The core software component of a financial exchange (centralized or decentralized) responsible for receiving, validating, and matching buy and sell orders according to a predefined order matching…...
Read MoreThe process of directing a client's trade order to a specific execution venue (e.g., an exchange, a market maker, or a dark pool) to achieve the best possible outcome, often based on factors like…...
Read MoreA valid block that is not part of the main blockchain because a competing block at the same height was accepted by the network majority. Orphan blocks (also called stale blocks) represent alternative…...
Read MoreThe percentage of valid blocks that are mined but ultimately not included in the longest canonical blockchain, instead becoming orphaned (stale) blocks that represent wasted mining effort. Orphan…...
Read MoreA security and administrative approach where blockchain node configuration, monitoring, and maintenance occurs through separate communication channels isolated from the primary blockchain network.…...
Read MoreA language (BIP-380) for describing sets of scriptPubKeys (addresses) in wallets, enabling precise key and script management....
Read MoreA risk management practice in decentralized finance where borrowers must deposit assets worth significantly more than the value of their loan, creating a security buffer against market volatility.…...
Read MoreA specialized trading service that facilitates large cryptocurrency transactions directly between parties outside of conventional exchange order books. OTC desks enable high-volume trades with…...
Read MoreA standardized awareness document identifying the most critical security vulnerabilities in web applications, adapted for blockchain and smart contract development. The OWASP Top 10 for blockchain…...
Read MoreA Bitcoin privacy technique where the recipient of a payment contributes their own inputs to the transaction, breaking the common assumption in blockchain analysis that all inputs come from the same…...
Read MoreShort for 'peer-to-peer network,' a distributed computer system where participants (peers) interact directly with each other without requiring central servers or intermediaries. In blockchain…...
Read MoreA branch of cryptography that uses a bilinear map (a pairing) on elliptic curve groups (or other suitable groups) to enable advanced cryptographic schemes. Pairings allow for three-party Diffie-…...
Read MoreA specialized type of decentralized identifier (DID) created for exclusive use between exactly two parties in a digital relationship, enhancing privacy by preventing correlation across different…...
Read MoreA simulated trading practice that allows users to test cryptocurrency trading strategies using virtual funds without risking real money. Paper trading platforms replicate actual market conditions,…...
Read MoreA physical printout of a public address and its corresponding private key (often as QR codes), allowing cold storage of crypto assets....
Read MoreNodes on a Polkadot or Kusama relay chain that collect parachain transactions, produce candidate blocks, and submit them to validators for inclusion in the shared relay chain....
Read MoreAn insurance model where payouts are triggered automatically by predefined parameters (e.g., weather data, flight delay) rather than assessed losses, often using oracles to verify the trigger event....
Read MoreA private key in a hierarchical deterministic wallet from which child keys are mathematically derived. Parent keys combine with chain codes and indices to generate deterministic children, creating a…...
Read MorePSBT: a standardized format (BIP-174) for Bitcoin transactions that allows multiple parties or devices to add signatures in sequence....
Read MoreRewards—such as tokens, fees, or governance rights—offered to network participants (validators, collators, stakers) to encourage active contribution to protocol security and decentralization....
Read MoreA modern, phishing-resistant credential based on FIDO standards, using public-key cryptography managed by the platform (e.g., OS or browser)....
Read MoreA sequence of words (typically 12, 18, or 24) that serves as a human-readable representation of the cryptographic seed used to generate a hierarchical deterministic wallet's private keys. This…...
Read MoreA widely used key derivation function designed to produce a cryptographic key from a password or passphrase. PBKDF2 applies a pseudorandom function, such as HMAC, to the input password along with a…...
Read MoreSecurely storing passwords by hashing them with a cryptographic hash function—often with salt and pepper—to prevent recovery of plaintext passwords in case of database compromise....
Read MoreA software application designed to securely store and manage passwords, including those used to encrypt software wallets or to access cryptocurrency exchange accounts. It helps users create strong,…...
Read MoreThe process of acquiring, testing, and deploying software updates—patches—to fix vulnerabilities, improve performance, and add features in blockchain nodes and related infrastructure....
Read MoreA specialized paymaster that sponsors gas for Non‑Fungible Financial Flows (NFFs), enabling fee‑less interactions with complex financial smart contracts for users....
Read MoreA Bitcoin protocol (BIP‑47) enabling reusable, privacy‑preserving payment codes that allow payers to derive unique one‑time addresses for recipients without on‑chain address reuse....
Read MoreTechniques—such as CoinJoin, tumblers, payment channels, and privacy-preserving cryptocurrencies—used to obscure transaction origins, amounts, and flows to enhance financial privacy....
Read MoreAn entity that facilitates electronic payments between merchants and customers, offering APIs, wallets, and compliance services for cryptocurrencies or fiat on‑ramps/off‑ramps....
Read MoreA token primarily used as a medium of exchange to purchase goods or services, with a focus on transferability and liquidity....
Read MoreA settlement mechanism ensuring that two linked payments—typically in foreign exchange or cross‑chain transfers—are settled simultaneously, eliminating principal risk....
Read MoreA mining pool reward distribution method that allocates block rewards based on a miner's contribution of shares (partial solutions) over a recent window of time or share submissions, rather than…...
Read MoreA mining pool reward distribution method that pays participants a fixed amount for each valid share (partial solution) they submit, regardless of whether the pool successfully mines a block. Pay-Per-…...
Read MoreA systematic evaluation of code, research, or protocols by independent experts to identify vulnerabilities, ensure correctness, and validate design before deployment....
Read MoreA distributed computer architecture where participants (peers) communicate and share resources directly with each other without requiring central servers or intermediaries. In blockchain systems,…...
Read MoreThe aspect of User Experience (UX) design focused on ensuring a decentralized application (dApp) or blockchain-related service feels fast, responsive, and efficient to the end-user, even when dealing…...
Read MoreA blockchain network where participation is restricted to identified and approved entities, with access controls governing who can read the chain data, submit transactions, or participate in the…...
Read MoreA decentralized application (dApp) where access to some or all of its functionalities is restricted to a specific set of authorized users or entities. This contrasts with permissionless dApps, which…...
Read MoreA model of blockchain or decentralized application (dApp) governance where the ability to participate in decision-making processes (e.g., proposing changes, voting) is restricted to a select group of…...
Read MoreOracle systems that restrict who can provide data or operate oracle nodes to a pre-approved, vetted set of entities. This contrasts with permissionless oracles where anyone can potentially…...
Read MoreA blockchain network that allows anyone to participate without requiring approval from any authority, enabling users to read the blockchain, submit transactions, run nodes, and participate in the…...
Read More