A wallet that does not run a full node but relies on remote nodes or servers (SPV or API) to fetch balances and broadcast transactions....
Read MoreA vesting schedule where tokens become available gradually at a constant rate over a defined period after an initial start or cliff....
Read MoreAn additional fee charged to a borrower when their collateralized position is liquidated for falling below maintenance requirements, intended to compensate protocol and incentivize health....
Read MoreThe collateral ratio below which a borrowing position becomes eligible for liquidation, defined as borrowed value divided by collateral value....
Read MoreA hybrid governance model combining direct and representative democracy, where participants can either vote directly on proposals or delegate their voting power to trusted delegates, and can retract…...
Read MoreA type of smart pool on the Balancer protocol designed for fair token distribution and price discovery, especially for new projects launching a token. LBPs dynamically adjust token weights over time…...
Read MoreA DeFi mechanism where participants supply cryptocurrencies to liquidity pools and are rewarded with additional tokens, typically the governance token of the protocol. This incentivizes users to…...
Read MoreA model where token rewards are distributed to users who provide liquidity to decentralized markets, aligning incentives for platform growth....
Read MoreThe process of exchanging one cryptocurrency asset for another using a liquidity pool, typically facilitated by an Automated Market Maker (AMM) on a decentralized exchange (DEX). Traders interact…...
Read MoreAn individual or entity that contributes their cryptocurrency assets to a liquidity pool on a decentralized finance (DeFi) protocol. In return for providing liquidity and enabling trading or lending…...
Read MoreA token issued to users when they supply assets to a liquidity pool, representing their share of the pool’s reserves....
Read MoreA variation of Proof-of-Stake that allows token holders who have staked their tokens (and thus locked them up) to still access liquidity and participate in DeFi or other applications. This is…...
Read MoreA mechanism that allows users to stake their cryptocurrency while maintaining liquidity through tokenized representations of their staked assets. Liquid staking protocols issue derivative tokens that…...
Read MoreA token issued to represent a user’s staked assets in a proof‑of‑stake network, which remains tradable and liquid while underlying tokens earn staking rewards....
Read MoreA fungible token representing a claim on staked assets plus accrued rewards in a liquid staking protocol, enabling use of staked value in DeFi applications....
Read MoreA fee charged by centralized cryptocurrency exchanges, and sometimes by decentralized platforms or launchpads, to list a new coin or token for trading. The fee is intended to cover operational costs…...
Read MoreScholarly or informational articles designed to be continually updated to reflect the latest research, developments, and understanding in a specific, rapidly evolving field. In the blockchain space,…...
Read MoreA device or software that distributes network or application traffic across multiple servers. In a blockchain context, load balancers can be used in front of nodes or API endpoints to improve…...
Read MoreA process used in cross-chain bridges where an asset on one blockchain (Chain A) is locked in a smart contract, and a corresponding wrapped or synthetic asset is minted on another blockchain (Chain B…...
Read MoreA predetermined timeframe during which cryptocurrency tokens or assets cannot be transferred, sold, or otherwise liquidated by their owners due to protocol rules, smart contract conditions, or…...
Read MoreA specific type of cross-chain asset transfer mechanism, often associated with Portal (formerly Wormhole bridge), where an asset is locked on a source chain, a signature (attestation) is generated by…...
Read MoreThe systematic examination of blockchain node logs, consensus records, and transaction execution traces to identify security vulnerabilities, performance bottlenecks, or operational anomalies. Log…...
Read MoreA class of cryptographic hash functions optimized for blockchain applications that scale computational requirements logarithmically rather than linearly as input size increases. These algorithms…...
Read MoreIn an upgradeable smart contract system (typically using a proxy pattern), the logic contract (also known as an implementation contract) contains the actual executable code and business logic for the…...
Read MoreA deliberately planted smart contract vulnerability designed to remain dormant until triggered by specific conditions, such as a timestamp, block number, or external event. Logic time-bombs enable…...
Read MoreThe capability of blockchain systems or trading infrastructure to process transactions with minimal time delay between submission and confirmation. Low latency architectures optimize network…...
Read MoreMining processes or consensus mechanisms designed to consume significantly less electrical energy compared to traditional Proof-of-Work (PoW) systems like Bitcoin's. These approaches aim to make…...
Read MoreA conceptual model that breaks down the cryptographic components of a blockchain or digital security system into distinct functional layers. This layered approach helps in understanding, designing,…...
Read MoreA trading order that does not immediately fill and is instead placed on the order book, adding liquidity to the market. Maker orders wait for another trader (a 'taker') to come along and match with…...
Read MoreA payment or fee discount given by an exchange to traders who provide liquidity by placing maker orders. This incentive encourages market participants to add orders to the order book, thereby…...
Read MoreIn the context of UTXO-based blockchains like Bitcoin, this refers to the process of creating a new unspent transaction output (UTXO) that sends any remaining value from the inputs back to the sender…...
Read MoreA sophisticated cybersecurity attack where malicious code infiltrates a user's web browser, enabling attackers to intercept, modify, or inject data into the communication between the user and…...
Read MoreA specialized cyberattack targeting cryptocurrency transactions on mobile devices by compromising the device's operating system, applications, or communication channels. These attacks intercept,…...
Read MoreA modular blockchain network combining Ethereum Layer 2 scaling technology with a decentralized data availability layer. Mantle uses a hybrid approach with optimistic rollups for execution and a…...
Read MoreA thorough, human-driven review of software source code to identify errors, vulnerabilities, and deviations from design specifications or coding standards. In blockchain, this is a critical step in…...
Read MoreMarket Cap is the abbreviated term for Market Capitalization, representing the total value of a cryptocurrency calculated by multiplying its current price by the circulating supply. This metric…...
Read MoreThe total value of a cryptocurrency or token, calculated by multiplying the current price of a single unit by the total number of units in circulation. Market capitalization provides a more…...
Read MoreAn oracle that provides real-world market data, such as asset prices, trading volumes, or volatility indexes, to a blockchain. This data is then usable by smart contracts for various financial…...
Read MoreA comprehensive regulatory framework established by the European Union to govern cryptocurrencies, digital assets, and their service providers across all EU member states. MiCA creates standardized…...
Read MoreThe root private key in a hierarchical deterministic wallet from which all other keys ultimately derive. The master key represents the highest level in the HD wallet tree structure and, combined with…...
Read MoreThe maximum value that can be extracted from blockchain users beyond standard gas fees by manipulating the ordering, inclusion, or exclusion of transactions within blocks. Originally called "Miner…...
Read MoreThe absolute maximum number of coins or tokens that will ever be created for a particular cryptocurrency, as defined by its protocol. Not all cryptocurrencies have a maximum supply....
Read More