signed ElGamal Encryption scheme is named after its Egyptian creator Taher Elgamal, who proposed the solution in 1985.

SCORE (Smart Contract on Reliable Environment) (ICON Network)

SCORE (Smart Contract on Reliable Environment) is ICON’s framework for composing, amending, and initializing smart contracts on the ICON network. In ICON 1.0, smart contracts were written in Python. In ICON 2.0 (released in 2021), SCORE switched to utilizing JavaScript. This should increase performance, integrate better with ICON’s Virtual Machine, and improve integration and development capabilities for software developers.

Screen-Locking Ransomware

Screen-locking ransomware is a type of software that blocks a target user's access to their device's operating system. This type of ransomware typically works by locking the user’s device and displaying a message prompting the user to pay a specific ransom to unlock their device, or run the risk of forever losing the contents inside.

Scripting Programming Language

Scripting programming languages make use of scripting to realize the system’s runtime environment so it can be executed automatically instead of using a compiler. The scripting language classification is generally quite broad and can include interpreted languages and dynamic high-level languages. Data written in scripting languages is usually arranged into smaller sequences of code that are then combined together with other components to create a functioning program. Because of their flexibility, scripting languages are often well-suited for creating both frontend and backend frameworks. Examples of widely used scripting languages include JavaScript, Python, PHP, and CSS.

Scrypt

Scrypt is the hash function that converts an input of letters and numbers into an encrypted output that is used by the cryptocurrency Litecoin. It differs from the SHA-256 hash function that is used by Bitcoin, but it also functions within a similar Proof-of-Work (PoW) consensus mechanism. The Scrypt hash function was originally designed to limit mining to only CPUs and GPUs, although scrypt-capable ASICs have since been developed.

Secondary Market

The secondary market refers to the traditional stock market. It is known as the secondary market because before bonds, stocks, derivatives, and other financial instruments are sold on the stock market, they are sold on the primary market. In a secondary market investors exchange assets they already own with each other instead of with an issuing entity like on the primary market. In a broader context, the secondary market is any marketplace that is used to exchange goods or assets that are not used for their main purpose (such as corn for ethanol instead of food production or livestock feed).

Secret-Sharing

Secret-sharing is a cryptographic technique employed in computing that is used to share highly-sensitive data in a way that cannot be compromised. Secret-sharing works by sending separate chunks (shares) of sensitive data (or secrets) to multiple parties, with the sensitive data only being deciphered when all separate parties who received a portion are united. Secret-sharing is one of numerous privacy-preserving techniques used in blockchain and other forms of computing.

Secure Hash Algorithm (SHA)

Secure Hash Algorithms (SHAs) are a family of cryptographic hash functions designed to keep data secure on different types of computer networks and computer infrastructure. SHAs work by transitioning the original data to a hash function algorithm that consists of several unique compression functions and modular additions. There are several SHAs in existence, and many of them were initially designed and built by the National Security Agency (NSA). The Bitcoin network makes use of the SHA-256 hash algorithm that allows Bitcoin miners and the network's underlying consensus mechanism to operate correctly.

Secure Multi-Party Computation (SMPC)

Secure Multi-Party Computation (SMPC) is a subset of cryptography that enables functions to compute in a distributed system across multiple parties, without sharing data among other network participants. SMPC allows nodes within a network to jointly compute a function while keeping the inputs private from other nodes within the network. The process is one of many methods in distributed computing that allows for privacy and security in a blockchain environment.

Secure Proof of Stake (SPoS) (Elrond Network)

Secure Proof of Stake (SPoS) is Elrond Network’s enhanced version of Proof of Stake (PoS). It enables advanced security and distributed fairness while eliminating computational waste that Proof-of-Work (PoW) systems typically struggle with. The SPoS consensus system achieves high security through a Byzantine Fault Tolerant (BFT)-like consensus methodology that utilizes instantaneous randomized validator selection through the reshuffling of nodes into other shards. To accomplish this, SPoS makes use of Boneh–Lynn–Shacham (BLS) multi-signature technology to randomly select nodes within each shard to achieve validator selection finalization in 100 milliseconds, or 0.1 seconds.

Secure Sockets Layer (SSL) & Transport Layer Security (TLS) Certificates

A Secure Sockets Layer (SSL) Certificate is a technological standard used to enable a secure connection between a web server and client on the internet. SSL certificates are installed on a web server and scramble transmitted data through encryption algorithms in order to prevent malicious actors from being able to access data as it moves from one system to another. A Transport Layer Security (TLS) Certificate represents a recent, updated version of SSL with further enhanced security.

Securities and Exchange Commission (SEC)

The U.S. Securities and Exchange Commission (SEC) is a large independent body of the U.S. federal government that is responsible for proposing securities rules, enforcing federal securities laws, and regulating the U.S. investment industry. The SEC is responsible for protecting investors, maintaining fair and smooth functioning of U.S. securities markets, and facilitating capital formation.

Securitization

Securitization is the process of pooling an asset or group of assets — typically types of contractual debt — into a security. These can include residential and commercial mortgages, car loans, credit card debt, and other forms of debt, which are packaged, bought, securitized, and sold to prospective investors. Typically, investors are repaid by the principal and interest cash flows from the underlying debt, which are then redistributed as part of the new financing terms. Securitization often comes in the form of mortgage-backed securities (MBS) and asset-backed securities (ABS), among others.

Security (Financial Asset)

A security in its purest form is any tradeable financial asset like a stock, bond, commodity, or derivative. However, the term varies by geographical location because different jurisdictions use different legal classifications to determine what constitutes a security. The Securities and Exchange Commission (SEC), the Financial Industry Regulatory Authority (FINRA), and other regional and global regulatory bodies help define securities in their respective jurisdictions. Even some cryptocurrencies are considered securities in different regions. More generally, securities are classified into three types: equity, debt, and a hybrid between the two.

Security (Network)

Security as it relates to computing network infrastructure can be an ongoing concern which companies usually seek to address via numerous policies, practices, and procedures that help detect, prevent, and monitor unauthorized access, modification, misuse, or denial of computer network resources. Adhering to strong security guidelines is often critical to maintaining a well-functioning system with reduced susceptibility to data theft by malicious third-party attackers aiming to disrupt, destroy, or modify a computer system.

Security Token

Security tokens are a tokenized stake in the ownership of any asset that has value, such as a business or a piece of real estate, which is recorded in a blockchain ledger. Within the context of corporate ownership, security tokens are analogous to corporate stocks, or fractions/multiples of a stock, and therefore represent an equity stake in a company, along with whatever future returns a partial ownership of that business entails, such as dividend payouts. As a result, security tokens offer a more flexible yet secure way of transferring, exchanging, and storing value.

Security Token Offering (STO)

Security Token Offerings (STOs) are a method of distributing security tokens and exist somewhere between Initial Coin Offerings (ICOs) and Initial Public Offerings (IPOs). To better understand this, it's important to note that security tokens are equity tokens that represent an equity stake in a company or asset, in addition to whatever future returns are associated with partial ownership of that entity, such as dividend payouts. STOs are generally considered superior to ICOs due to the fact that STOs offer instant settlement times, clearer regulatory guidelines, higher liquidity, and a lower barrier to entry in many instances, among other benefits. Since enterprises that create registered securities must adhere to specific compliance and regulatory requirements, STOs avoid a lot of the market ambiguity which ultimately turned many investors off to ICOs, while continuing to offer a straightforward, investor-friendly method of issuing, trading, and storing tokenized equity shares.

Seed Funding

Seed funding, sometimes called seed capital, is a form of funding where an investor invests in a startup in exchange for an equity stake, convertible note stake, or tokenized asset stake in the company. Seed funding is generally considered to be a very early investment to help support a startup until it gets off the ground and starts generating cash flow, or is in a position to obtain further investment capital. Seed funding is often completed by friends and family, seed venture capital (VC) funds, and angel investors, among other funders.

Seed Phrase

A seed phrase, also referred to as a “recovery phrase' is a 12, 18, or 24-word code that is used as a backup access mechanism when a user loses access to a cryptocurrency wallet or associated private key. The seed phrase matches information stored inside the corresponding wallet that can unlock the private key needed to regain access.

Seeding

As it relates to peer-to-peer (P2P) file sharing, seeding is the act of uploading previously downloaded content for others to download. A computer connected to a P2P network generally becomes a seed after it has a desired file; multiple seeds with the same file allow a user to download the file much faster than they would be able to from a single party. P2P file sharing via seeding first came to prominence with the sharing of mp3 music files in the late 1990’s — and has since expanded to include the sharing of video files, video games, and computer programs.

Segregated Witness (SegWit)

Segregated Witness (SegWit) is the name of a soft fork that was carried out on the Bitcoin network which changed the transaction format of the protocol. Segwit separates signature data from transaction data within the blockchain to increase the total amount of data within a specific block. By rearranging the data contained in each block more efficiently, more space is freed up which allows for the inclusion of additional data. SegWit is capable of increasing Bitcoin's block size limit from 1MB to 2MB and was designed to mitigate the blockchain size limitation issues that periodically slow down transaction speeds on the Bitcoin network. This is accomplished by "segregating" the transaction into two segments by removing the unlocking signature's "witness" data from the original portion and appending it as a separate structure at the end of the block.

Self-Regulatory Organization (SRO)

A self-regulatory organization (SRO) is an entity that has the power to independently create and enforce accepted professional regulations and standards without the need for external oversight or intervention.

Self-Sovereign Identity (SSI)

Self-sovereign identity (SSI) is a general concept that describes a user's ability to own their own identifying data without the need for third-party assignment or validation. While there are multiple technical approaches to actualizing SSI from a practical standpoint, none have yet to emerge as a broadly recognized global standard.

Sell Wall

A sell wall is said to occur when a large limit order is placed at a specific price level to sell a large amount of a certain asset. Sell walls can result in a substantial drop in the price of the asset. Sell walls can sometimes be considered a form of market manipulation, when a trader creates a large limit sell order at a certain price, then also submits a large leveraged short position betting that the asset will go down in price.

Sell-Off

A sell-off is a sudden, high-volume sale of a security or other asset which typically reduces the price of the relevant asset, at least in the short term. While there are a variety of reasons for why a sell-off may occur, in most instances sell-offs take place as a result of widespread market panic, either due to negative news or a black swan event, or coordinated market manipulation initiated by institutional investors or "whales."

Semantic Web

The semantic web is a long-awaited version of the World Wide Web that expands on the parameters set by the World Wide Web Consortium (W3C). The semantic web is designed to allow internet data to become machine-readable, leading to a much richer experience for transacting, data usage, and the sharing of information. For decades, many believed this vision would never be realized. However, the semantic web appears to be gradually emerging — powered by an array of ever-expanding developments in artificial intelligence (AI), machine learning (ML), the Internet of Things (IoT), blockchain, and other related technologies.

Semantics (Computer Science)

In computer science, semantics is the mathematical study of the meaning of different programming languages. One of the ideas in programming semantics is that linguistic representations (symbols) depict logical outcomes, while phrases and sets of words interpret different instructional formats for both humans and machines. More simply, semantics describes how different programming languages are interpreted and used by different types of developers or machine-readable systems. In contrast, programming syntax is used to describe the arrangement of words and phrases within a programming language.

Separate Account

A separate account is an investment portfolio owned by an investor that is managed by an investment firm — typically a registered investment advisor (RIA). Separate accounts provide their owners with real-time visibility into all their holdings and transactions as they occur, as opposed to retroactively, as is the case with mutual funds. While most separate accounts are opened through a financial advisor or investment brokerage, they can also be managed through an insurance company or bank. Separate accounts are also commonly referred to as separately managed accounts (SMAs) or individually managed accounts.

Sequencer

As part of the Optimistic Rollup (OR) Layer-2 scaling solution proposed for the Ethereum network, sequencers — or aggregators — process transactions off-chain before sending them on-chain to be finalized. While sequencers are financially rewarded for their role in OR models, they must put up a bond — known as a fraud proof — as collateral to disincentivize malicious action. Executed at scale, this methodology could save capital and offer a boon to Ethereum throughput capacity.

Serenity (Ethereum Upgrade)

Serenity is the multi-phased Ethereum upgrade that is transitioning the Ethereum blockchain from a Proof-of-Work (PoW) consensus mechanism to Proof of Stake (PoS), while segmenting the network into specialized shard chains that are optimized for scale. Both upgrades are groundbreaking technological endeavors that will increase speed, efficiency, and network scalability on Ethereum. Because of the complexity required in launching Ethereum Consensus Layer (previously Ethereum 2.0), Serenity is designed to launch in a total of four phases over several years. Phase 0 was successfully deployed in December 2020 with the launch of the Beacon Chain upgrade.

Series B Funding

Preceded by Series A funding, Series B funding is typically used by established companies with a valuation in excess of $30 million USD. This capital tends to be used by a company to expand, cover costs, or enter new markets. The Series B stage usually provides the company with additional funds in excess of $10 million, which may be provided by venture capital and private equity firms in exchange for preferred shares.

Service Chain

In a computer network context, a service chain — or service chaining as it is often referred to — denotes a specific sequence of actions that are applied to automating traffic and data flow between services in a virtual network. Service chains are also used to optimize the usage of network resources to improve application performance by selecting the best routing path. Service chaining typically makes use of several distinct elements including a service template, virtual network, service instance, and service policy.

Service Layer (Tooling Layer)

The service layer, sometimes known as middleware or the tooling layer, is the portion of the software stack that computing systems utilize to support the functionality of the application layer. In blockchain specifically, the service layer is generally made up of smart contracts, application programming interfaces (APIs), software development kits (SDKs), decentralized oracles, databases, digital identities, and more. Without the service layer, the application layer and the network layer would be unable to interact with each other, rendering the system useless.

Settlement

Settlement is the process of determining when a transaction is completely confirmed, or settled, by all interested parties. Until settlement provides confirmation of a completed exchange, the transaction remains pending and unresolved. The speed of settlement finality has major economic repercussions for businesses. Longer settlement times may lead to costly and time-consuming delays, and add up throughout a marketplace to significantly slow the process of conducting business throughout many industries. Shorter settlement times speed up business operations, save money, and remove uncertainty.

Settlement Agent Node (Crypto.com)

On the Crypto.com blockchain, Settlement Agents are network nodes that take the role of enabling settlement between the platform's native cronos coin (CRO) and other cryptocurrencies and stablecoins. Settlement agents are relied on by buyers and sellers to exchange crypto and accurately settle transactions. Settlement Nodes are eligible to earn a profit from charging a .5% fee for payouts made in fiat currency.

Settlement Layer

The settlement layer on a blockchain network is the portion of the protocol used to settle financial transactions through smart contracts. Settlement via smart contract technology is designed to remove or reduce the role of third-party intermediaries, and thus facilitate a direct and trustless exchange between the user and the protocol itself. Automated clearing and settlement on a blockchain network typically take place via an automated market maker (AMM). With the increased popularity of crypto derivatives and futures markets, investing in blockchain-based derivatives is greatly aided by the ability to execute various types of financial transactions using a settlement layer.

SHA-256

SHA-256 is a member of the SHA-2 cryptographic hash function family that was designed by the National Security Agency (NSA) and later made famous for being a foundational aspect of the Bitcoin blockchain network. SHA-256 is a Secure Hash Algorithm (SHA) that secures data by utilizing a cryptographic mathematical operation to generate a unique 256-bit, 64-character random sequence of letters and numbers (called a hash) out of an input. These functions are generally designed to serve as a one-way function that is virtually impossible to reverse once a piece of underlying data has been amended into its hash value.

Shamir Secret Sharing (SSS) Cryptography

Shamir Secret Sharing (SSS) cryptography is a specialized cryptographic algorithm that was initially proposed in 1979 by Isreali cryptographer Adi Shamir. Shamir Secret Sharing is designed to secure data through encryption. It accomplishes this by sharing private “secrets” within a distributed computing network. This process allows data to be separated into many shares, yet it only requires a small portion of the shares to reconstruct the original secret. Because of its structure, Shamir’s algorithm is extremely adaptable and extensible, and provides the framework that allows secret owners to modify or remove shares without modifying the original secret.

Shard Chain

Shard chains are created by partitioning a blockchain into smaller, more manageable pieces. This process decreases the workload on validator nodes, which are only required to store and manage one shard instead of the entire blockchain system. Alongside other optimizations, shard chains are expected to drastically increase network throughput and speed as opposed to monolithic consensus mechanisms. Ethereum’s Consensus Layer (previously Ethereum 2.0) will be separated into 64 shards that will operate as smaller blockchains tied to a Beacon Chain. Ethereum Execution Layer (previously Ethereum 1.0) is intended to make up one of these shards.

Sharding

Sharding is a mechanism that is used to partition a blockchain network or other type of computer network or database. Its purpose is to distribute the network's computational and storage workload across a broader set of devices, or nodes, in order to increase the throughput and transaction speed of the entire system. Each node only maintains information related to its specific shard or partition, and since each node is only responsible for processing a fraction of the overall network's transactional load, the network's overall processing capabilities and resilience can be vastly improved. As a result, the increased transaction speeds made possible through sharding have allowed many blockchain-based networks to be exponentially faster, more secure, and better suited for widespread enterprise use.

Sharetip

Sharetip is an on-chain tipping platform that lets you tip bitcoin cash (BCH) to content creators. You share the tip amount and URL you wish to tip with Sharetip. Sharetip then tries to connect with the external account associated with the URL. If they can prove they own the content, the tip is sent. The tip is refunded if it’s not claimed in seven days.

Sharing Economy

The sharing economy is a socioeconomic system built around the concept of mutually sharing resources within a network to benefit all its members. This process is typically enabled through peer-to-peer (P2P) networks which allow for the purchase and/or exchange of goods and services in a way that differs substantially from traditional company-to-customer business models. In recent years, the sharing economy model has given rise to a variety of innovative business models, ranging from ride-sharing to decentralized content platforms. Open public blockchain networks help realize the potential of the sharing economy by virtue of their decentralized, transparent, and censorship-resistant nature.

