An Ethereum‑client implementation in Java, designed for both public and private permissioned networks, compatible with Ethereum mainnet and enterprise use cases....
Read MoreAn open-source, permissioned blockchain framework designed specifically for enterprise use cases, offering modularity, scalability, and confidentiality features not typically available in public…...
Read MoreAn incubator within the Hyperledger Foundation for experimental blockchain and DLT projects that are not yet mature enough to enter the main Hyperledger greenhouse....
Read MoreA modular blockchain platform under Hyperledger that supports parallel transaction execution and pluggable consensus algorithms for enterprise applications....
Read MoreConnecting blockchain nodes to the Invisible Internet Project (I2P) anonymizing network to obfuscate IP addresses and protect node privacy....
Read MoreA bi‑directional communication conduit between two IBC‑enabled blockchains, maintaining ordered or unordered packet delivery semantics....
Read MoreOn‑chain modules that intercept, transform, or augment IBC packets and acknowledgements, enabling features like fee payment, rate limiting, or custom logic....
Read MoreThe atomic data unit sent over an IBC channel, containing payload, sequence number, source/destination port and channel identifiers, and timeout fields....
Read MoreAn off‑chain process that monitors events on source and destination blockchains, fetches proofs, and submits IBC messages to facilitate cross‑chain communication....
Read MoreA large order split into visible and hidden portions: only a small “tip” is displayed on the order book, while the bulk remains concealed until the tip is filled....
Read MoreA type of public-key encryption that allows a public key to be an arbitrary string, such as an email address or a domain name, rather than a random-looking string. This simplifies key management as…...
Read MoreA periodically updated on‑chain signal broadcasting an entity’s current public identity attributes (e.g., DID document hash), enabling others to discover and verify identity state....
Read MoreA service that mediates between multiple identity providers and relying parties, aggregating, normalizing, and translating identity credentials across domains....
Read MoreAn end‑to‑end process for issuing, verifying, transforming, and revoking identity claims—from data collection through on‑chain anchoring and consumption by relying parties....
Read MoreA graph database linking identities, credentials, attributes, and interactions to build a holistic view of entity relationships and trust paths....
Read MoreA user‑centric service that stores, manages, and shares personal identity data, credentials, and preferences under user control, often implemented as a secure data vault....
Read MoreSupplementary data associated with a digital identity that provides context, characteristics, or attributes about the identity without revealing the core identifying information. In blockchain…...
Read MoreAn entity or system that creates, maintains, and manages digital identity information while providing authentication services to applications. In blockchain contexts, IdPs are evolving from…...
Read MoreA structured format or template that defines the attributes, data types, and relationships that compose a digital identity or verifiable credential in blockchain systems. Identity schemas establish…...
Read MoreA digital application that allows users to store, manage, and selectively share their digital identities, credentials, and cryptographic keys in blockchain ecosystems. Identity wallets give users…...
Read MoreA cryptographic method that uses zero-knowledge proofs to verify specific attributes about a person's identity without revealing any underlying personal data. Identity zk-Proofs allow users to prove…...
Read MoreA trading order type on cryptocurrency exchanges that must be executed immediately, either partially or fully, with any unfilled portion being automatically canceled. IOC orders allow traders to…...
Read MoreA method of thermal management for cryptocurrency mining hardware where equipment is directly submerged in a thermally conductive but electrically insulating liquid coolant. This technique enables…...
Read MoreThe property of blockchain data that prevents it from being altered or deleted once it has been recorded and confirmed. Records become permanent and unchangeable once added to the blockchain....
Read MoreThe property of smart contracts, once deployed on a blockchain, that their code cannot be altered or deleted. This ensures that the rules of the contract remain fixed and predictable as initially…...
Read MoreA Layer 2 scaling solution for Ethereum specifically designed for NFTs and gaming applications, using zero-knowledge proofs to enable gas-free minting and trading while inheriting Ethereum's security…...
Read MoreThe temporary reduction in value that liquidity providers experience when contributing assets to automated market maker (AMM) pools compared to simply holding those assets. Impermanent loss occurs…...
Read MoreFraudulent schemes in the blockchain and cryptocurrency space where attackers pose as trusted entities, projects, or individuals to trick victims into revealing sensitive information or transferring…...
Read MoreThe process of designing a system where the individual goals and motivations of participants are harmonized with the overall objectives of the network or organization. In blockchain, this often…...
Read MoreA specific set of rules, rewards, and penalties designed within a system to encourage participants to behave in a way that benefits the system's overall goals. In blockchain, these mechanisms are…...
Read MoreA documented, systematic approach to addressing and managing the aftermath of a security breach or cyberattack. In the context of blockchain projects, this includes procedures for identifying,…...
Read MoreServices that process, organize, and store blockchain data in a more queryable format, allowing applications to efficiently retrieve information without directly scanning the entire blockchain. They…...
Read MoreAnother term for Solo Mining, where a miner uses their own resources to attempt to find blocks independently, without joining a mining pool. The miner receives the full block reward if successful....
Read MoreAn object‑oriented feature in Solidity allowing contracts to inherit state variables, functions, and modifiers from parent contracts....
Read MoreA fundraising event in which a project sells newly minted tokens to investors in exchange for capital, typically before the project’s mainnet launch....
Read MoreA token sale conducted on a decentralized exchange (DEX), allowing direct peer‑to‑peer participation without centralized intermediaries....
Read MoreA fundraising event where tokens are sold directly on a cryptocurrency exchange platform, which often conducts due diligence and provides listing support....
Read MoreA token launch mechanism on DeFi yield farming platforms where users stake LP tokens to receive new project tokens in proportion to their stake....
Read MoreThe amount of collateral required to open a leveraged trading position in derivatives or margin trading. In blockchain-based financial applications (DeFi), this is the cryptocurrency or token amount…...
Read MoreTechniques used to conceal or encrypt the actual inputs to a computation or transaction while still allowing the computation to be performed correctly. This is particularly relevant in privacy-…...
Read More