Shelley Phase (Cardano)

Named after author Mary Shelly, the Shelley Phase is the second of five phases in Cardano’s developmental roadmap. It’s designed as a safe and stable transition to a more decentralized Cardano with community-run network nodes. Via game theory and staking rewards, ADA coin holders are incentivized to participate in the network’s ambitious decentralization goals.

ShibaSwap

ShibaSwap is the decentralized exchange (DEX) created by the Shiba Inu blockchain project. ShibaSwap was designed to create a safe and user-friendly environment to trade cryptocurrencies in a fully decentralized manner. Launched in July 2021, it functions like a traditional DEX while also featuring decentralized governance, staking options, and a non-fungible token (NFT) marketplace.

Shielded Transaction

Shielded transactions are a unique transaction type that conceals specific data about a transaction, such as the amount being transferred or the involved account addresses, in a way which is still verifiable on the blockchain. While different blockchain projects deploy different methods to enable the use of shielded transactions, many of these methods involve zk-SNARK cryptography to obfuscate transaction data prior to the transaction being recorded in a blockchain.

Short Position (Shorting)

Short selling (also known as "going short" or "shorting") is the practice of seeking to profit from the decrease in an asset’s price (for example, short selling a stock). A short seller sells shares borrowed from a broker. If the price of the share goes down, they can be purchased at a discount and returned to the broker. The short seller can then pocket the difference between the purchase price and the price the stock was initially shorted — or sold — at. However, if the price of a shorted stock rises, the short seller is responsible for the difference and may incur financial losses.

Short Squeeze

A short squeeze is triggered when a shorted stock is rising in value. This rise in value may be caused by positive financial news or buyers purchasing shares with the knowledge that short sellers must cover their positions. If short sellers don’t close out their positions before the stock price rises too high, they could incur financial losses or even have their positions closed out entirely for a complete loss.

Sidechain (Side Chain)

A sidechain (or side chain) is an external secondary blockchain protocol that is connected to a primary blockchain network (mainchain). Sidechains are typically designed to allow for the transfer of data and value between themselves and the mainchain, and oftentimes use a different consensus mechanism than the mainchain. As a result, sidechains can allow for a higher degree of flexibility and scalability, given that systems with a significant sidechain interoperability component are often designed to cater to a broader range of enterprise and individual users. For example, some sidechain solutions allow for the transfer of assets back and forth between multiple protocols like Ethereum and Bitcoin. Other examples of sidechain capabilities include enhancements used for Layer-2 scaling solutions to increase the transaction speeds of the mainchain.

Signature (Cryptographic)

A cryptographic signature is a mathematical mechanism that is used to verify the authenticity of a digital message or digital document within a digital network. Cryptographic signatures are commonly used for financial transactions, digital contract management, software distribution, and a broad array of other use cases that prioritize the accurate detection and prevention of forgery and data-tampering. In regards to blockchain technology, cryptographic signatures are typically used to prove that the correct private key was used to initiate and send a transaction through a complex authentication process that involves the use of both a private and public key.

Signature-Based Security Program

A signature-based security program is a type of security software that identifies malware using well-known, pre-recorded digital signatures or identifiers. These programs identify malware by cross-referencing a suspicious program's digital signatures with the digital signatures of existing malware software which have been stored in a database specifically designed to archive and help identify a wide array of documented malware types.

Silk Road

Silk Road was a former online black market that was launched in February 2011, and subsequently shut down in October 2013 by the FBI. Silk Road served as a platform for selling illegal drugs, weapons, and other sensitive commodities and data. The platform relied on the Tor web browser that allowed users to remain anonymous. At its height, the website provided services to over 100,000 buyers, and often accepted payments in bitcoin (BTC). The founder, Ross Ulbricht, received a double life sentence without the possibility of parole for 40 years, though some human rights activists oppose his sentencing.

SIM Swap Attack

A SIM swap attack is an attack that involves taking control of a victim’s SIM card, which stores private user data and a broad range of user access credentials. Attackers executing a SIM swap attack will oftentimes deploy a variety of social engineering techniques, such as calling a cell phone provider and impersonating the victim, with the goal of obtaining sensitive personal information about the victim. If successful, the attacker will typically use the information they acquired to request a new SIM card, which will allow them to gain control over the victim’s phone number and whatever potentially sensitive data is linked to that number.

Simple Ledger Protocol

Simple Ledger Protocol (SLP) is the token standard on the Bitcoin Cash blockchain. It allows users to easily create their own tokens on top of the Bitcoin Cash protocol. SLP token creation and transactions can be viewed using an SLP-enabled block explorer.

Simplified Payment Verification (SPV)

Simplified payment verification (SPV) allows for the running of a light node (or light-client node), more commonly referred to as a crypto wallet. SPV allows a crypto wallet user to verify crypto transactions without needing to download an entire copy of a blockchain or even an entire copy of the block containing the transaction the user wants to verify.

SKALE (SKL) Token

SKL is an ERC-777 token that facilitates SKALE Network staking and security, payments, rewards, and governance voting.

SKALE Elastic Sidechains

SKALE Elastic Sidechains are highly configurable blockchains that operate on virtualized subnodes. Users create Elastic Sidechains by submitting their request to the SKALE Manager along with the required subscription fee.

SKALE Network

SKALE is an Ethereum sidechain network that creates a high-throughput, low-latency, low-cost environment for decentralized app (dApp) development.

SKALE Node Core

A SKALE Network node is known as a SKALE Node Core. Each of these nodes is compartmentalized into virtualized subnodes to accommodate multiple Elastic Sidechains simultaneously.

SKALE Virtualized Subnode

SKALE virtualized subnodes enable each SKALE Node Core to run multiple Elastic Sidechains simultaneously. In general, virtualized subnodes enable elastic provisioning of network resources according to each user’s requirements.

Skynet (Sia)

Skynet is a Layer-2 platform built on top of the Sia blockchain to facilitate decentralized content delivery and file sharing. Skynet is designed to store and serve content, providing the infrastructure to host websites and applications in a decentralized manner. The platform's name is a tongue-in-cheek reference to the Skynet platform in the Terminator science-fiction movie series.

Slashing

Slashing is a process typically employed automatically by blockchain protocols that make use of a Proof-of-Stake (PoS) or related consensus mechanism. If an investor deposits or stakes their crypto assets inside a main network validator node and the node behaves in a dishonest or malicious manner, the crypto depositor can be penalized, resulting in a loss of a portion of the initial investment.

Slippage

Within a financial context, slippage refers to the difference between the expected price of a trade relative to the actual price at which the trade is executed. Slippage generally occurs when an investor buys or sells an asset on a platform with poor liquidity and low trading volume. If there is a large gap between the bid-ask price on an exchange's order book, the asset purchaser may end up paying more for an asset or receive less of the asset than expected once the trade has been executed.

Slot (Cardano)

The Cardano blockchain utilizes a protocol called the Ouroboros Praos protocol. This unique consensus mechanism functions by breaking down time into epochs that last approximately 5 days, which are then broken down into 432,000 slots. Nodes are selected at random to be slot leaders, which in turn are selected to produce blocks.

Small and Medium Enterprises (SMEs)

Small and Medium Enterprises (SMEs) are businesses that employ a limited number of employees, as opposed to large corporations. The SME classification is used by large international organizations like the European Union (EU), the United Nations (UN), and the World Bank. SME classifications in different geographical regions will vary depending on the number of employees the company employs, but are generally in the 50 to 250 employee range. SMEs are often considered the lifeblood of a nation’s economy and generally employ a very large number of people on a national or regional scale. SMEs often outnumber large companies by a substantial margin and consist of startups and newly launched businesses by entrepreneurs, as well as long-standing local and regional family businesses.

Small Cap

In the blockchain space, "small cap coin" refers to a cryptocurrency asset that has a small market capitalization. The market capitalization, or total value of a cryptocurrency asset and its underlying blockchain enterprise, is determined by the number of circulating coins that are accessible to the public, multiplied by the price per coin. As a subjective term, there is no specific market cap threshold that signifies that an asset is a small cap coin.

SMART Alpha Bond (BarnBridge)

A SMART Alpha Bond is a flagship product offering of the BarnBridge DeFi protocol. The SMART acronym stands for Structured Market Adjusted Risk Tranches. More specifically, SMART Alpha Bonds are tokenized tranches (tranches are specialized segments created from a pool of different types of securities) of volatility-based derivatives designed to mitigate exposure to price volatility.

Smart Contract

A smart contract is a self-executing code or protocol that carries out a set of instructions that is verified on the blockchain. These contracts are trustless, autonomous, decentralized, and transparent; they are irreversible and unmodifiable once deployed. While they have several use cases, some of the most popular are various financial contracts (loans, derivatives, trading). They can also be used for legal contracts, identity management, and numerous other use cases. Popular in decentralized finance (DeFi), smart contracts can be bundled into decentralized applications (dApps) to execute more complex functions.

Smart Contract Intermediate-Level Language (Scilla) (Zilliqa)

Smart Contract Intermediate-Level Language, or Scilla, is a programming language that was developed specifically for Zilliqa. Focused on being amenable to smart contract security, Zilliqa developed Scilla to verify the security of smart contracts and decentralized applications (dApps) deployed on its blockchain protocol. Developers using Scilla can use mathematical proofs to verify that their smart contracts meet certain requirements. Scilla is a security-focused language built for smart contracts, and that was designed to fully utilize the scalability and sharding architecture of the Zilliqa network.

Smart Home

A smart home is a tech-enabled home setup in which various functions such as heating, lighting, and appliance configurations are automated or remotely managed via network-connected devices such as a mobile phone or tablet. Smart home setups usually involve the use of both hardware and software solutions to improve occupants' convenience and efficiency, and are one of the most widely recognized applications of Internet of Things (IoT) technology. For instance, an occupant's sleep tracker wearable may be synced to a room's temperature control system, which will then automatically adjust the room's temperature in accordance with the occupant's sleep patterns and personal preferences.

Smart Order Router (SOR)

Smart order routing (SOR) is an automated online trading method which detects and executes the best available trading opportunity throughout a given range of financial markets and trading venues. In essence, when implementing SOR an investor feeds a pre-established set of conditions to a set of bots or algorithms which then scan multiple markets using their given criteria in order to find the optimal environment to execute a given order. Investors typically program the algorithms used to run SOR to differentiate various trading venues in accordance with common parameters such as latency levels, fee structures, and available liquidity, as well as more complex parameters specific to that investor's unique trading strategy. As a result, running SOR requires robust API integrations across different platforms in order to effectively utilize this data-intensive, multiplatform trading strategy.

Smart Pool (Balancer)

On the Balancer platform, Smart Pools are liquidity pools with adjustable parameters that can be managed via a smart contract. These pools can be made of two-to-eight different token constants, and can be customized with configurable weights in order to represent the desired ratio of each token within a given pool. In addition to customizing token mix and weight, Smart Pool managers can also change swap fees, select/restrict liquidity providers, set max deposit value limits, and start/stop trading tied to their pool. These variable parameters allow for a hitherto unprecedented level of flexibility for liquidity providers on Balancer.

Smart Token

Smart tokens are cryptocurrencies that can be programmed with a near-infinite range of parameters. The purpose of a smart token depends on the specific parameters it was programmed with, with some smart tokens used to help reduce liquidity risk, improve security measures, or shape consumer behavior. For instance, a smart token can be programmed to dynamically adjust its value in accordance with a Constant Reserve Rate (CRR) pegged to a different base currency, programmed to work only with certain vendors or when purchasing certain items, or designed to expire after a set amount of time. The Bancor Network's Bancor token, released in June 2017, is widely recognized as the world's first smart token.

Smart Treasury (Balancer)

Through the Balancer protocol, smart treasuries can be used to automate the management of an organization’s funds. By controlling who can be a liquidity provider for a given smart pool, organizations can control who can withdraw or deposit capital. Furthermore, the assets staked in the smart treasury are always working — earning fees as a liquidity provider and executing a diversified portfolio strategy. This smart pool can therefore serve as the automated investment manager for your team’s assets, buying and selling tokens when prices reach a predetermined threshold thanks to the smart pool’s automated rebalancing feature.

SMART Yield Bond (BarnBridge)

SMART Yield Bonds are a flagship product offering of the BarnBridge DeFi protocol. The SMART acronym stands for Structured Market Adjusted Risk Tranches. More specifically, SMART Yield Bonds are tokenized tranches (tranches are specialized segments created from a pool of different types of securities) of debt-based derivatives designed to mitigate interest rate volatility.

Smishing

Smishing is a variant of a phishing attack which involves the use of misleading SMS or text messages to misdirect a target into sharing sensitive information or access. The text messages involved in a smishing attack often contain malicious links or a fraudulent customer support or authoritative phone intended for the target to click on or call. If a target responds to this call to action (CTA), it will typically go on to trigger some form of compromising activity, resulting in the divulging of sensitive information such as one's Social Security Number or credit card details, or losing access to one's devices.

Smooth Love Potion (SLP)

Smooth Love Potions (SLPs) are tokens that Axie Infinity users are required to have if they wish to breed their Axies. The tokens can be earned within the Axie Infinity metaverse and can be traded on Uniswap.

SMS (Short Message Service)

SMS, or Short Message Service, is the main text messaging format employed by most mobile phones in the world. SMS makes use of standardized communication protocols that allow mobile devices to send and receive short text messages up to 160 characters in length. SMS also allows users to send messages to landlines via an intermediary service. The first SMS was sent in December of 1992, and by 2010, SMS was the most widely used data application with an estimated 3.5 billion active users, making up about 80% of all global mobile devices.

Snapshot

In the context of blockchain, "snapshot" has several meanings. It usually refers to the capability to record the current state of a blockchain network during a certain time period. Often a snapshot is taken during a specific block to record the entire history of the ledger up until that point and includes data such as transactions, existing addresses and balances, metadata, and more. Snapshot can also refer to a dataset which records the balance of each user's blockchain address in order to fairly distribute tokens during a token airdrop giveaway or token distribution event like an Initial Exchange Offering (IEO).

Snowball Consensus Mechanism (Avalanche)

Snowball is Avalanche’s proprietary Proof-of-Stake (PoS) consensus mechanism. Snowball requires validator nodes within a subnet to repeatedly query each other to determine the validity of network transactions until they reach consensus. Snowball is the most advanced portion of Avalanche's consensus mechanism which is a combination of Avalanche’s Directed Acyclic Graph (DAG) architecture, the system’s Slush consensus (single-decree consensus), and Snowflake (Byzantine Fault Tolerance-based) mechanisms.

Social Engineering

Social engineering is a broad term that encapsulates a wide array of techniques that exploit psychological factors – such as fear, trust, panic, lack of information, and confusion – to compromise a target. Rather than directly hacking a system or identifying technical weakness in a target's devices or digital accounts, social engineering focuses on the manipulation of individuals to perform acts which may not be in their best interest, such as divulging sensitive data or inadvertently transferring funds to a malicious actor. Social engineering tactics can also be used to gain access to networks and devices, in which case a malicious actor can wrest control away from the legitimate owner to install malware in the system.

Social Impact Fund

A social impact fund is an investment fund that is designed to benefit the environment, humanitarian and social issues, and other related industries. Investors who contribute to social impact funds value the commitment to enterprise social responsibility and the betterment of society as a whole. Socially Responsible Investing (SRI) and Environmental, Social, and Governance (ESG) Investing are two different types of impact investing that are often employed by social impact funds.

Social Token

A social token is a cryptocurrency, or crypto token, that is structured around a particular brand, community, or individual. Social tokens representing social media influencers and other popular figures are gaining popularity. Social tokens typically grant their holders some sort of increased access to the brand, community, or individual they represent — whether that be a line of communication, exclusive products, event access, or governance rights.

Socios (Chiliz)

Socios is a blockchain-enabled sports entertainment platform designed in the form of a mobile application. Socios works by allowing users to purchase CHZ — Chiliz' native token — which can then be exchanged for Fan Tokens that correspond to their favorite sports teams. By owning Fan Tokens, holders get access to exclusive rewards and the ability to vote in polls that influence team decisions like, for example, uniform designs. This model incentivizes users to buy CHZ, thus helping the Chiliz platform sustain long-term growth.

Soft Cap

Soft cap refers to the minimum amount of funds that an upcoming blockchain enterprise wishes to raise via its initial funding round. A soft cap is usually speculative and arbitrarily defined, and contrasts with a hard cap which is the maximum designated amount available to earn through a funding round. Sometimes if a team is unable to reach the soft cap, or minimum required fundraising amount, funds will be returned to investors and the project may cease development. In other cases when the soft cap is not met, projects may continue development despite not reaching their stated goal.

Soft Fork

A soft fork is a software update of a blockchain network that is backward compatible, meaning that a piece of software which has undergone a soft fork remains interoperable with its older legacy system. This means that nodes can continue to communicate with nodes that have not upgraded. By contrast, if a blockchain undergoes a hard fork, only new blocks generated afterwards are recognized as valid. As a result, soft forks generally entail less drastic protocol changes than hard forks.

Soft Peg

A soft peg is a specific type of exchange rate model that is applied to a currency to maintain its value relative to a reserve currency or basket of currencies. In a blockchain context, a soft peg is usually applied to stablecoins to maintain their 1:1 ratio to a fiat currency like the U.S. dollar, and typically allow for a limited degree of financial flexibility that allows the system to deal with economic fluctuations and shocks.

Software as a Service (SaaS)

Software as a Service (SaaS) is a software licensing method whereby software is usually rented via a subscription-based service. SaaS is sometimes called “on-demand software” and is commonly classified as part of cloud computing, along with similar software delivery methods. SaaS is commonly accessed by enterprises that rent software platforms, often as a white-label, turnkey product that is customized for their specific needs. SaaS is leveraged for many types of business applications, including office software, computer-aided design (CAD) software, development software, management information systems (MIS), virtualization, geographic information systems (GIS), and an endless array of additional uses.

Software Development Kit (SDK)

A software development kit (SDK) is a specialized suite of software development tools created in order to enable software engineers to create digital applications and perform other useful functions. Most SDKs include common software development tools such as compilers, debuggers, and software frameworks, which make it easier for developers to design and build new software. There are a wide array of available SDKs catering to different platforms and use cases within the blockchain development scene and beyond.

Software Stack

A software stack is a set of software components or subsystems that are used to build applications that operate on a computer network without requiring additional outside resources to run optimally. For a software engineer to build a desktop or mobile application, they must make use of various components (or sections) of the stack. Software stacks typically have different levels (e.g. operating system, web server, middleware, database), and applications are said to run on top of the stack. Within most network architectures, the stack consists of multiple layers — such as the application layer, client layer, and service layer.

Software Wallet

A software wallet is a digital wallet which stores a user's public and/or private keys, thereby securing the user's digital assets. Since software wallets are essentially computer programs, they are typically locally stored in a user's desktop or mobile phone and are remotely connected to the internet. Software wallets are oftentimes more convenient than hardware wallets, but are also generally more susceptible to hacks. Common types of software wallets include desktop wallets and mobile wallets. When using a software wallet, it is important for users to keep devices and software up to date in order to minimize the risk of a cybersecurity breach.

Solana (SOL)

Solana is a smart contract-enabled blockchain that aims to natively solve many of the scaling and throughput issues faced by other Layer-1 blockchain networks. SOL is the native coin of the Solana network, and is burned to pay for fees on the Solana network. Solana's users can also stake SOL in order to become a blockchain node, and the platform intends to enable SOL to be used in Solana platform governance in the future.

Solid-State Drive (SSD)

A solid-state drive (SSD) is an advanced type of computer storage device that is much faster than its traditional hard disk drive (HDD) counterpart because it uses flash memory instead of spinning and moveable components like HDDs. SSDs are in many ways responsible for a significant increase in computer speeds because of their low read-access times and fast throughput. SSDs were first developed in the late 1970s but were too large and too expensive to mass produce for everyday retail consumption. However, since the early 2010s, SSDs have been sold in computers that are accessible to the everyday consumer.

Solidity Programming Language (Ethereum)

Solidity is the software development programming language designed specifically for Ethereum’s blockchain framework. Solidity is an object-oriented programming language designed for building smart contracts that work in unison with the Ethereum Virtual Machine (EVM) and the Ethereum network.

Solo Mining

Solo mining is where you mine crypto on your own directly on the Proof-of-Work (PoW) blockchain you are mining on. While you don’t have to pay any fees to solo mine and get to keep the entire block reward, it also can make block rewards infrequent, sporadic, or very unlikely. For this reason, solo mining is largely a thing of the past for most large mineable blockchains. Most crypto miners join mining pools that pool their hash rate and distribute block rewards to pool participants based on the hash rate they contribute to the pool.

Solvency

Solvency is the ability of an organization to meet its financial obligations from a regulatory and compliance standpoint. For GUSD, this means that the amount of USD maintained in a holding account is equivalent to or greater than the tokens in circulation. This solvency measure affirms that the Gemini Dollar tokens maintain their value for both the short term and the long term.

Somnium Cube Token (CUBE)

Somnium Cube (CUBE) is an ERC-20 utility token that facilitates economic activity across the Somnium metaverse. CUBE is the equivalent of buying game tokens at an arcade as it allows you to purchase in-game assets such as digital land parcels and avatars.

Somnium Space Metaverse

The Somnium Space metaverse is a persistent virtual space that hosts users in a single realm while enabling the development of individual worlds. Players utilize virtual reality (VR) headsets and the internet to create a connection between their physical reality and the Somnium VR world.

Source Code

Source code refers to a collection of informatic code that is responsible for determining how a software program will operate based on a list of deterministic instructions and criteria. Essentially, a computer or blockchain network’s source code is the primary initial state of the software during its creation. Programmers comment, edit, read, and make modifications to this source code before the initial version is finalized. Source code is often publicly released by open-source software developers to contribute to the creation of a computerized network in a fully accessible, open manner that anyone can contribute to.

Source-Code Fork

A source-code fork is a type of hard fork that results when software engineers take the original source code from an existing blockchain network to create a new network. Like all hard forks, source-code forks can make previously invalid blocks and transactions on a blockchain network valid, and require all nodes from the previous network to upgrade to the latest version of the software protocol. Further, source-code forks, like all hard forks, are not backwards-compatible, meaning they cannot be reversed to their previous state.

Spartacus Attack

A Spartacus attack is a type of Sybil attack that works by stealing the identity of other nodes within a distributed or decentralized network. It does so by exploiting trust and reputation, but does not generate a pseudonymous logical ID. Instead, it simply steals one from a real node, thereby inheriting its trust value. Spartacus attacks usually take place during the network bootstrapping phase, and occur when the Spartacus looks for a bootstrapping node, and later for nodes with high trust scores. The Spartacus pings these nodes. After those nodes appear to be disconnected, it replaces them by copying their ID hashes.

SPDR S&P 500 ETF (SPY ETF)

The SPDR S&P 500 Trust ETF, sometimes called the SPY ETF, is one the most well-known electronically traded funds (ETFs) in the world and currently trades on the New York Stock Exchange (NYSE). The SPY ETF is used to track the American Standard and Poor’s 500 Index, or S&P 500, which is composed of 500 of the largest companies listed on the U.S. stock market and many of the largest tech stocks on the planet including Apple Inc., Microsoft, Amazon.com, Facebook, Alphabet Inc. (class A & C), Tesla Inc., and Berkshire Hathaway.

Spear Phishing

Spear Phishing is a variant of phishing which targets a specific individual, organization, or business. As is the case with most phishing attacks, spear phishing typically entails the use of misleading emails or other forms of electronic communications. Attackers may tailor these fraudulent communications with the target's position within an organization in mind, or include other contextual information to more effectively mislead the victim. As a result, spear phishing requires more background research on a target than most other forms of phishing attacks.

Speculative Investment

A speculative investment entails a considerable degree of risk of financial loss, both in terms of principal and potential unrealized gains. However, speculative investments are usually those with a high potential upside, making them attractive opportunities for investors with a high tolerance for risk. Many blockchain skeptics consider cryptocurrencies a speculative investment, while more traditional speculative investments include investment in early-stage startups, trading options, and certain commodities.

SPL Tokenization Standard (Solana)

The SPL tokenization standard is the token standard employed by tokenized assets that run on the Solana blockchain and make up a critical component of the Solana ecosystem as a whole. SPL assets are typically hosted on sovereign blockchains that run on Solana.

Spot Market

The spot market is a public financial market in which the trade of financial instruments or commodities are immediately settled and delivered. While the delivery of physical goods purchased may be slightly delayed due to real-world logistical considerations or business protocols. However, spot market purchases are settled at the price fixed at the point of purchase rather than the price at the time of distribution. This contrasts with futures markets, in which delivery is due at a later date, and prices may fluctuate in accordance to market movements which occur after an exchange has been made.

Spot Trading

Spot trading refers to the process of buying and selling assets without using leverage and stands in contrast to derivatives trading such as futures or options. Spot orders come in different varieties: limit orders allow one to set an order for a particular price (which an asset may or may not eventually reach), market orders allow one to buy an asset at its current market price, and other more complex order types are also available. Spot trading is considered much less risky than derivatives trading because it doesn’t involve leverage and potential asset liquidations.

SPV Chain Simulation Technology (Clover Finance)

SPV chain simulation technology is the interoperable two-way peg (2WP) bridge framework employed by the Polkadot-specific Clover Finance blockchain project to facilitate trustless, decentralized connection between blockchains. The system enables cross-platform interoperability that allows various asset and data types to be sent between different blockchains. SPV chain simulation technology enables the compatibility of Ethereum-based Clover address types with their Polkadot-based Clover counterparts and, in the process, facilitates cross-chain interoperability between both systems.

Spyware

Spyware is a specific type of malware that is designed to record, track, and harvest as much information as possible on an infected device. Different types of spyware include trojans, adware, keyloggers, tracking cookies, and other types of system monitor software. Spyware is often distributed to unsuspecting users through infected websites, pop-up ads, emails, file downloads, and other methodologies. Spyware, like other types of malware, can be detrimental to crypto users because it allows for the possibility of data theft of private wallet keys and other info, which can be used to steal a user’s funds.

Stablecoin

A stablecoin is a digital currency created with the intent of holding a stable value. The value of most existing stablecoins is tied directly to a predetermined fiat currency or tangible commodity, like Gemini dollar (GUSD), which is pegged 1:1 to the U.S. dollar. However, stablecoins can also achieve price-stability through collateralization against other cryptocurrencies or algorithmic token supply management. Since stablecoins do not fluctuate significantly in price, they are designed to be used rather than as an investment.

Stake (EOSIO)

On the EOSIO system, when software developers deploy and interact with smart contracts through introduced actions, they are backed up via other types of resources: RAM, CPU and NET. Developers are able to stake NET and CPU, and purchase RAM with EOS coins.

Staking

Staking is the process through which a blockchain network user 'stakes' or locks their cryptocurrency assets on a network as part of the consensus mechanism, thus ensuring the security and functionality of the chain. Staked assets are usually held in a validator node or crypto wallet, and in order to encourage staking most projects reward the holders of staked tokens/coins with annualized financial returns, which are typically paid out on a regular basis. Staking is a core feature of Proof-of-Stake (PoS) blockchain protocols, and each blockchain project which incorporates a staking feature has its own policies for staking requirements and withdrawal restrictions.

Staking Derivative

A staking derivative is a financial instrument that is typically employed within specific types of decentralized finance (DeFi) blockchain protocols. Staking derivatives leverage staking, or the deposit of assets into a blockchain protocol to accrue regular financial rewards, in a derivative form, usually through a Proof-of-Stake (PoS) blockchain protocol. Staking derivatives are often given a prefix in front of the traditional token name, such as "cTokens" that represent other assets like ETH (in the form of cETH) within the Compound blockchain.

Staking Pool

On a Proof-of-Stake network, staking pools allow multiple cryptocurrency stakeholders to combine tokens/coins in a collective pool in order to secure the benefits held by a larger, collectivized network stake. By combining computational resources, the individual stakeholders who choose to participate in a staking pool aggregate their staking power to more effectively verify and validate new blocks, which consequently increases their chances of earning a portion of the resulting block rewards.

Stalling Delay

A stalling delay is a coded, time-based technique that certain types of malware use to bypass a network's cybersecurity defenses. After infecting a target system, malware with a stalling delay mechanism typically executes a series of useless, innocuous CPU cycles in order to delay the execution of its actual malicious code until the target network is no longer on alert. If the malware successfully bypasses the security's defenses, it can then go on to execute its malicious code with full effect.

Standard Deviation

Standard deviation is a measure of how far each observed value in a data set is from the mean value. This measurement indicates how spread out the data is within a data set, and how far specific data is from the general norm. Within the context of investing, standard deviation can be used to compute a current rate of return on an investment relative to its historical mean in order to determine the investment's historical volatility. In general, volatile investments are characterized by a high standard deviation, while more stable investments usually have low standard deviations.

Startup

A startup is a recently launched company that is in the early stages of its development lifecycle. A startup is generally an entrepreneurial pursuit founded using capital supplied by the founding team itself and perhaps immediate friends or family. Startups must work hard to develop a strong business model (often with a prototype), with hopes of securing additional investment from high-net-worth individuals (HNWIs), venture capitalists (VCs), and other means of funding.

State

The state as it relates to blockchain or computer science is the specific status of a computer system that is always changing over time. The state of a blockchain is vitally important to the health and proper operation of the network because it records and stores all the historical changes that have occurred on the network throughout its lifecycle. This data can be used to restore the system to a previous state (or version) if the network is ever hacked or experiences a significant outage or failure.

State Channel (Scaling Solution)

A state channel facilitates two-way communication between a blockchain and off-chain transactional channels using various mechanisms to improve overall transaction capacity and speed. A state channel does not require immediate miner involvement to validate the transaction. Instead, it is a network-adjacent resource that is sealed off by using a multi-signature or smart contract mechanism. When a transaction or batch of transactions is complete on a state channel, the final ‘“state”’ of the ‘“channel”’ and all its inherent transitions are recorded to the underlying blockchain. The Liquid Network, Celer, Bitcoin’s Lightning Network, and Ethereum's Raiden Network are examples of state channels. In the trilemma trade-off, state channels sacrifice some degree of decentralization to achieve greater scalability.

State Machine Replication (SMR)

State Machine Replication (SMR) is a general approach in distributed computing for building fault-tolerant systems. This is achieved through the replication of servers (states or state machines) and organization of client exchanges with server replicas. SMR accomplishes this by deploying copies of a web service across a set of servers rather than just one. This approach can potentially increase a system's performance and capacity since the replicas provide more resources to the service, while achieving operational fault tolerance through the elimination of a single point of failure.

Status Network Token (SNT)

The Status Network Token is the native ERC-20 utility token of Status Network, an open-source messaging platform. SNT plays a key role in Status' decentralized platform governance, as any Status community stakeholder can use SNT to vote on network proposals. With each vote the SNT committed is cloned into a separate decision token that is counted. As a result, while the amount of SNT tokens a user holds at that time of the vote represents that user's voting power for that decision, it does not cost any SNT to participate.

Stellar (XLM)

Stellar is an open-source, decentralized payment protocol that enables seamless, cross-border transactions between all forms of currency. The project's native coin, stellar lumens (XLM), is used to pay the network's transaction fees, prevent network spam, and provide liquidity via the Stellar Distributed Exchange (SDEX).

Stock Keeping Unit (SKU)

Stock Keeping Units (SKUs) are used in inventory management to classify a distinct type of item for sale. Different SKU classifications include color, size, packing material, manufacturer, description, and warranty terms. SKUs are used by companies, manufacturers, warehouse staff, and retailers to identify items as they move through a supply chain, and to provide data points for enterprise management systems.

Stop-Loss Order

A stop-loss order is an order type designed to help prevent excessive losses for traders. It works by setting a specific “stop” and “loss” price, whereby the “loss” price is the first price that triggers the asset to prepare to sell if the “stop” price is reached. Stop losses are designed to sell a security if its price falls below a certain amount, to help guard against unexpected losses. For instance, a user could specify the sale of a particular company’s stock or cryptocurrency asset if it falls in value from its original purchase price as described above.

Storage Miner (Filecoin)

The Filecoin protocol relies on storage miners to furnish its marketplace of decentralized cloud storage. Storage miners are essentially nodes that solve cryptographic proofs in order to verify storage across time. These nodes must use Filecoin tokens (FIL) as collateral to ensure that they uphold their contractual obligations, and in return earn additional FIL by storing data for clients on the network. Due to the design constraints imposed by Filecoin's Proof-of-Replication (PoRep) and Proof-of-Spacetime (PoSpacetime) mechanisms, storage mining requires fairly powerful hardware to meet the network's storage and algorithmic proof requirements.

Storage Node (Storj)

The Storj network utilizes storage nodes to provide bandwidth to the network and store clients' data in a secure, decentralized format. Any individual or entity with a stable internet connection and excess hard drive space and bandwidth can set up a storage node. Each month, node operators are compensated via STORJ tokens valued in USD based on current market rates.

Store of Value

A store of value is an asset that is expected to maintain its value/purchasing power over time and can be reliably retrieved and exchanged at a later date. Assets that have historically been considered reliable stores of value include fiat currency, real estate, and rare metals such as gold and silver. With blockchain technology growing increasingly mainstream, an increasing number of people also consider certain cryptocurrencies, particularly bitcoin (BTC), as effective stores of value.

Storj

Storj is a blockchain-enabled data storage network that allows users to access remote, decentralized data storage and retrieval services, or offer storage services by using excess hard drive space and bandwidth. While users' files are not stored on the blockchain, Storj uses hashing, Proof of Work (PoW), key-pair cryptography, and other blockchain features to offer data storage services and rates which are similar to, and in some cases superior to, what is offered by larger centralized cloud storage services.

STRIDE (Crypto.com)

STRIDE is a threat modeling methodology used by Crypto.com and other enterprises in order to identify and deter potential cybersecurity threats. The word 'STRIDE' is an acronym that stands for "Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege." Each of these concepts is a common cybersecurity threat category, and security experts typically use STRIDE as a conceptual framework in order to methodically explore various ways in which a system must be protected to avoid being compromised.

Strike Price

A strike price is the price at which an investor can exercise the right to buy or sell an underlying security in an options contract. The value of the strike price is set by financial exchanges, and may be a function of the underlying security's spot price, which is the market price of the security on the day the option is taken out. For example, suppose an investor purchases a $20 monthly call option to purchase bitcoin (BTC) at $75,000. As a result, the strike price of this contract is $75,000, meaning the investor can choose to exercise their option to purchase the cryptocurrency at this price before the month is up and the contract expires.

Stroop

The smallest denomination of lumens (XLM), divisible to 7 decimal places (1 stroop = 0.0000001 XLM).

Subgraph (The Graph)

A subgraph is a specialized type of application programming interface (API) employed by The Graph indexing and querying platform. It is designed to create a global graph — via the Ethereum network — of some of the world’s most important public data, allowing software developers to use, index, and serve blockchain data in a cryptographically verifiable manner. Subgraphs help reduce the typically centralized structure of mainstream indexing servers, which often require significant engineering and hardware resources to achieve reasonably secure access to decentralized data.

Subgraph Manifest (The Graph)

A subgraph manifest is a subgraph description that allows subgraphs to autonomously learn what Ethereum data to index, as well as how to index it. Subgraph manifests can help form subgraphs — which after deployment can become a part of the network’s global graph of blockchain data. Often, subgraph manifests are part of the digital database (made up of many subgraphs) that defines what specific smart contracts a subgraph indexes, which events from the contracts are important, and how to map event data to entities that a Graph Node stores and generates queries around.

Subnetwork (Subnet)

A subnetwork (subnet) is a separate blockchain protocol that is built to operate within a Layer-1 blockchain protocol (such as the Ethereum or Bitcoin network). It is quite common for there to be many subnetworks — up to hundreds, or even thousands in the future — that run in unison with and complement the parent chain. Subnetworks are commonly employed by various blockchain ecosystems in the industry, and all have different design parameters, depending on their individualized architecture and their proposed real world uses.

Substrate (Polkadot Development Framework)

Substrate is a blockchain integration platform and application development framework that was designed by Parity Technologies, the creator of blockchain interoperability pioneer Polkadot. The purpose of Substrate is to help simplify the process of building dApps or independent blockchains that run on the Polkadot network. Substrate accomplishes this by offering a fully adaptable blockchain design framework that features software development in numerous languages, forkless upgradability, light-client architecture, and multifaceted development tools. As a result, Substrate is one of the most powerful components of the Polkadot ecosystem. However, blockchains on the Polkadot network do not need to be built with Substrate.

Substrate Builders Program (Polkadot and Kusama)

A program by Parity Technologies that provides support to projects building chains, infrastructure, or decentralized apps (dApps) utilizing the Substrate blockchain-building framework. This program provides technical support, direct funding, and supplemental marketing and business development assistance.

Supermini (Akash Network)

The Akash Network Supermini is a mining rig built and designed by the Akash Network. It allows its users to earn AKT tokens by operating the device. The Supermini is designed to give users access to a small, powerful, compact, and portable supercomputer that acts as an AKT token-incentivized node on the Akash Network.

Sushi Liquidity Provider (SLP) Token

Sushi Liquidity Provider (SLP) tokens are the platform-specific term for liquidity provider (LP) tokens on the SushiSwap protocol. SLP tokens represent a proportional share of pooled assets in a particular SushiSwap liquidity pool. If, for example, a user provided liquidity to a liquidity pool for ether (ETH) and sushi (SUSHI), they would receive SUSHI-ETH SLP tokens.

Swap (Derivative Swap)

A swap is a derivative contract that enables parties to exchange the cash flows or value of one asset to another. Usually swaps involve cash flows contingent on a notional principal amount such as a bond or loan. Generally, the principal amount does not change hands during a swap, while different portions of cash flow in the agreement make up one leg. Often one cash flow exchange is fixed while the other(s) are variable based on a floating exchange rate, specific interest rate, or index price. Derivatives swaps are typically carried out by large institutions and take place over the counter (OTC).

Swarm

In the context of the BitTorrent protocol, a swarm is the group of peers that is sharing a torrent (file).

Swing Trader

Swing trading is a market trading strategy that attempts to capture short- to medium-term gains based on fluctuations in the value of stocks, commodities, and/or currencies over a few days or weeks. In order to be effective, swing traders must actively monitor their positions and time trades meticulously. Their risk/reward ratio sits on the spectrum between that of day traders and trend traders. In most cases, swing traders typically rely on charted technical indicators to identify viable trading opportunities, although technical analysis is regarded by many as an imperfect science.

Switcheo

Switcheo is a decentralized cryptocurrency exchange (DEX) on the NEO blockchain with a product focus on transparency and convenience that allows for the cross-chain swapping and trading of EOS, ether (ETH), and NEO coins. The project’s native token, Switcheo Token (SWTH), is a NEP-5 standard digital currency that can be used on the Switcheo network for trading discounts, as well as for access to several exclusive offerings and services. SWTH was upgraded in October 2020 under a revised monetary policy smart contract.

Sybil Attack

A Sybil attack is an online security breach where an attacker can create multiple fake identities that can act as nodes in order to flood a target network with the intent of disrupting it or taking it over. Sybil attacks exploit how legitimate nodes form connections with one another. Sybil attacks can be especially dangerous when directed at systems in which new nodes are created and synced with relative ease.

Symmetric Encryption

Symmetric encryption is a form of encryption which uses the same key to both encrypt and decrypt electronic information. Both entities communicating via symmetric encryption must have identical copies of this key, which should be kept secret and not shared with anyone in order to preserve the security of their interactions. By contrast, asymmetric encryption utilizes two keys — a public key to encrypt information, and a private key to decrypt information.

Syntax (Computer Science)

In computer programming, syntax is a classification of how code is formed and combined to form larger sequences. As it relates to computer programming and language utility, syntax is usually compiled using either a statically typed syntax format, where the code must be checked before deploying it to a program, or dynamically typed, where the code is checked only after the program is running. Normally, statically typed languages are faster to write compared to dynamically typed languages. Different languages use different types of syntax but there are two main syntax formats, graphical or typed.

Synthetic Asset

Synthetic assets are digital cryptographic assets that represent commodities like gold and silver, stablecoins, fiat currencies, and similar financial instruments. In short, synthetic assets are tokenized versions of traditional asset types that are often less readily available to users who participate in the traditional financial sector. Synthetic assets can often represent derivatives contracts from underlying assets such as stocks, bonds, commodities, currencies, indices, and interest rates. This capability gives investors the opportunity to invest in traditional asset classes through unique decentralized finance (DeFi) instruments and their underlying protocols, thus increasing ease of use and lowering the barrier to entry for investing in the assets in question.

Synthetix (SNX)

Synthetix is a token trading platform built on Ethereum that allows users to exchange tokenized representations and derivatives of cryptocurrencies, stocks, currencies, precious metals, and other assets in the form of ERC-20 tokens. This is accomplished through Synthetix' dual-token model, whereby users stake the platform's main token, Synthetix Network Tokens (SNX), as collateral in order to create new synthetic assets. These 'Synths' are designed to track a metric, usually price, of a real-world asset, thereby allowing users to invest in the asset without actually holding it, much like derivatives. Synthetix preceded Universal Market Access (UMA), which is also built on Ethereum and was launched to achieve a similar purpose.


T

T-Address (Zcash)

On the Zcash blockchain, a t-address is a public address that offers similar transparency levels to a standard bitcoin (BTC) address. By contrast, a z-address is a fully private address that utilizes Zero-Knowledge Proof (ZKP) cryptography to shield address transactions and balances. Zcash's dual-address setup was designed in order to empower users to decide whether to opt for anonymized or publicly viewable transactions, while transactions can be sent freely across the different address types.

Tailgating (or Piggybacking)

Tailgating attacks, also known as 'piggybacking', is a form of rudimentary data breach that typically entails an unauthorized individual following an authorized individual into a secured building or area. In most instances, the perpetrator of a tailgating attack is attempting to access sensitive information or carry out some other malicious act once on the premises. While this attack is low-tech and seemingly straightforward, it is nonetheless a widespread security breach with potentially catastrophic consequences.

Tamper-Proof

Tamper-proof is the characteristic of a blockchain network’s ability to be immutable and censorship-resistant. Blockchains are designed to be immutable and free from manipulation in order to maintain the integrity and transparency of the system in a trustless manner without the need for centralized authorities. Once data (e.g., transaction history) is uploaded onto a blockchain, it should be unalterable so that malicious actors cannot modify the transaction history of a blockchain to potentially steal cryptocurrency or alter the network records.

Tangible Asset

A tangible asset is any asset that can be physically touched. Examples of tangible assets include a house, a car, or a computer, among other items. As they relate to blockchain, tangible assets include data hosting centers, cryptocurrency mining rigs, or mobile phones that employ the use of a cryptocurrency wallet. The classification of cryptocurrencies and non-fungible tokens (NFTs) is ambiguous because they can be stored in a digital wallet or crypto exchange and have characteristics that are both tangible and intangible.

Tangle (IOTA)

The IOTA Tangle is the name given to the IOTA Directed Acyclic Graph (DAG) distributed ledger protocol. The Tangle is designed specifically to be used for IOTA’s Internet of Things (IoT)-based business model and was built by the IOTA foundation in Germany. The protocol was developed to allow for the use of fee-less micro-transactions designed to accommodate the growing global ecosystem of IoT devices, which include smart appliances, smart homes, smart cars, wearables, and much more.

Tardigrade (Storj)

Storj approaches its decentralized data storage ecosystem by bifurcating its product into the supply and demand sides of the market. Tardigrade is a division powered by Storj Labs which focuses on the demand side of the business. In order to make it as easy as possible for anyone to buy decentralized storage on Storj, Tardigrade was formed to handle all issues relating to the platform's customers, developers, and partnerships. Storj itself, on the other hand, is tasked with managing the platform's storage node operators, tokenomics, and community.

tBTC

Developed by the Cross-Chain Group, tBTC is a decentralized and trustless system for wrapping bitcoin (BTC) on the Ethereum network. Each tBTC token is an ERC-20 token redeemable for BTC at a 1:1 ratio, with a total supply that is also pegged to the total supply of BTC. By minting tBTC, users create bitcoin tokens (without a middleman) that enable them to use wrapped bitcoin in Ethereum's decentralized finance (DeFi) ecosystem.

TBTC Deposit Token (TDT)

The TBTC Deposit Token (TDT) is a non-fungible token (NFT) used in the tBTC mechanism as the medium of exchange between tBTC tokens and bitcoin (BTC) as the wrapping takes place. New TDT is minted whenever a user requests a deposit to convert BTC to tBTC, and burned whenever tBTC is exchanged for BTC.

TCAP (Total Market Cap) Index Token

TCAP (Total Market Cap) in an Ethereum smart contract that tokenizes the total market capitalization of all cryptocurrencies and tokens listed on certain crypto data providers.

Technical Analysis (TA)

Technical analysis (TA) is a charting evaluation method employed by traders and investors by analyzing specific patterns on charts such as price and trading volume. There are hundreds of technical indicators that may be utilized in TA. Some of the most popular indicators include relative strength index (RSI), moving average convergence divergence (MACD), and Bollinger Bands. Technical analysts attempt to extrapolate future price movements from various historical data.

Technical Indicator

A technical indicator is a specific mathematical heuristic or pattern-based signal based on the historic price, volume, and/or open interest of a security or contract. Technical indicators are commonly used by traders to predict future price movements, and constitute a fundamental component of technical analysis (TA).

Technical Resistance Level

Within the context of technical analysis, a resistance level is a specific price point at which a stock or security has exhibited difficulty maintaining or surpassing in the past. As a result, once the price of a security reaches or nears an established resistance level once again, price movement can often stall or reverse. Different traders use different forms of technical analysis and different time frames to determine specific resistance levels. In many cases, commonly recognized technical indicators that suggest that a stock has neared its resistance level can trigger a self-fulfilling prophecy whereby traders attempt to front-run the market by selling the security in anticipation of a trend reversal.

Technical Support Level

In technical analysis, a support level is a specific price level which a stock or security fails to break below. Support levels are often created when many buyers purchase an asset at or near the same price it has fallen to in the past. Traders often visualize support levels using different technical indicators (such as moving averages) or by drawing trend lines on a chart to connect the lowest lows for a specific time period. The opposite of a support level is a resistance level, and both should be considered when practicing proper risk management while trading and investing.

Telegram

Telegram is a free cloud-based cross-platform instant messaging (IM) platform initially launched in 2013. The platform also provides end-to-end encrypted Voice Over Internet Protocol (VOIP) calling, file sharing, and other services. Telegram is built for Android, iOS, Windows, Mac, and Linux. It is commonly used in the blockchain industry because of its ability to create project-based business pages for different blockchain platforms that allow prospective users and clients to ask questions regarding ongoing blockchain project development. Telegram has sometimes come under fire because of its extremely open structure, which has become prevalent for scams and malicious behavior.

Tendermint Core Byzantine Fault Tolerance (BFT)

Tendermint Core Byzantine Fault Tolerance (BFT) is a language-agnostic consensus method designed by the Ignite team (previously Tendermint) to be a more scalable, secure, and decentralized version of Practical Byzantine Fault Tolerance (pBFT), State Machine Replication (SMR), and Depth Limit Search (DLS) algorithms. As a result, Tendermint Core supports state machines, enables fast finality rates, and can tolerate up to a third of its constituent nodes failing before network performance is significantly affected. This consensus engine was used to construct the Crypto.com blockchain, the Binance decentralized exchange (DEX) protocol, and other notable blockchains.

Terraswap

Terraswap is an automated market maker (AMM) created by the Terra blockchain project. It refers to itself as “a decentralized protocol for seamless access to asset liquidity on Terra.” The system allows users to exchange and swap native Terra and CW20 tokens (the CosmWasm token standard) directly from their Terra Station wallet using a web extension. All of Terra’s fiat-based stablecoins, Mirror Protocol’s synthetic mAssets, and other related Terra assets can be traded and exchanged on Terraswap.

TerraUSD (UST)

TerraUSD (UST) is one of the algorithmic stablecoins used on the Terra blockchain ecosystem to represent a value pegged at a 1:1 ratio to a fiat currency (in this case, the U.S. dollar). TerraUSD, like TerraKRW, TerraEUR, TerraJPY, and TerraSDR are stablecoins built by Terra and used in its ecosystem. In May 2022, UST lost its peg and quickly dropped to a value of $0.04 USD (where it remains as of June 2022).

Testnet

A testnet is a sandbox or testing environment for a blockchain network typically made available for development purposes prior to a mainnet launch. Testnets are commonly used to ensure that the blockchain system is adequately secure and functional in accordance with its intended design. Once the testnet has been audited and pressure-tested, developers often fix bugs or add new features to the project's mainnet prior to launch. Testnets are generally not meant to be directly converted into mainnets, so they are usually unable to broadcast or verify network transactions in the same way that a mainnet system is able.

Tether (USDT)

Tether (USDT) is the world’s largest stablecoin by total market capitalization and is pegged at a 1:1 ratio to the U.S. dollar. Tether’s USDT stablecoin is owned and operated by Tether Limited, which is the parent company of the centralized cryptocurrency exchange Bitfinex. Apart from USDT, Tether Limited also offers customers a gold-backed stablecoin called Tether Gold (XAUT) which mimics the current price of gold using a 1:1 ratio. As of September 2021, the USDT stablecoin had a market capitalization of approximately $65.5 billion USD and a circulating supply of 65.5 billion USDT tokens.

Text-Based User Interface (TUI)

In computing, a text-based user interface (TUI) is a user interface (UI) that makes use of text characters, symbols, and colors while running in a character-based terminal. TUIs were developed as an early form of human-computer interaction before the widespread development of graphical user interfaces (GUIs). Similarly to GUIs, TUI interfaces often use an entire screen and accept mouse, keyboard, and other computational input types. Disk Operating System, or DOS, which was initially released in 1981, was one of many early text-based UIs released in the 1960s, 1970s, and 1980s.

Tezos (XTZ)

Tezos is a Proof-of-Stake (PoS) blockchain platform that provides a decentralized, global computer on which developers can build decentralized applications (dApps). XTZ is the native token of the Tezos network, used for paying transaction fees on the network, staking, and earning rewards.

The DAO

The DAO was a decentralized autonomous organization (DAO) that launched in 2016 on the Ethereum blockchain. The DAO was designed to be an investor-directed cryptocurrency venture capital fund, but after raising $150 million USD worth of ether (ETH) through an initial token sale, the project was hacked, resulting in the loss of millions of dollars worth of ETH. This hack is notable in the crypto space as it led to a schism within the Ethereum community that resulted in a hard fork of the Ethereum network that created two separate blockchains, Ethereum (ETH) and Ethereum Classic (ETC).

The Gold Standard

Money linked to the value of physical commodities like gold and silver utilizes the gold standard. The gold standard formed the basis of the international currency market until the 20th century. But in 1971, the system came to an end when the U.S. halted the direct conversion of U.S. dollars into gold.

Theta Token Minter

The Theta Token Minter is Theta’s specialized token-minting system that allows any user to create new TNT-20 tokens on the Theta blockchain with little to no smart contract coding experience. Through this mechanism, users can simply input the intended token name, ticker symbol, and supply parameters of their new token and the Token Minter will automatically mint the new tokens. These tokens can be created without technical expertise and can be configured to have either a permanently fixed or variable supply — characteristics that foster the creation of a wide range of applications and assets on the Theta blockchain.

Third-Party Storage

Third-party storage refers to a physical or digital storage solution provided and managed by an outside entity such as a bank, centralized cryptocurrency exchange, or a centralized cloud storage provider.

Threshold Relay

Designed by the DFINITY team, Threshold Relay is the consensus mechanism used on the Internet Computer (ICP) protocol. Heavily optimized for Proof of Stake (PoS), Threshold Relay is a multi-layer system that makes use of a verifiable random function (VRF) to prove randomness and move data between node groups. This data transfer is the “relay” process the consensus mechanism is referring to and was designed to achieve fast transaction finality while balancing network consensus security concerns.

Threshold Signature

Threshold signatures represent a specialized cryptographic digital signature encryption scheme that is designed to protect sensitive information. Threshold signatures are often distributed throughout a system of fault-tolerant nodes within a computerized network. The technology is often considered a more general term because there are numerous threshold signature types including the Rivest–Shamir–Adleman algorithm (RSA), the Digital Signature Algorithm (DSA), as well as the Elliptic Curve Digital Signature Algorithm (ECDSA), among others. Threshold signatures are generally used to secure public and private key data needed to process transactions on blockchain networks and other related computing platforms.

Throughput

In a blockchain context, throughput is a measurement of how fast a blockchain is able to process transactions. This is typically measured in transactions per second (TPS) and is sometimes measured in minutes (TPM) or hours (TPH). Generally, blockchain networks using Proof-of-Stake (PoS) consensus mechanisms tend to have higher throughput than those using Proof-of-Work (PoW) mechanisms.

Ticker (Token/Coin Symbol)

A ticker, or token/coin symbol, is an abbreviation used to signify a specific cryptocurrency and its underlying blockchain project. Token symbols are usually 3 or 4 characters long, such as BTC and LINK which represent Bitcoin and Chainlink, respectively. These tickers are designed to make cryptocurrency names more easily searchable and readable, especially when looking at trading pairs or charts.

Ticket Price (Decred)

Decred stakers receive one or more tickets (votes) depending on the amount of DCR coins they lock in the protocol. The number of tickets issued depends on the ticket price (denominated in DCR) at the time of staking. The ticket price adjusts dynamically every 144 blocks — or about every 12 hours.

Ticket-Splitting (Decred)

Ticket-splitting occurs when DCR holders split the cost of a full ticket. This process enables users to stake and participate in Decred’s governance with as few as 5 DCR coins.

Tickets (Decred)

After staking DCR coins, Decred stakers are given “tickets” or votes, non-transferable assets unique to the Decred network. These votes allow stakers to partake in network governance decisions.

Time-Based One-Time Password Algorithm (TOTP)

A time-based one-time password (TOTP) is an algorithm that is used to generate a randomized one-time password (OTP) that is time sensitive and only lasts until the next code is generated, which often occurs every 30 seconds. TOTP is an extension of the HMAC-based one-time password (HOTP) algorithm, which are both deployed as security mechanisms to prevent human error and malicious actors from stealing sensitive information. TOTPs are leveraged by numerous two-factor authentication (2FA) systems, such as Google Authenticator, and allow users to securely log into websites or account-based services on their computer or mobile device.

Time-Weighted Average Price (TWAP)

Time-weighted average price (TWAP) is a trading algorithm that is based on the weighted average price of a financial asset over a specified time frame. High-volume traders often use a financial asset's TWAP to spread a large order across numerous smaller orders valued at the TWAP price. This is done in order to avoid abruptly increasing the value of the financial asset due to a sudden, single high-volume order.

TimeLock Key

The TimeLock Key is a safety mechanism used during the atomic swap process. A TimeLock Key returns exchanged cryptocurrency if a trade doesn't execute within a specified timeframe.

Timestamp

A timestamp is a digital record or log used to identify the moment in time that a transaction occurred. Timestamps recorded onto a blockchain's ledger are immutable and unique to the specific transaction the timestamp is recording.

Timing-Based Evasion

Timing-based evasion is a tactic some variants of malware use to avoid detection within a target system. Malware coded with a timing-based evasion tactic will only execute its malicious code at certain moments, like when detection levels are deemed low or in response to pre-defined actions taken by the system user, like exiting a program or pressing a certain key.

Token

Within the context of blockchain technology, a token generally refers to a unit of value for a programmable asset that is managed by a smart contract and an underlying distributed ledger. Tokens are the primary means of transferring and storing value on a blockchain network — most often Ethereum. Tokens can also be designed to be either fungible or non-fungible, depending on a network's specific needs. And while many tokens are primarily used for simple transactions, an increasing number of blockchain projects are designing tokens encoded with a variety of wide-ranging use cases, primarily in regards to on-chain governance and network maintenance.

Token Basket

A token basket refers to a pool of tokenized assets such as equities, commodities, fiat-backed stablecoins, bonds, or other assets. Many blockchain-specific token baskets are made up of large cap cryptocurrencies such as bitcoin (BTC), ether (ETH), and others. In traditional finance, a token basket is simply a collection of multiple stocks or securities that are often from the same or similar asset classes. These baskets can be used for derivatives trading independently or in combination with other types of financial instruments, and are often managed by institutional investment funds, hedge funds, mutual funds, and exchange-traded funds (ETFs).

Token Generation Event (TGE)

A Token Generation Event (TGE) is a process whereby a new blockchain project and its founding team facilitate the technical generation and launch to market of the project's native token/coin. TGEs can take place in numerous ways, including via a traditional Initial Coin Offering (ICO), private sale, public sale, or through a combination of different methods. A TGE is designed to gain publicity and engagement from prospective investors, with the end goal of fundraising to help finance the development of the project.

Token Issuance

Token issuance is a process whereby a company creates a blockchain-based token. Token issuance requires consideration of numerous aspects of a token and how the issuers want the asset to operate in relation to its underlying protocol and overall ecosystem. To allow for a balanced, functional, and sustainable approach, token issuance generally takes into consideration several main factors, including: modeling of the blockchain’s business structure and its asset’s relationship with the underlying protocol, selection of a tokenization standard (such as ERC-20), deployment of the token’s operational structure on the blockchain protocol, and technical and security reviews of the network’s codebase after deployment.

Token Lockup

Token lockups, or vesting periods, represent a specific time period during which a user is unable to trade, sell, or transfer a set of cryptocurrency tokens. Without a lockup mechanism in place, it is not uncommon for investors who may have participated in an Initial Coin Offering (ICO) to sell their assets for a quick profit once the market is active. Lockups are designed to limit the sell side pressure of an asset, so the asset doesn't experience a sudden selloff. These lockups can also release predetermined amounts of tokens according to a schedule rather than all at once.

Token Migration

A token migration is the process of moving a cryptocurrency’s coins or tokens from one blockchain to another. This often happens when a project transitions from using a third-party blockchain (such as Ethereum) to operating their own proprietary blockchain. Token migrations can also happen for other reasons, such as migrating from one chain to another to save on transaction costs.

Token Sale

A token sale is any sale of tokens conducted by a blockchain project. Token sales are usually conducted in three main funding rounds: first a private sale, then a pre-sale, and lastly a public sale. The Initial Coin Offering (ICO) is usually considered the public sale that allows smaller retail investors to participate, while private sales are usually reserved for large institutional investors such as venture capital (VC) firms to fund projects early on. Pre-sales fall in between and allow smaller institutions, family offices, high-net-worth individuals (HNWIs), and other investors to participate.

Token Supply

Token supply is a general measurement of the number of tokens that a blockchain protocol has created, or will create in the future. There are different types of token supply metrics, including maximum supply (the maximum supply of all tokens that will ever be created), circulating supply (the total number of tokens that have already been released to the public), and the total supply (the number of tokens that have already been created).

Token Swap

A token swap can refer to one of two different processes. First, the direct exchange of a one crypto asset to another between two users — say, from ETH to BTC — which is usually facilitated through a special exchange service or decentralized exchange (DEX). Second, the migration of a crypto asset from one specific blockchain protocol to another — like, for example, if a token originally built for the Ethereum blockchain was redesigned to run on the Binance Smart Chain (BSC).

Tokenization

Tokenization is the act of converting the value of a tangible or intangible asset into a token. The token itself is a piece of code made up of a distinctive asset reference, unique properties, and/or specific legal rights in accordance with the smart contract through which the token was generated. Once tokenized, an asset can be freely transferred, exchanged, or stored away in accordance with whatever digital platform(s) or marketplace(s) the asset's token was designed to be compatible with. Through tokenization, nearly any asset can be seamlessly integrated into the rapidly expanding ecosystem of blockchain networks and digital finance writ large.

Tokenization Standard

Tokenization standard refers to the specific technical architecture of a blockchain’s protocol, which in turn determines the nature of the tokens that are compatible with the network. In the years since blockchain technology was first introduced, several token standards have gained prominence, with various token standards for both fungible and non-fungible tokens (NFTs). While many blockchains feature tokenization standards, some blockchains only feature their protocol’s native coin or cryptocurrency.

Tokenization Value Chain

The tokenization value chain is a model that is based on the traditional value chain, or securities value chain, that facilitates the creation, distribution, trading, settlement, clearing, custody, and storage of tokenized assets through blockchain. The tokenization value chain is generally considered more streamlined and equitable than the traditional value chain, and does not make use of rent-seeking third-party intermediaries to carry out many of its processes. The model allows for the creation of novel business types and potentially even entire new industries.

Tokenized Representation

Tokenized representation takes place when a digital asset is locked up with a custodian, who then mints a one-to-one representation of that token on another chain. Within the context of the Ren Virtual Machine (RenVM), the custodian involved in this process is a decentralized "Darknode" instead of a centralized authority. By locking an asset up in a Darknode until a user wishes to redeem it, Ren users are able to complete the asset conversion process in a trustless yet secure manner.

Tokenized Security

A tokenized security is a cryptographic tokenized version of a traditional security or asset that is generally used to represent a stock, stablecoin, commodity, or various types of traditional assets. Tokenized securities are often used for blockchain-based derivatives trading and other related decentralized finance (DeFi) mechanisms. While the term 'security token' sounds similar to the term ‘tokenized security’, the two are in fact very different. Security tokens are a specialized category of tokenized cryptocurrency asset type that makes use of very strict regulatory and compliance parameters that are designed to protect investors by giving them guaranteed equity in a company and guaranteed share in future returns.

Tokenized Stock

A tokenized stock is essentially a spot token that is backed by shares of a particular stock. Tokenized stocks provide the around-the-clock availability and permissionless nature of crypto to traditional stock markets. Tokenization allows these stocks to be available to additional markets and allows for the purchase of fractional shares.

Tokenomics

Tokenomics, a portmanteau of “token” and “economics,” refers to the underlying attributes of a cryptocurrency token that incentivize users to adopt the token’s project ecosystem. Among cryptocurrency investors, the term is commonly referred to in terms of how the token is utilized within the project ecosystem, or how the token will follow a monetary policy as the project develops. Therefore, the term tokenomics encapsulates a variety of processes and concepts, some of which are hard-coded into a blockchain's protocol, and others which are more speculative in nature.

TokenSets (Set Protocol)

Launched by Set Protocol in 2019, TokenSets is an application that allows for the creation and trading of Sets, ERC-20 tokens that can represent a basket or portfolio of varying crypto assets. These Sets can be coded via smart contracts to automatically execute a specific trading strategy or rebalancing algorithm. Using the TokenSets apps, you can find Sets that function as yield farming tokens, leveraged tokens, and tokens that give you exposure to various crypto indexes.

Tokyo Stock Exchange (TSE)

The Tokyo Stock Exchange (TSE) is the largest stock exchange in Japan and the third largest stock exchange in the world by market capitalization. The TSE lists 3,786 companies as of September 2021, including Japanese corporations Toyota, Sony, Keyence Corp, Softbank, Mitsubishi, Honda, and others. The TSE was founded in May of 1848 and is made up of five distinct sections with the first two comprising the largest companies, the next two sections made up of startups and smaller companies, followed by the last section which is only available to institutional investment firms.

ToolChain

A ToolChain is a set of software programming tools designed to simplify complex software development tasks, or to help create specific types of software programs and applications. This general term should not be confused with VeChain's ToolChain, which is a Blockchain-as-a-Service (BaaS) offering tailored for enterprise use.

Tor Browser

The Tor Browser is a decentralized network on the internet that is designed to ensure anonymity online by encrypting internet traffic, which is then routed through several servers before reaching its final destination. The service is maintained by the non-profit Tor Project, and uses its own “.onion” domains for websites and services which can only be accessed via the Tor network. Tor has been criticized for being a gateway to the dark web and illegal marketplaces, however, it is also commonly used by activists, journalists, law enforcement, and others who must conceal their online identities for safety and security purposes.

Torrent

In the context of the BitTorrent protocol, a torrent is the file being downloaded from other peers in the network.

Total Market Capitalization (Cap)

Total market capitalization is a measurement used to determine the entire market capitalization of a specific asset or asset class, such as gold. The total market capitalization of a company is determined by multiplying its number of shares by the price per share, while the market cap of a blockchain project is instead determined by multiplying the circulating supply of coins by the price per coin. The total market capitalization of all cryptocurrencies combined is determined by totaling the respective market caps of all individual cryptocurrencies.

Total Supply

The complete number of coins/tokens that are created by a blockchain project during the project’s inception. This includes the amount allocated to the foundation, team, and advisors. Projects tend to have a different vesting period for each allocation, and often generate a certain percentage of the total supply of all coins/tokens for a specific vesting period. Total supply contrasts with circulating supply, which is the number of coins/tokens available for potential investors to purchase at any given time. While the total supply generally remains static, the circulating supply tends to regularly change, depending on the crypto release schedule of the project.

Total Value Locked (TVL)

Total value locked (TVL) is a metric that measures the aggregate value of all crypto assets locked in decentralized finance (DeFi) protocols via smart contracts. It was popularized by DeFi Pulse in 2019, but with price data that goes back to DeFi’s genesis in 2017. TVL can also refer to the amount locked on a specific protocol (such as Aave or Uniswap). TVL data can also be further broken down and measure the DeFi value locked by purpose or type (such as lending and derivatives).

Traceability

Traceability refers to the degree to which a third party is able to track the details of a transaction, such as the transaction amount or the identities of the involved parties. Blockchain-based projects approach traceability in different ways. For example, non-fungible tokens (NFTs) following the ERC-721 standard are created to maximize traceability, while projects like Monero have designed systems that obfuscate user accounts and transactions from external viewers in an attempt to remain completely untraceable.

Tracking Cookie

A tracking cookie is a system that is deployed on a website to track a user's online behavior. Tracking cookies are deployed automatically when a user accesses a website, often with the hopes of collecting data that is used to influence a user’s online purchasing decisions. For example, some cookies are able to determine which websites a user recently visited. As a result, ads for products and services related to their browsing history may be shown to increase the probability of the user making a purchase.

Trade Execution Coordinator (TEC)

A Trade Execution Coordinator (TEC) is a process that occurs when an exchange platform – whether centralized or decentralized – unbundles the entity responsible for trade execution from the entity responsible for liquidity aggregation. A strong TEC system is designed to help:

• Ensure trades are executed according to price-time priority in the correct order • Serve the needs of various exchange relayers simultaneously • Operate in a more secure and transparent manner • Work in a highly available and censorship-resistant manner, reducing the possibility of griefing

Trading Bot

A trading bot is an application that executes trades automatically within pre-configured parameters and environments. Trading bots are widely used by quantitative traders, market speculators, and other financial market participants. The specific parameters each trading bot is set to can be configured in accordance with its operator's personal trading strategy and proclivities.

Trading Volume (Volume)

Within the context of capital markets, trading volume refers to the amount of a security traded over a given time frame. Trading volume is typically reported as the number of shares that changed hands during a given trading session or other period of time. The trading volume for every openly tradeable asset is constantly changing, and the direction and magnitude of these shifts are important variables which most investors factor into their analysis.

TradingView

TradingView.com is one of the most advanced and reputable charting analysis and trading platforms used for stock trading, crypto trading, and trading of other asset classes. TradingView has both a desktop and mobile version, as well as functionality that allows users to share information such as investment strategies, technical analysis, and other indicators. TradingView was founded in 2011 and is often considered the gold standard for charting and technical analysis. Its rise in popularity can be somewhat attributed to the increase in popularity of cryptocurrency investing in 2017 because of the 2017 bitcoin (BTC) and crypto bull run.

Traditional Finance (TradFi)

Traditional finance (TradFi) refers to the financial system that exists apart from blockchain, cryptocurrency, and decentralized finance (DeFi). TradFi is typically characterized by bureaucratic legacy financial institutions such as banks and large corporate financial enterprises that operate using a centralized model.

Traditional Value Chain

The traditional value chain is a system that is used for creation, distribution, trading, clearing and settlement, custody, and other financial services within the securities value chain. Though it has evolved over time, and has been used in the financial industry for decades, it is becoming increasingly apparent that the traditional value chain is flawed because it is less transparent, efficient, and equitable than it needs to be. Presently, a new approach called the tokenization value chain is advancing to enable a more viable approach for future investment paradigms and financial products and services across the globe.

Tranche

In structured finance, a tranche refers to one of a number of similar securities or a specific segment of investments created from a pool of securities. Tranches are typically used to divide risk or other characteristics in ways that are marketable to different types of investors and fit different investment strategies. For example, as they relate to bonds, tranches are usually thought of as different “classes” of notes, all of which have different bond credit ratings. The traditional model of the tranche has recently been modified to work with different blockchain protocols.

Transaction (TX)

In a blockchain context, a transaction (TX) generally refers to the sending and receiving of different types of data between users on a blockchain network. Depending on their origin, transactions can be sent with varying speeds and levels of security and privacy. The most common type of transaction simply allows users to exchange network-specific coins/tokens between each other. For example, Bob sends Linda four ether (ETH) using the Ethereum network, which she promptly receives a few minutes later. In exchange, Linda then sends Bob an equivalent value in bitcoin (BTC) via the Bitcoin network.

Transaction Cost Analysis (TCA)

Transaction Cost Analysis (TCA) is a system used by institutional investors to study price trends in order to determine favorable trading windows. This metric is calculated in accordance with a specified time period and with respect to various benchmarks.

Transaction Fee

Transaction fees are the fees charged to execute a transaction on a blockchain, and are typically charged to the sender. Transaction fees pay for the computational power a network must exert to broadcast and send a transaction. Transaction fees can be paid out through various mechanisms to entities that furnish a blockchain’s security and are a key aspect of incentive models for most networks, including Bitcoin and Ethereum. Transaction fees vary with each blockchain and often fluctuate according to the laws of supply and demand.

Transaction ID (TXID)

A transaction ID (TXID), or transaction hash, is an immutable record of a digital transaction that’s been recorded onto a blockchain ledger. Users are able to look up any past transactions using its corresponding transaction ID, typically with the help of a blockchain explorer. In some instances, a cryptocurrency recipient may request the transaction ID from the alleged sender in order to verify the transaction's origination point.

Transaction Settlement Time

A transaction's settlement time refers to the elapsed time between when a transaction is initiated and when assets are deposited in the recipient's account after all relevant financial institutions and/or algorithmic protocols confirm the transaction as valid. The length of settlement times vary widely depending on the structure of the different networks and organizations that process the transaction.

Transactions Per Hour (TPH)

Transactions per hour (TPH) is a metric that refers to the number of data transactions that a computer network can process in an hour. TPH, along with transactions per minute (TPM) and transactions per second (TPS), is sometimes used to determine a blockchain network’s overall network speed and scalability by measuring how quickly a specific platform can process data such as cryptocurrency transactions and smart contract execution. Highly scalable networks with high transaction speeds are pivotal to the widespread adoption of blockchain technology.

Transactions Per Minute (TPM)

Transactions per minute (TPM) is a metric that refers to the number of data transactions that a computer network can process in a minute. TPM, along with transactions per second (TPS), is sometimes used to determine a blockchain network’s overall speed and scalability, by measuring how quickly a specific platform can process data such as cryptocurrency transactions and smart contract execution. Highly scalable networks with fast transaction speeds are pivotal to the widespread adoption of blockchain technology.

Transactions Per Second (TPS)

Transactions per second (TPS) refers to the number of data transactions that a computer network can exact within a second. The TPS measurement used for sending data on a blockchain network is often an indicator of the protocol’s overall network speed and scalability, and measures how quickly a specific platform can send data like cryptocurrency transactions and the execution of smart contract functions. Highly scalable networks with high transaction speeds are a requirement for the widespread adoption of blockchain technology.

Transcoder

On the Livepeer network, a Transcoder is a hardware device (specifically a GPU or CPU) that converts video from one format to another. Transcoders carry out the video transcoding process on the Livepeer network.

Transmission Control Protocol/Internet Protocol (TCP/IP)

The Transmission Control Protocol/Internet Protocol (TCP/IP) is an organized suite of communication protocols that is used to connect network devices over the internet and transmit data through these connections. The internet as we know it was largely designed and built upon TCP/IP, although this set of protocols can also be similarly used as a communications protocol within a private computer network.

Transmuter (Alchemix)

The Transmuter is the Alchemix protocol’s primary pegging mechanism, which helps keep synthetic assets, like alUSD, at a 1:1 ratio with stablecoins like DAI. The Transmuter is powered by a smart contract that allows users to stake alUSD in order to earn a proportional amount of DAI for doing so.

Trapdoor Function

Within the field of cryptography, a trapdoor function, also known as a "one-way function", is an algorithmic puzzle that is simple to compute in one direction, but extremely difficult to solve when taking the inverse approach. This unique feature makes trapdoor functions an invaluable design component that is embedded into a broad range of encrypted messages and cryptographic transactions.

TRC-10 (TRON)

TRC-10 is another tokenization standard used by the TRON blockchain that stands apart from its more common TRC-20 tokenization standard. Although TRC-10 and TRC-20 tokens have several technical differences, the key differentiation is that TRC-20 tokens are designed to operate in conjunction with smart contracts and the TRON Virtual Machine (TVM), while TRC-10 tokens are not.

TRC-20 Token (TRON)

TRC-20 is a smart contract standard for creating tokens using the TRON Virtual Machine. TRC-20 tokens are fully compatible with Ethereum’s ERC-20 standard.

Treasury Bill (T-Bill)

A treasury bill (T-Bill) is a short-term financial instrument issued by the U.S. government. These fixed-income securities generally have a maturity period lasting from four weeks to a year. Due to their short duration, T-bills do not compensate investors via regular interest payments. Instead, they are sold at a discount to their face value at the point of purchase, and investors receive the full face value amount once the T-bill reaches maturity.

Treasury Bond (T-Bond)

A treasury bond (T-Bond) is a security that the U.S. government typically issues as a debt instrument to fund various government operations and commitments. These securities typically have maturities of more than 20-30 years, and pay a fixed return every six months. Generally speaking, the longer the maturity period of a T-bond, the higher its annual yield. Once a T-bond has been sold by the government in an initial auction, it can be freely traded on secondary markets.

Trend

A trend refers to the overall direction of a financial market or an asset’s price. Trends are determined in large part by using technical charting analysis and trendlines that highlight specific price action that make up technical support and resistance levels. An uptrend occurs when the price makes higher swing highs, while a downtrend is characterized by price making lower swing lows. Trends may occur in crypto, stocks, bonds, derivatives, and any other type of market, even when measuring different types of data, such as the overall economic outlook for a specific geographical region during a certain time period.

Trend Analysis

Trend analysis is a technical analysis (TA) methodology used to predict future price movements by observing overall trend data. Trend analysis helps traders and investors make better investment decisions based on the overall market sentiment and underlying data points. Trend analysis typically considers the conditions of either a bull market, characterized by rising prices, or a bear market, characterized by declining prices. Trend analysis can be used for short, intermediate, and long-term time frames, but must be leveraged with several other data sets to be most effective.

Trend Line (Charting Tool)

A trend line is a line that is drawn on a chart to signify trends in price action for a specific timeframe. Trend lines are commonly used to determine the upward, sideways, or downward momentum of a price trend by connecting at least three price points on a chart to distinguish areas of support and resistance. Prices that stay above the trend line and form support are considered bullish, while prices that drop below the trend line and are unable to break above resistance are considered bearish.

Triangle (Technical Formation)

Triangle technical formations are a critical technical analysis (TA) tool because they help traders determine the direction of bullish or bearish momentum and potential market reversals. Normally, there are three main triangle patterns: ascending, descending, and symmetrical triangles. Ascending triangles usually result in price increasing and breaking out, while descending triangles are often a bearish pattern that results in price breaking to the downside. Finally, symmetrical triangles can be a bearish or bullish pattern depending on the confirmation of the price above or below certain levels.

Tribute to Talk

Tribute to Talk is a feature that blockchain-enabled messaging platform Status created in order to prevent malicious activity and spam from cluttering its network. Status users can set a Tribute-to-Talk requirement, which is the minimum amount of Status Network Token (SNT) a non-whitelisted user needs to stake in order to send them a message. If the message recipient responds to the sender's message, the sender's staked SNT is sent to the recipient. If the sender's message is ignored or rejected, the sender's staked SNT is returned to them, and they will be unable to attempt to contact the recipient for a period of time.

Trojan

Within the context of cybersecurity, a Trojan describes any type of malware which disguises its true intent in order to gain unauthorized access to a target device or network. In most cases, trojans are designed to look like an innocuous program or are discretely attached to another piece of software a target is likely to install. Once a trojan has infiltrated its target it is free to execute its malicious code, which in most cases will damage, steal from, or otherwise disrupt the target device or network.

Trojan Bankers

A Banker Trojan is a specific type of Trojan malware that is designed to gain unauthorized access to confidential information or assets stored in online banking systems.

Trojan Downloader

A Trojan Downloader is a specific type of Trojan malware that lays dormant inside an infected device until an Internet connection becomes available. From there, the trojan downloader will connect to a remote server or website and download additional unwanted programs onto the infected device.

Trojan-Ransom Malware

Ransomware Trojans are a specific type of Trojan malware designed to extort a victim after compromising the victim's device. In most cases, ransomware Trojans will demand a payment in exchange for undoing the damage the Trojan has inflicted to the victim's device. However, some forms of ransomware Trojans may demand other forms of payment, like sensitive information or performing specific acts.

TRON

Tron is a blockchain project dedicated to building the infrastructure for a decentralized internet. While the project initially started as a decentralized entertainment platform with distributed storage technology, the project's ambitions have grown to closely resemble those of Ethereum. The Tron network's native token, TRONix (TRX), is used as a payment method across Tron's evolving service ecosystem.

TRON Virtual Machine (TVM)

The TRON Virtual Machine (TVM) is a Turing complete virtual machine that provides a feature-rich and user-friendly environment for developers to build and test decentralized applications (dApps) and other web services within the Tron ecosystem. TVM is Tron's equivalent of the Ethereum Virtual Machine (EVM), and all software projects created through TVM are fully compatible with EVM.

TRONix (TRX)

TRONix (TRX) is the native token of the Tron blockchain protocol. While the token was initially used only to pay content creators for digital content on the Tron platform, TRX has evolved into a more broadly accepted payment method across Tron's evolving service ecosystem.

TRONZ

TRONZ is a smart contract privacy protocol that was introduced with TRON 4.0 in July 2020. TRONZ is built upon the zk-SNARK methodology, the core privacy technology of Zcash (ZEC). TRONZ gives users more flexible transaction privacy settings, which can be adjusted in accordance to the user's situational needs.

Troy Ounce

The troy ounce is the global standard for measuring the weight and implied purity of precious metals. One troy ounce is equal to approximately 31.1 grams, in contrast to the standard ounce which is 28.35 grams, and this unit of measure is commonly abbreviated as either “t oz” or “oz t.”

Truffle (Ethereum Development Framework)

Truffle is a popular development toolbox for writing smart contract code on the Ethereum network. Truffle consists of a suite of products designed to help Ethereum developers create, test, and deploy software. In November of 2020, the Truffle team and its technology were acquired by ConsenSys, one of the leading private companies building Ethereum products.

Trust Company

A trust company is a legal entity that acts as a fiduciary, agent, or trustee on behalf of an individual or organization. These companies are typically charged with holding assets that they do not own on behalf of a client, and responsibly managing those assets until they are required by law to be transferred to a specified beneficiary party. Since trust companies are fiduciaries, they have a legally binding responsibility to act on behalf of their clients' financial interests.

Trusted Execution Environment (TEE)

A Trusted Execution Environment (TEE) is an isolated environment within a device's main processor that allows for the secure and private execution of code without the risk of interference from the rest of the device or system. Only properly authorized code can be executed within a TEE, which uses both hardware and software to protect data and code from the external environment. Furthermore, the different trusted applications within a TEE are protected from each other via software and cryptographic solutions, and these trusted applications have full access to the device's main processor and memory. TEEs are generally used to improve the overall security of a device or network and ensure that certain core processes can operate with full reliability and integrity without the risk of being compromised.

Trustless

When a system is trustless within a peer-to-peer (P2P) blockchain network, it means that all participants in the network do not need to know or rely upon verification from one another or a third party. This means that the system is run autonomously by the underlying technical architecture and consensus mechanism of the blockchain protocol itself. Transacting on a shared, trustless network is not beholden to a central organization to ensure trust, and is a key value proposition of blockchain technology. A number of innovations underlay the trustless nature of blockchain networks, including immutability, decentralization, transparency, censorship resistance, and neutrality.

Tumbler (Crypto Tumbler)

Cryptocurrency tumblers (also known as mixers) provide a custodial mixing service where a user deposits cryptocurrency to be mixed for privacy reasons. Although coin mixing doesn’t guarantee complete privacy, it makes tracing transactions more difficult. These services are sometimes used to launder “dirty coins,” which are garnered through criminal activity. This is done by mixing dirty coins with coins from different wallets, then transferring the “cleaned” coins to another wallet. While cryptocurrency mixers are also used for non-criminal purposes, some countries have cracked down on their use altogether. Service providers typically charge a 1-3% fee for this type of service. These services seem to be waning in popularity as newer, non-custodial options have appeared.

Turing Complete

Turing complete is defined as a system of data-manipulation rules, such as a computer’s programming language or instruction set, that is computationally universal. All computer programming languages are ‘turing complete,’ meaning that they can easily be used and communicate with other similar programming languages or related systems with minimal likelihood of encountering major problems. The concept was first introduced by English computer scientist and mathematician Alan Turing.

Turnkey Solution

A turnkey is a product or service that can be sold to any applicable buyer as a complete, ready-for-use product without the need for user customization. Turnkey solutions therefore differ from built-to-order products, which are designed in accordance to a customer’s unique specifications.

Two-Factor Authentication (2FA)

Two-factor authentication (2FA) is an extra layer of security for user accounts. In its most common form, 2FA requires a user to further verify identity after entering the account password. This additional verification is typically achieved by inputting a randomized code generated through a secondary device or program. As a result, 2FA mitigates a variety of cybersecurity risks stemming from both device hacks and human error. Examples of 2FA mobile applications include Google Authenticator and Authy.

Two-Way Peg (2WP)

A two-way peg (2WP) is a mechanism attached or built into a blockchain protocol that can facilitate the transfer of tokens and other data from a mainchain to an independent blockchain network. In fact, the ‘transfer’ of tokens doesn’t actually take place, but the assets that are sent on the initial blockchain are locked in place so they cannot be used, while the receiving blockchain creates a new number of tokens equivalent to the amount sent. There are several variations of the model — often called bridges — that allow for blockchains to send data and tokenized assets back and forth between various blockchain protocols.

Type Checking

Type checking is the process of verifying the integrity and accuracy of computer code using different programming languages. Type checking is used to audit sequences of informatic code and often constitutes the checking of functions, modules, expressions, variables, and other related data structure types. This process is normally used by programmers to eliminate or reduce the occurrence of bugs found in software programs and network infrastructure prior to initial deployment. Type checking can be done statically (during compile time), dynamically (during run-time), or by using a combination of the two depending on the programming language being used.

TypeScript Programming Language

TypeScript is a programming language that is a syntactical version of JavaScript that adds optional static typing to the language. TypeScript is maintained and designed by Microsoft and is built for the development of large-scale applications that compile to JavaScript for use with any browser, and any host, on any operating system (OS).


U

U.S. Financial Crimes Enforcement Network (FinCEN)

The Financial Crimes Enforcement Network (FinCEN) is a division of the U.S. Department of the Treasury that is tasked with gathering and assessing information about financial transactions. The goal of the U.S. Financial Crimes Enforcement Network is to prevent and solve financial crimes.

UMA Improvement Proposal (UMIP)

UMA Improvement Proposal (UMIP) refers to the document used to propose changes to the UMA ecosystem. UMA token holders can use UMIPs to propose and approve new financial contract templates, new price identifiers, and other governance changes to UMA's data verification mechanism.

UMA Token

The UMA token is the native governance token of the UMA network. UMA users are able to use UMA tokens to vote on how to resolve price disputes that occur on the network as part of its data verification mechanism, and make changes to the mechanism via the UMA Improvement Proposal (UMIP) governance process.

Unallocated Gold

According to the London Good Delivery set of regulatory and compliance standards, gold can be bought in two distinct forms: allocated or unallocated. Unallocated gold does not feature direct ownership over specific gold bars, but instead holds entitlement to a certain amount of gold. Conversely, when a customer purchases allocated gold, they have ownership over the gold and can choose to store it on their own, or in a vault at a London Bullion Market Association (LBMA) facility.

Unbanked

The 'unbanked' refers to individuals without access to the traditional banking system and modern-day financial services. Most individuals who are considered 'unbanked' lack a stable internet connection and/or reside in an underserved community or developing country. As a result, these individuals are effectively excluded from participating in the global economy. It is a primary goal of sectors like FinTech, decentralized finance (DeFi), and blockchain to support the unbanked by achieving equitable financial inclusion globally.

Uncle Block

An uncled block is a block on the Ethereum network that is discarded because two blocks were mined at nearly the same time and only one can be validated and become part of the ledger. An Ethereum uncle block is similar to a Bitcoin orphan block. However, the two occur on different networks. Further, miners who generate uncle blocks on Ethereum are rewarded in ether (ETH), while miners who mine orphan blocks on the Bitcoin network are not rewarded in bitcoin (BTC).

Unconfirmed Transaction

An unconfirmed transaction relates to the status of a transaction that is sent from one address to another on a blockchain protocol that has yet to be fully appended to the blockchain and finalized. Typically, in order for the recipient to receive the assets contained in a transaction, the transaction must go through several network confirmation stages. The number of network confirmations needed to finalize a transaction varies depending on the blockchain network the transaction originated from. In a blockchain context, an unconfirmed transaction is the opposite of a confirmed transaction.

Underbanked

"Underbanked" refers to individuals who have access to a bank account, but who are often unable to use the bank's full services because of lack of income or other reasons. The underbanked often make use of alternative financial services like payday loans, money orders, and check-cashing services rather than traditional loans and credit cards. The "unbanked" (those without any access to banking services) are sometimes considered a distinct subset of the underbanked. It is a primary goal of sectors like FinTech, decentralized finance (DeFi), and blockchain to support the underbanked by achieving equitable financial inclusion globally.

UNI Token (Uniswap)

UNI token (UNI) is the native governance token of the Uniswap Protocol, a decentralized cryptocurrency exchange (DEX). The token was initially released in September 2020, when Uniswap airdropped 400 tokens into each unique cryptocurrency address that had interacted with the Uniswap Protocol prior to September 1, 2020. This first round distribution reached ~50,000 Ethereum addresses, immediately making UNI one of the most widely distributed tokens within the cryptocurrency space. In total, 60% of UNI's genesis supply is intended to go to the community, while the remaining 40% have been allocated to Uniswap team members, investors, and advisors.

Uniswap (UNI)

Uniswap is a decentralized exchange (DEX) that uses liquidity pools (LPs) to make markets without the need for order books or central facilitators. Uniswap is underpinned by smart contracts that facilitate token swaps and provide the incentive structure for liquidity providers to participate in the system. As one of the first automated market makers (AMMs) to go live on the Ethereum network, Uniswap has made significant strides in proving that AMMs can be an effective tool for trading digital assets in a decentralized and permissionless way.

Unit of Account

A unit of account is a standard unit of measurement of the value of a good or service. By attributing a specific measurement unit to a good or service, the monetary value of that offering can be clearly understood in abstract terms without the need to resort to bartering. The need for units of account to optimize market transactions is one of the three fundamental functions of money, the other two being usability as a store of value and a medium of exchange.

United States House Committee on Financial Services

The United States House Committee on Financial Services is a committee of the United States House of Representatives that is designed to oversee the U.S. financial services industry, including the insurance, securities, banking, and housing industries. The Financial Services Committee also oversees the Securities and Exchange Commission (SEC), the Federal Reserve, and the United States Department of the Treasury, among other financial services regulators in the U.S.

Universal Market Access (UMA)

Universal Market Access (UMA) is a specialized protocol built on Ethereum that allows users to create custom synthetic cryptocurrency tokens. Synthetic tokens are collateralized by another asset, while reflecting that asset's price in real time. Essentially any type of asset, both physical and digital, can be tokenized via UMA and integrated into the rapidly evolving ecosystem of blockchain-enabled decentralized finance (DeFi).

Unrealized Profit & Loss

Unrealized profit and loss (P&L) is a metric that is used to keep track of the profit or loss of open trading positions on an exchange or related platform. Generally, unrealized P&L is calculated from when a position is opened until it is closed. It is often used after opening leveraged trading positions via derivatives instruments, but can also be used for spot trading and other trading types. While unrealized P&L can be calculated for any type of trader, it is an especially important metric used by institutional investment firms that allocate large amounts of capital towards their investments.

Unspent Transaction Output (UTXO)

An Unspent Transaction Output (UTXO) is the amount of cryptocurrency that remains after a transaction is executed. Each UTXO represents a chain of ownership, which is represented as a chain of digital signatures in which a transaction originator signs a message transferring ownership of their UTXO to the recipient's public key. As a result, UTXOs are responsible for beginning and ending each cryptocurrency transaction.

Unstoppable Domains

Unstoppable Domains is a service that allows users to send and receive tokens using a specific and easy to use self-selected domain name instead of an alpha-numeric wallet address. Unstoppable Domains is powered by the Ethereum and Zilliqa blockchains. Furthemore, Unstoppable Domains has agreements in place with multiple blockchain wallets and service providers, so its partner organizations can reduce reliance on wallet addresses and still use their favorite wallet to hold their cryptocurrencies.

USD Coin (USDC)

USD Coin (USDC) is a digital stablecoin pegged to the U.S. dollar. It operates on the Ethereum, Stellar, Algorand, and Solana blockchains. As of October 2021, USDC is the second-largest dollar stablecoin asset in the world by market capitalization, with a total valuation of USD 32 billion. USDC was initially created by the Centre consortium, which includes its two main founding members Circle and Coinbase. Each USDC token is backed by $1 held in reserve and regularly audited by Grant Thornton, a major accounting corporation. USDC was launched in September of 2018, and during March 2021 it was announced that Visa would facilitate the use of USDC for settlement on its payment network.

User Experience (UX)

User experience (UX) describes how an end-user experiences a product or service. While subjective, UX generally refers to product simplicity, ease of use, efficiency, or a user’s overall impression. In a business context, a better UX may correlate with increased customer satisfaction, retention, and growth; UX is commonly discussed with digital products such as software, websites, and video games. In the blockchain space, many consider the UX of crypto exchanges and crypto wallets to be greatly improved, while also pointing out that the UX may have a way to go to be on par with certain legacy financial systems.

User Interface (UI)

User interface (UI) typically refers to the method of interaction between a user and a program via a digital screen, computer, mobile device, website, or software application. Like a user experience (UX), a proficient user interface should be user-friendly, simple, efficient, secure, and private. User interfaces can also include Human-Machine Interfaces (HMIs) that interact with physical input hardware such as a keyboard, mouse, or gaming controller, or with output hardware such as a computer monitor, speaker, or printer.

Utility Token

A utility token is a tokenized digital asset designed to grant its holder access to the products or services of a blockchain protocol. As a result, utility tokens are intended to be used within the blockchain's network, rather than serve as an investment. However, given that most utility tokens fluctuate in value in accordance with its network's perceived popularity and adoption, many traders and crypto enthusiasts nonetheless purchase certain utility tokens as speculative investments.


V

Validator

Within the context of blockchain technology, a validator is an entity responsible for verifying and approving transactions submitted by users and/or blockchain clients. Each blockchain protocol has its own parameters for what constitutes an acceptable validator and how these validators operate. Most decentralized blockchain networks rely on some form of validator node to process on-chain transactions in a permissionless and distributed manner.

Value Investing

Value investing is an investment strategy that involves identifying stocks and other securities that appear to be trading for less than their intrinsic value. Value investors typically conduct thorough due diligence on the securities they are interested in tracking and adhere to longer investment holding periods. As a result, these investors tend to ignore price movements that do not appear to correspond with a company's long-term fundamentals, such as sudden reactions to wider industry news or short-term market events.

Vault

A vault is a piece of blockchain architecture used for the storage, deposit, and withdrawal of different types of cryptocurrency assets, especially in decentralized finance (DeFi) protocols. For example, when a user stakes, lends, borrows, or mints different crypto assets, a DeFi protocol must automatically exchange the correct number of assets between different parties via smart contracts. A vault mechanism can also be used to maintain a 1:1 stablecoin peg with fiat currencies by adding and removing different cryptocurrencies (often baskets of currencies) and stablecoins during times of high buy or sell pressure.

Vault (Reserve Protocol)

The Reserve Protocol makes use of a vault that is used to stabilize the peg of the Reserve (RSV) stablecoin and to maintain a balanced vault ratio. This is accomplished by adding and subtracting RSV, RSR, and collateral tokens when the peg of RSV drops below or rises above its equilibrium price of 1 U.S. dollar between the range of $0.98 and $1.02. Further, when the vault ratio exhibits appreciation and depreciation rates of less than +0.1% or -0.1%, holders of RSR purchase or sell RSR in exchange for tokenized assets to help maintain the equilibrium of RSV.

VeChain Improvement Proposal (VIP)

A VeChain Improvement Proposal (VIP) is a mechanism used by VeChain and its underlying VeChainThor blockchain to allow VeChain ecosystem participants and community members to propose changes to VeChain's protocol and development trajectory. There are four main types of VIPs: application, interface, information, and core. Once a VIP is proposed, the VIP's author is responsible for building consensus within the community and documenting dissenting opinions.

VeChain Token (VET)

VeChain Token (VET) is the native governance and utility token that underpins the VeChainThor blockchain network and overall VeChain ecosystem. VET holders can contribute to the security and consensus of the network by holding VET within different nodes within the VeChainThor blockchain (AM’s, XN’s, EN’s).

Venture Capital (VC)

Venture capital (VC) is a type of private equity financing that is provided by a venture capital firm to start-up businesses that are deemed to have high growth potential. VC is usually provided by high net-worth individuals (HNWIs), investment banks, or large enterprises that invest in a specific industry. Often VC firms specializing in blockchain only invest in startups that are designing blockchain-specific businesses. Venture capital funding also sometimes entails technical or managerial expertise. VC firms often provide funds to companies during their initial stages, such as seed round funding.

Venus Smart Contract Controller

Part of the Venus Protocol, the Venus Controller Contract runs on the Binance Smart Chain (BSC) as a decentralized version of a processor. This smart contract controller validates oracle price feeds, checks collateral deposits, validates liquidity, and facilitates interactions between associated smart contracts on the platform. The controller contract uses verified asset marketplaces and confirms liquidity and collateral requirements prior to the execution of any smart contract function.

Verifiable Delay Function (VDF)

A verifiable delay function (VDF) is a cryptographic primitive created in 2018, built to run a given number of sequential steps which allows the end result to be efficiently verified. VDFs can be implemented within the context of blockchain and computer systems to help create trustless, public randomness in network-based environments. To achieve their desired result within a distributed system, verifiable delay functions generally involve three main processes: setup, evaluation, and verification.

Verifiable Random Function (VRF)

A verifiable random function (VRF) is a cryptographic primitive that was conceived of in 1999 and has many useful applications including deterministic precommitments and having output that is resistant to preimage attacks. In implementation, a VRF consists of three related algorithms that do the following:

  1. Key Generation: A mathematical function that when given a random input produces a verification key / secret key pair
  2. Evaluation: This function takes a message and the generated secret key to produce a pseudorandom output, and an associated proof
  3. Verification: This function uses the verification key and other values to guarantee that the output of the evaluation function could only have been produced by someone who had the associated secret key - all without that secret key ever having to be revealed

VRFs have a wide range of use cases across various cryptographic schemes, protocols, and systems.

Verification Code

A verification code is a digitally generated code that is typically sent to a user’s email account, mobile device, or computer in order to ensure the validity of a login attempt. Verification codes are generally sent via email, text message, or obtained via two-factor authentication (2FA) services like Google Authenticator which can randomly generate a six-digit number every 30 seconds using a Time-based One-Time Password (TOTP) algorithm or a HMAC-based One-Time Password (HOTP) algorithm.

Vertical Scalability

Vertical scalability refers to a network or device's ability to increase its existing hardware or software capacities by adding supplementary resources. The most common forms of vertical scalability entail adding more RAM or processing power to a device. However, vertical scalability can be accomplished in a variety of ways, depending on the configuration of the network/device and the nature of the intended upgrade.

Vesting

Within the context of blockchain, vesting is the process of releasing coins/tokens that have been set aside for a specified period of time. These coins/tokens are typically designated for a blockchain project's team, partners, and other contributors who are actively helping develop the project. Funds that have been set aside for this purpose are usually locked for a certain period of time by smart contracts, which effectively seal off access to the crypto until pre-set conditions are met.

VeThor (VTHO)

VeThor (VTHO) coins are used to power the VeChain network. New VTHO coins are continuously generated for VET coin holders each time a new block is created. A new block is typically added to VeChain's ledger once every 10 seconds, and each VET generates 0.00000005 VTHO per new block, which translates to approximately 0.000432 VTHO generated per VET per day. VET holders can increase the VTHO generation rate of their VET coins by placing their coins in different nodes, which are tiered in accordance with their staking requirements. VeChain’s economic model is designed to prevent transaction fees from fluctuating in relation to the price of VET, thus ensuring transaction fee consistency and predictability.

Video Transcoding

Video transcoding is the process of converting a video file from one format to another, with the aim of making videos viewable with different devices and internet bandwidths. This process typically takes place when a target device does not support a particular file format, or has limited storage capacity. Video transcoding allows streamers to download large video files in a matter of seconds instead of hours, enabling more widespread accessibility to video streaming or related services.

Virtual Commodity Association (VCA)

Founded in 2018, the Virtual Commodity Association (VCA) is a non-profit organization working towards the goal of establishing an industry-sponsored, self-regulatory organization for the U.S. virtual currency industry. The organization began as a committee to explore ways of ensuring consumer protection and market integrity in virtual commodity marketplaces, and has since evolved into a more formalized organization spread across six committees and overseen by a board of directors.

Virtual Machine (VM)

A Virtual Machine (VM) is a cloud-based emulation of a computer system that provides the functionality of a physical computer system. VMs may be made to emulate types of specialized hardware, software, or a combination of the two, and provide the framework for data transactions and transactional execution on blockchain networks. The most well-known VM in the blockchain industry is the Ethereum Virtual Machine (EVM).

Virtual Private Network (VPN)

A virtual private network (VPN) is a type of technology that is used to encapsulate and transmit data over the Internet via a private channel. VPNs are typically encrypted to ensure the security and privacy of data is not susceptible to malicious third-party actors. VPNs can be used by private retail customers or in large corporate environments, enabling access to network resources and highly sensitive data generally not available to the public. VPNs are aptly named because they provide virtual instead of physical access to a private network and come in two main types: remote access, and site-to-site.

Virtual Reality (VR)

Virtual reality (VR) is a simulated virtual experience that is quite different from the real world. Today, virtual reality can be applied via entertainment (such as video games), educational programs (such as medical or military training), and many other disciplines. Typically, VR takes two main forms: immersive VR, and text-based network VR (also called cyberspace). Currently, VR headsets are one of the most common methods of engaging in VR, allowing users to explore realistic images, sounds, and lifelike scenarios that simulate a user’s physical presence in a specific environment.

Vishing

Vishing is a variant of phishing attack that relies on fraudulent phone calls or voice messages to mislead a target into divulging personal information, like account passwords or credit card details. In most instances, a malicious actor using vishing will pretend to be from a reputable company or a trusted authority, and their message will often either involve the offer of a "free prize" or a fictional crisis that the target must tend to immediately.

Vitalik Buterin

Vitalik Buterin is a Russian-Canadian programmer and writer most famously known for co-founding Ethereum. In 2013, Buterin published a whitepaper proposing Ethereum as a world computer capable of hosting a wide range of decentralized applications (dApps). In contrast to bitcoin (BTC) — which is more geared towards payments and serving as a store of value — Ethereum was intended to serve as a “Swiss-army knife protocol,” with more flexible and wide-ranging applications. Buterin went on to collaborate with several other co-founders to develop Ethereum, which was launched in 2015. To date, Buterin is regarded by many crypto enthusiasts as the de facto figurehead of Ethereum.

Voice (EOSIO Blockchain)

Voice is the EOSIO blockchain’s social media platform, and was created in an effort to provide a less exploitative and profit-based social media solution compared to traditional centralized social media networks like Facebook and Instagram. Voice is said to be a more transparent social media model because the value of content is circulated to sustain the overall user-base and community. However, Voice is largely unproven and its parent organization block.one has been accused of unnecessary levels of centralization at times. It remains to be seen whether Voice will be able to acquire a substantial user base that rivals that of larger and more mainstream social media platforms from established tech giants.

Voice Over Internet Protocol (VOIP)

Voice Over Internet Protocol (VOIP), sometimes known as IP telephony, is a technology that is used to carry out voice communication, video calling, and video conferencing over the internet. VOIP works by sending and receiving voice and video calling data between two or more IP addresses. VOIP was made famous by Skype, Zoom, and several other large multinational enterprises over the last 30 years. VOIP has changed the way many businesses communicate because it is often free or very cheap to use compared to long-distance phone calls. VOIP began as a computer-to-computer service but recently expanded to mobile-to-mobile device calling.

Volatility

Within a marketplace context, volatility refers to the degree of variation an asset's trading prices undergo relative to its mean price over a certain period of time. The more volatile the price of an asset is, the greater the frequency and number of its price changes. Volatility is usually measured using standard deviations of logarithmic returns. Many investors track an asset's volatility in order to identify and capitalize on trading opportunities based on perceived price trends. However, excessive and unpredictable price volatility often deters investors who have a lower risk tolerance.

Volume Weighted Average Price (VWAP)

In technical analysis, volume weighted average price (VWAP) is a benchmark that calculates the average price at which an asset has traded throughout the day, based on both volume and price. By automatically averaging the intraday closing prices of an asset over time, VWAP is able to serve as a guide for identifying various support and resistance levels. This makes VWAP an important intraday indicator for traders who rely on technical indicators to more effectively time when to enter and exit their positions.

vTokens (Venus)

vTokens are the primary mechanism for users to interact with the Venus Protocol. vTokens are collateral-pegged assets that allow users to tokenize their traditional crypto assets such as bitcoin (BTC) or ether (ETH) in exchange for vBTC or vETH. vTokens are used on the protocol as a redemption tool for borrowing and supplying assets and minting VAI stablecoins. As well, transactions with vTokens — including redeeming, repaying a borrow, liquidating a borrow, or transferring — is done through a vToken contract. Examples of vTokens that are available on Venus include: vBTC, vETH, vBNB, vBUSD, vUSDC, and vXVS.

Vulnerability Rewards Program (VRP)

A vulnerability rewards program (VRP), or bug bounty, is an initiative that blockchain or software development enterprises may offer to external developers to incentivize the proper reporting of potential problems in the computer code that makes up their network protocol or platform. VRPs typically offer financial rewards to successful auditors of computer code. In the blockchain field, these rewards often come in the form of the network’s underlying cryptocurrency or crypto token.


W

WabiSabi

WabiSabi is an anonymous credential scheme that will be introduced in the Wasabi Wallet 2.0 upgrade of CoinJoin. WabiSabi is designed to facilitate faster, more cost-efficient collaborative transactions, establish a more automated frictionless payment framework within CoinJoin, and potentially enable Wasabi Wallet to more seamlessly integrate with other technologies.

Wallet

A cryptocurrency wallet is a device or service that stores users' public and private keys, allowing them to interact with various blockchains and to send and receive crypto assets. Wallets can be digital (software) or physical (hardware), hot (connected to the internet) or cold (disconnected from the internet), custodial (a trusted third party has control of a user’s private keys) or non-custodial (only the user controls their private keys).

WalletConnect

WalletConnect is an open-source web3 protocol that allows users to connect their crypto wallet(s) with decentralized applications (dApps). You can create an encrypted connection between a wallet and dApp via QR code or by scanning a deep link. The WalletConnect protocol supports over 100 wallets and more than 130 dApps.

WallStreetBets (WSB)

WallStreetBets (WSB) or r/wallstreetbets is a subreddit that is part of the Reddit online forum where users discuss stock and options trading strategies. WSB has become notable because of its tendencies toward aggressive trading strategies and profane language, not to mention its role in the Gamestop short squeeze, which resulted in substantial losses on short positions from U.S. firms. These losses topped $70 billion USD in a relatively short period of time in early 2021.

WannaCry Ransomware

WannaCry (also referred to as WCry, WanaCrypt0r, and Wana Decrypt0r 2.0.) was a ransomware worm deployed in 2017 that targeted vulnerabilities in the Windows operating system, encrypted files on infected devices' hard drives, and demanded a ransom payment in bitcoin (BTC) in order to decrypt the files. The malware rapidly spread through multiple computer networks and impacted users in over 150 countries, resulting in billions of dollars worth of damages and ransom payments.

Wash Trading

Wash trading is a form of market manipulation whereby a security or other asset is bought and sold with the intent to portray misleading market information. Wash trading is often facilitated by a trader and broker colluding to gain substantial profits. Other times, wash trading is executed by a single entity acting as both a buyer and seller of an asset to manipulate its price, or to show substantially increased trading volume compared to the actual amount that is really being traded. Wash trading can also be carried out by trading firms, brokers, and cryptocurrency exchanges.

Watchdog Organization

A watchdog organization is an entity, often non-profit, that monitors the activities of a government or industry with the goal of ensuring that the government or industry does not behave illegally or unethically. Watchdogs alert the public when they have uncovered such behavior.

Watcher (OMG Foundation)

Within the OMG Foundation, a watcher is a computer that monitors the network for unusual and malicious activity and ensures that data submitted to the Ethereum blockchain for finalization is correct. OMG Foundation’s network of watchers is decentralized and any OMG Foundation user can operate a watcher.

Watchlist

A watchlist is a mechanism, usually web-based, that allows users to create a list of cryptocurrencies they wish to follow or track to better research projects they are considering investing in. Alternatively, watchlists can also be used collect and display other ready-to-hand tools related to blockchain. For example, by creating a watchlist on the tradingview.com stock charting platform, a user is able to store and quickly find their favorite technical cryptocurrency charts to assess their investment readiness in real-time.

Waves NG

In the Waves network, the mechanism that selects which node can generate the next block is called Waves-NG. This mechanism separates the Waves blockchain into key blocks and microblocks to reduce the possibility of a fork and to improve network throughput. This is accomplished when the chosen miner node receives permission to generate the next transaction-free block by sending the key block. After the key block is sent, the node creates and sends microblocks in a mining time interval of three seconds (including transactions and reference to a previous microblock or key block). Other miners then mine these microblocks and publish them to the network.

Weak Hands

The term "weak hands" is used in the crypto space to refer to an investor who chooses to sell their investments when there is a substantial dip in the market, taking a loss. This is generally considered to be a poor investment strategy as long-term investors tend to believe that, in time, the value of their cryptocurrency portfolios will rise above and beyond their initial value despite substantial market corrections.

Web 1.0 (Web1)

Web 1.0 was initially launched in the early 1990s when the internet first began to enjoy mainstream adoption. Web 1.0 was primarily a static, read-only infrastructure which generally lacked the more expanded functionalities of Web 2.0. Web 1.0’s infrastructure was made up of many companies that were mostly unable to maintain their monopoly of the internet because they were replaced by more interactive, capable systems that became more widespread in the early 2000s. Today, many see a new evolution of the internet dawning, as blockchain systems seek to foster a more sophisticated, democratic, user-centric version of the internet: Web 3.0.

Web 2.0 (Web2)

The realization of Web 2.0 began in the early 2000’s. This second wave of internet innovation is characterized by its read-write and interactive design model. Platforms such as Amazon, Facebook, Airbnb, Alibaba, and Twitter led the charge in Web 2.0 development, offering dynamic and multi-functional application experiences across all our devices. However, many criticize Web 2.0 for being too centralized, and for paving a path toward excessive focus on profit, unreasonable advertising, mass surveillance, decreased privacy, and widespread data theft. In response, the Web 3.0 movement seeks to leverage blockchain technology to flip the Web 2.0 model on its head and link programs directly with each other.

Web 3.0 (Web3)

The term Web 3.0 refers to a vision of the third generation of computing, which anticipates that technologies like blockchain will decentralize the internet and disintermediate Web 2.0 companies like Facebook, Amazon, LinkedIn, and Apple to enable the online exchange of value, and allow users to own their data. Web 3.0 is designed to benefit all participants using a peer-to-peer (P2P) model for websites, applications, and the internet as a whole. It will focus in many ways, on producing a machine-readable data-driven semantic web. Many believe blockchain and crypto are central to the realization of the open, public, censorship-resistant, borderless, free internet: Web 3.0.

Web Application

A web application is an application software or program that runs on a web server rather than a device's operating system. Web applications are accessible through a web browser with an internet connection and play a central role in defining online user experience (UX).

Web Application Firewall (WAF)

A web application firewall (WAF) is a specific type of application firewall that filters, monitors, and blocks HTTP traffic to and from a specified web service. A WAF sits between external users and web applications and plays a crucial role in securing business-critical web applications and web servers from application-layer attacks. WAFs are different from network firewalls, which provide a barrier between external and internal network traffic, and are therefore designed to protect a secured local-area network (LAN) from unauthorized access.

Web of Trust (Status)

Within the Status Network, the Web of Trust is a decentralized reputation system in which users deposit tokens against usernames to indicate that they trust the user.

Web Wallet

A web wallet is a cryptocurrency wallet that is accessed via a web browser. Many web wallets are custodial services run by cryptocurrency exchanges. Web wallets are considered 'hot wallets' because they are connected to the internet.

Web3 Foundation

Founded by Gavin Wood, the Web3 Foundation is a Switzerland-based nonprofit dedicated to the advancement of web3 technologies. Web3 is envisioned as the next era of the internet and is focused on web decentralization, the online exchange of value, and users being able to own and control their online data. The Web3 Foundation publishes research on cryptography and other blockchain-related fields and has provided hundreds of grants for web3-focused startups and projects. Notable grant recipients include Acala, Celer, WalletConnect, and the Polkadot Technology Alliance.

WebAssembly (WASM)

WebAssembly (WASM) is an industry-standard programming language for running binary programs in web browsers with near-native performance. WASM’s main goal is to enable high performance web applications, and is designed to be a compilation target for any language, including JavaScript, which has long been the primary programming language for web browsers. Since WASM is the product of an ongoing collaboration between the Web 3 Consortium (W3C), Google, Apple, Mozilla, and Microsoft, this standard has built-in support in all major browsers for all platforms and does not need additional plugins to operate within most environments.

WebAuthn

Short for Web Authentication, WebAuthn is an online authentication tool for online environments. WebAuthn allows users to authenticate their identity and verify their accounts using public-key cryptography (PKC) in lieu of a username and password. This is considered far more secure as the WebAuthn-enabled login credentials never leave a user’s device and eliminate password theft opportunities and phishing attacks. WebAuthn can utilize biometric data and can be used to secure everything from your Twitter account to your crypto exchange account.

WebSocket

WebSocket is a computer communications protocol which enables two-way, interactive communication between a web browser or other client and a server.

Wedge (Technical Formation)

A wedge is a technical formation used in technical analysis (TA) that often signifies a reversal in the price of an asset. The two main types of wedges are rising wedges and falling wedges. Falling wedges result when an asset's price decreases in a downward narrowing channel, followed by a bullish reversal in price. Conversely, rising wedges result when an asset's price increases in an upward widening channel, followed by a bearish reversal in price.

Wei

Wei is the smallest denomination of ether (ETH). 1 ETH is equivalent to 1,000,000,000,000,000,000 wei (10^18).

WeNano App (Nano)

The Nano protocol can also be leveraged by network participants who make use of the WeNano mobile app. WeNano is a social wallet that facilitates payments and donations to other community members and through the Nano ‘spots’ feature that makes use of GPS technology. WeNano also allows users to discover other Nano users close to their present location.

Whale

A crypto whale is a high-net-worth individual (HNWI) — or organization — that holds a large amount of a specific cryptocurrency. While there is no exact monetary threshold, a whale's asset holdings (when converted to USD) typically exceed $10,000,000. The number of coins (or tokens) necessary to be considered a whale varies by project. For example (in 2021 prices), an Ethereum whale might have over 10,000 ether (ETH) and a Bitcoin whale might have in excess of 1,000 bitcoins (BTC). Notable Bitcoin whales include Satoshi Nakamoto, Tim Draper, Barry Silbert, and the Winklevoss twins.

White Hat Computer Hacker

A white hat hacker is a computer hacker who works in an ethical manner to combat cyber criminals and their malicious efforts to steal data or commit fraud. White hat hackers identify potential security issues and recommend specific solutions to combat the work of dishonest black hat attackers. The terms “white hat” and “black hat” are meant to convey an analogy for good and evil. White hat hackers are often hired by governments, central banks, large multinational corporations, and other constituents because of their expertise.

Whitelabel Product

A whitelabel product is a product or service which is produced by one entity but rebranded by another entity to make it appear as if they had made it.

Whitelist

Whitelist has multiple meanings in a blockchain context. First, it may refer to a list compiled by a blockchain start-up to assess the legitimacy of potential investors — using identity verification and intended investment amounts — that want to participate in an upcoming funding round. Second, it may refer to when cryptocurrency exchanges or wallets ask a user to verify the authenticity of a withdrawal address by “whitelisting” the address. This is done to prevent the user from becoming a victim of fraudulent withdrawals from their wallet or exchange account by malicious actors.

Whitepaper

A whitepaper is a report-style document that explains a complex issue in relation to a specific industry or field, and discusses how an enterprise solves that problem. Whitepapers typically introduce a business model and development plan. In the context of blockchain, a whitepaper is one of the first documents that is created after a project has a working product and funding. It also acts as a pitch to new investors to help the company further their funding process. For blockchain-specific whitepapers, the technical architecture, token economics, team, and other data are also commonly outlined.

Window Proof of Spacetime (WindowPoSpacetime)

Within the Filecoin network, Window Proof of Spacetime (WindowPoSpacetime) is a specialized type of cryptographic proof which plays a central role in verifying data on the Filecoin network under the Proof-of-Spacetime (PoSpacetime) consensus algorithm. Via WindowPoSpacetime, commitments made by storage miners are audited in 24-hour period increments, which results in a zk-SNARK-compressed proof being published to the Filecoin blockchain.

Withdrawal (Cryptocurrency Transaction)

A withdrawal is the process whereby a user withdraws their funds (usually in the form of cryptocurrency or fiat currency) from one platform to another. Withdrawals are generally used to move assets between wallets and exchanges, and to exchange fiat between a bank account and fiat on-ramp service provider. Withdrawals are a type of blockchain transaction, and often come with a transaction fee that is charged by the service provider and the underlying blockchain network being used to carry out the transaction to cover network transaction fees.

Withdrawal Allowlists

Withdrawal allowlists are an optional layer of security in cryptocurrency exchange accounts which allow users to establish a list of approved cryptocurrency addresses and to restrict withdrawals to those addresses only.

World of Women

World of Women is a collection of 10,000 randomly generated digital collectible portraits of women. WoW non-fungible tokens (NFTs) have varying degrees of rareness.

World Wide Web Consortium (W3C)

The World Wide Web Consortium (W3C) is an international standards organization for the World Wide Web. W3C has over 400 members which collectively develop web standards in tandem with the public and W3C's full-time staff. Additionally, W3C builds software, educational tools, and other services to facilitate an open forum for discussion about the internet.

Worldwide Asset eXchange (WAX)

The Worldwide Asset eXchange (WAX) is a blockchain-based marketplace for physical and virtual items, including non-fungible tokens (NFTs) and video games.

Wrapped Bitcoin (wBTC)

Wrapped Bitcoin (wBTC) is an ERC-20 token which represents bitcoin (BTC) at a 1:1 ratio. wBTC was jointly created by Bit Go, Kyber Network, and Ren, and was intended to bring more liquidity to the Ethereum ecosystem, particularly to decentralized finance (DeFi) applications.

Wrapped Ether (wETH)

Wrapped ether (wETH, also stylized “WETH”) is an ERC-20 representation of ether (ETH), which allows it to be directly traded with other ERC-20 tokens, something not possible with unwrapped ETH. To create wETH, you send ETH to a smart contract, which locks up the ETH and returns wETH. This wETH can be changed back to ETH again by sending the wETH back to the smart contract.

Wrapped Nexus Mutual (wNXM)

Wrapped Nexus Mutual (wNXM) is a one-to-one ERC-20 representation of the Nexus Mutual token (NXM), which is the native token of the Nexus Mutual platform, a decentralized alternative to insurance. While NXM can only be held by members of Nexus Mutual, wNXM can be owned by anyone with an Ethereum address.

Wrapping

A wrapped token is a cryptographic asset that is pegged to the value of another cryptocurrency. The asset is called a wrapped coin or wrapped token because the initial asset is put in a wrapped or specialized digital vault that allows the wrapped token to be created and used on another blockchain protocol. This is done because different blockchains tend to offer different types of functionality for a multitude of uses — so adding one blockchain's asset to another's network can open up a wider range of functional opportunities for that asset.


X

X16R (Hashing Algorithm)

X16R is the hashing algorithm designed, created, and employed by the Ravencoin blockchain network. X16R was designed to reduce the centralization of application-specific integrated circuit (ASIC) mining in the blockchain space. ASIC miners are expensive, specialized computer hardware that many believe make the mining process more profitable for industrial-scale operations and leave retail miners behind. Thus, X16R was designed by Ravencoin as a Proof-of-Work (PoW) alternative that is more resistant to centralization.

XBT (Alternative Bitcoin Ticker)

XBT is an alternative ticker symbol for bitcoin (BTC) used by some exchanges. Its format is derived from a currency code standard created by the International Organization for Standardization (ISO) which stipulates that supranational currency codes should begin with 'X'.

XEM (NEM Blockchain)

XEM is the native token of the NEM blockchain and is used for payments on the network. Additionally, users must hold XEM to participate in NEM's consensus process. NEM utilizes a Proof-of-Importance (POI) algorithm for consensus, which determines who may produce a block through a calculation of a user's relative importance to the network. A user’s relative importance score is based on the number of XEM tokens they hold, in addition to the number of transactions that have been made to and from the user's NEM wallet. Users with high importance scores are more likely to produce blocks on the blockchain.

XRP (Ripple)

XRP is the native coin of the Ripple Ledger Network. It is designed to be a medium of exchange and value transfer, and is intended to be used as a low cost bridge between fiat currencies for a broad range of global transactions.

XYM (Symbol Blockchain)

XYM is the native cryptocurrency of the Symbol blockchain which launched during March of 2021. XYM will be used to pay for transactions on the network. In order to obtain XYM, qualifying XEM holders — holders of the native token of the NEM blockchain, which was created by the same team and preceded Symbol — can claim an equivalent number of XYM.


Y

Year to Date (YTD)

Year to Date (YTD) refers to a specific time period which spans from the first day of the current calendar year, or fiscal year, up to the current date. YTD data is critical for analyzing financial and business trends over time or to compare performance data among investments within the same or different industries. The term is usually used within the traditional investment industry but can be also used as it relates to blockchain and crypto investing to keep track of the performance of assets.

Yearn Improvement Proposal (YIP)

A Yearn Improvement Proposal (YIP) is a mechanism used by the Yearn.Finance ecosystem to propose new features and processes to help determine the direction of the Yearn.Finance project and its underlying blockchain protocol. Proposals are submitted by Yearn.Finance community members and voted on by YFI token holders.

Yearn.Finance

Yearn.Finance is a decentralized community focused on creating a suite of automated, decentralized finance (DeFi) products on Ethereum. Referring to themselves as a ‘collective of contributors,’ the Yearn community is an experiment in decentralization, crowd-sourced investing, and product development.

Yellow Paper

While a yellow paper can have a more general meaning in traditional fields, in the blockchain space a yellow paper is typically a highly technical paper that outlines the technical components of a blockchain or related system. Yellow papers are often shorter versions of white papers that describe the most complex technical aspects of a blockchain protocol.

YFI Token

YFI is the governance token of the Yearn.Finance protocol. YFI holders can submit, discuss, and vote on proposals to change the protocol via the Yearn Improvement Proposal (YIP) process. The total supply of YFI is 30,000, though more tokens can be minted if approved through the governance process.

Yield Curve

A yield curve is a method for plotting data on a graph to measure yields on different investments over various time periods. Traditionally used to plot yields for financial instruments like bonds, yield curves are also useful for yield farming in crypto. Yield curves show the relationship between the interest rates (or borrowing cost) and the term (or time to maturity) of an asset or group of assets. There are three main types of yield curves including inverted, normal, and flat. Normal or upward sloping curves signify economic growth, while inverted or downward sloping curves signify economic decline or recession.

Yield Farming

Yield farming is the practice of staking or locking up cryptocurrencies within a blockchain protocol to generate tokenized rewards. Many decentralized finance (DeFi) projects rely on yield farming to incentivize users to contribute to the network's liquidity and stability, since these projects do not rely on a centralized market facilitator.

Yield Sensitivity

Yield sensitivity, or interest rate sensitivity, is a measurement of how much the price of a fixed-income asset will fluctuate as a result of changes in the interest rate. Generally, securities and other asset types that are more yield-sensitive have greater price fluctuations than those with less yield sensitivity. Yield sensitivity should be taken into consideration when selecting a fixed-income asset that an investor may sell on the secondary market. Yield sensitivity always affects both the buying and selling of an asset, and interest rates and fixed-income asset prices are inversely correlated.

yTokens

yTokens are cryptocurrency derivatives tokens which are awarded to Yearn.Finance liquidity providers (LPs) when they deposit assets into the protocol. Examples of yTokens include yCRV, a derivative of Curve (CRV) and yaLINK, a derivative of Aave's aLINK, which is itself a derivative of the LINK token.

yVaults

yVaults are a feature of the Yearn.Finance protocol which automate the process of yield farming. Users deposit tokens into a yVault, then Yearn borrows stablecoins against the user's asset. The stablecoins are then used for yield farming in various protocols, with the vault shifting strategies as opportunities change. As gains are realized on stablecoins, Yearn converts the gains back into the user's original asset and the user's rewards are paid in that asset. Each yVault has a different annual percentage yield (APY).


Z

Z-Address (Zcash)

A z-address is a 'shielded,' or privacy-enhanced Zcash address. Transactions between one z-address and another do not reveal the parties' addresses, the transaction amount, or the contents of the transaction's memo field on the blockchain. A z-address utilizes Zero-Knowledge Proof (ZKP) cryptography to achieve these features. Z-addresses are interoperable with transparent t-cash addresses, which reveal the transacting parties' addresses, transaction amount, and the contents of the transaction's memo field. Users can therefore send transactions from private address to private address (two z-addresses), from transparent address (t-address) to private address (z-address), or from private address (z-address) to transparent address (t-address). Z-addresses employ zk-SNARK cryptographic proof technology.

Zcash (ZEC)

Zcash is a privacy-focused cryptocurrency project which aims to provide efficient, private transactions for its users via its shielded addresses feature. The Zcash protocol utilizes its native token, ZEC, to facilitate these transactions.

Zerion

Zerion is a portfolio management interface for decentralized finance (DeFi) investors. Offering both a web and mobile app, Zerion allows investors to track their DeFi assets in one place, even if they are spread across multiple wallets. Zerion also enables users to interact with DeFi protocols directly from its platform, making it possible to purchase and exchange tokens, provide liquidity to automated market maker (AMM) pools, and borrow and lend assets without leaving the app.

Zero-Knowledge Proof (ZKP)

A Zero-Knowledge Proof (ZKP) is a type of cryptographic proof that provides users with a higher degree of privacy when engaging in digital transactions. In essence, ZKPs enable one party to prove to another party that they know a specific value, without conveying any other information apart from the fact that they know that value. In short, these proofs allow for information to be accurately verified without sharing any details about the underlying information and the identities of the transaction participants.

Zero-Knowledge Rollup (zk-Rollup)

A Zero-Knowledge Rollup (zk-Rollup) — also known as a Zero-Knowledge Proof Rollup or ZKR — is a Layer-2 scaling solution that uses zk-SNARKs (privacy-based cryptographic proofs) to allow blockchains to bundle transactions into one computation prior to execution by using a smart contract. This secure scaling solution increases transactional throughput while also enhancing protocol privacy. StarkWare, Loopring, Hermez, and Aztec are blockchain networks that use zk-Rollups. Sometimes used in unison with decentralized exchange (DEX) protocols, implementing zk-Rollups on some blockchains can lead to lower transaction fees, improved liquidity, enhanced non-custodial crypto ownership, and more.

Zero-Knowledge Scalable Transparent Argument of Knowledge (zk-STARK)

A zero-knowledge scalable transparent argument of knowledge (zk-STARK) is a specialized type of cryptographic proof that is used to ensure privacy on blockchain-based distributed ledger systems. It works by proving that one party is in possession of specific data without actually revealing the data to the network. Zk-STARKs are a crucial element of Zero-Knowledge Rollups (zk-Rollups), a popular Layer-2 scaling solution. Zk-STARKs are a new development based on zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKS), and are distinguished by being more trustless than their predecessor.

zk-SNARK

A Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK) is a type of cryptographic proof used to ensure privacy on blockchain-based distributed ledger systems. It works by proving that one party is in possession of specific data without actually revealing the data to the network by using a secret key before the transaction is broadcasted. zk-SNARKS became prominent with Zcash, Monero, and other privacy-based blockchain protocols.