The comprehensive set of practices, technologies, and policies used to securely generate, store, back up, and use the cryptographic private keys that control access to blockchain assets. Private key…...
Read MoreThe comprehensive set of practices, technologies, and protocols implemented to protect cryptocurrency private keys from unauthorized access, theft, loss, or compromise. As private keys provide…...
Read MoreA transaction pool accessible only to select participants—such as a relayer network—preventing broad public visibility and mitigating front‑running risks....
Read MoreAn early fundraising round where tokens are sold to selected investors—often VCs or strategic partners—at discounted prices before public sale....
Read MoreTransactions whose details—such as sender, recipient, and amount—are encrypted or hidden from public mempool and block explorers, visible only to authorized parties or via zero‑knowledge proofs....
Read MoreThe capability of a blockchain to execute custom logic and automated operations through code, typically via smart contracts. Programmability allows blockchains to function as computational platforms…...
Read MoreAn NFT with embedded logic—via on‑chain oracles, dynamic metadata, or attached smart contracts—that can change state, behavior, or appearance based on external inputs or events....
Read MoreA wallet that embeds custom smart‑contract logic—such as spending rules, multisig, or automated transfers—beyond simple key‑based signing....
Read MoreAn open‑source systems monitoring and alerting toolkit that scrapes numeric time‑series metrics from instrumented jobs, stores them in a TSDB, and provides a powerful query language (PromQL)....
Read MoreA hybrid consensus mechanism that combines elements of Proof-of-Work (PoW) and Proof-of-Stake (PoS). In Proof-of-Activity, the mining process starts like PoW, but blocks are then signed and validated…...
Read MoreA mechanism that cryptographically verifies the origin and integrity of data or identities in a decentralized system, ensuring messages come from legitimate sources without tampering....
Read MoreA consensus mechanism used in permissioned blockchains where transaction validation and block creation are performed by a limited set of pre-approved nodes (authorities or validators) whose…...
Read MoreBlockchains where a limited set of approved validator nodes—identified by known identities—secure the network and produce blocks, trading decentralization for high throughput and finality....
Read MoreAn oracle model where a fixed set of authorized nodes—rather than decentralized consensus—sign and submit data, trading trust assumptions for higher throughput and simplicity....
Read MoreA resource‑proof that demonstrates a node has dedicated a minimum amount of network bandwidth to the protocol, often used to deter Sybil attacks and allocate network roles....
Read MoreA consensus mechanism that aims to balance efficiency and decentralization by selecting nodes to produce blocks based on a combination of factors including token stake, contribution history, and…...
Read MoreA consensus mechanism where participants 'burn' (destroy) cryptocurrency by sending it to an unspendable address. In return, they gain the right to mine or validate blocks, often proportionally to…...
Read MoreBlockchains where participants ‘burn’ tokens—sending them to an unspendable address—to earn the right to mine or validate blocks, demonstrating long‑term commitment....
Read MoreA consensus mechanism where mining power is determined by the amount of disk space a node allocates to storing precomputed ‘plots,’ enabling low‑energy block validation....
Read MoreA consensus mechanism where mining rights are allocated based on the amount of hard drive storage space (capacity) a participant dedicates to the network. Miners pre-compute and store large datasets…...
Read MoreA verifiable computing protocol where nodes perform specified computations on datasets and produce cryptographic proofs that the results are correct....
Read MoreA broad concept for consensus mechanisms or reward systems where participants are acknowledged or rewarded based on their verifiable contributions to a network or project. These contributions can…...
Read MoreA protocol—used by Helium network—where nodes prove they are providing wireless network coverage by performing cryptographic challenges and witnessing each other’s radio transmissions....
Read MoreA consensus mechanism, primarily developed by Intel, that uses a trusted execution environment (TEE) like Intel SGX to ensure a fair lottery system for determining who gets to create the next block.…...
Read MoreA cryptographic clock that encodes time passage into a verifiable sequence of hashes, enabling nodes to agree on event ordering without messaging overhead....
Read MoreA consensus algorithm, notably used by NEM (New Economy Movement), that determines a user's eligibility to harvest blocks (create new blocks) based on a multi-faceted 'importance score.' This score…...
Read MoreA consensus mechanism that verifies and validates a user's physical presence at a specific geographic location through cryptographic means. Proof-of-Location protocols leverage various technologies…...
Read MoreA consensus mechanism designed for trusted execution environments (TEEs) like Intel SGX that combines the fairness of randomization with the efficiency of trusted computing to achieve consensus…...
Read MoreA cryptographic protocol that allows a storage provider to prove they are storing a physically unique copy (replica) of data, distinct from other copies stored elsewhere in the network. PoRep enables…...
Read MoreA consensus mechanism designed for permissioned blockchain networks that selects validators based on their established organizational reputation and identity rather than computational work or staked…...
Read MoreA cryptographic protocol enabling a client to verify that a remote storage server retains intact a file by issuing challenges and checking short proofs without retrieving the entire file....
Read MoreA consensus mechanism that requires participants to allocate unused disk storage to prove they have reserved space, rather than expending computational energy as in Proof-of-Work....
Read MoreA consensus mechanism that combines Proof-of-Space (PoSpace), where miners allocate hard drive capacity to store data ('plots'), with Proof-of-Time (PoTime), which uses a Verifiable Delay Function (…...
Read MoreA protocol—used by Filecoin—where storage providers prove they continuously store a unique piece of data over time by generating sequential cryptographic proofs....
Read MoreA consensus mechanism where participants (validators) are chosen to create new blocks and validate transactions based on the number of coins they hold and are willing to 'stake' as collateral.…...
Read MoreA consensus variant that weights validators by both the amount of stake and the velocity (activity level) of their tokens, encouraging active participation....
Read MoreA consensus mechanism and cryptographic protocol that verifies a prover is dedicating specific storage resources to storing data over time. Proof of Storage allows a system to confirm that storage…...
Read MoreA consensus mechanism that uses an established proof-of-work blockchain's security to secure a separate blockchain without requiring additional energy expenditure. In Proof of Transfer (PoX), miners…...
Read MoreA consensus or reputation mechanism where nodes earn influence by accumulating trust scores derived from historical behavior and peer endorsements....
Read MoreA consensus mechanism where the computational work performed contributes to solving externally useful problems, rather than arbitrary hash puzzles....
Read MoreA term that can refer to various mechanisms where network participants (validators) prove the legitimacy of transactions or blocks. It's often used more generally in the context of Proof-of-Stake…...
Read MoreA broad category of consensus algorithms where the voting power or probability of creating a new block is proportional to some 'weight' or quantity held by a participant. This weight can be based on…...
Read MoreA consensus mechanism that requires participants (miners) to perform a significant amount of computational work to validate transactions and create new blocks in a blockchain. The first miner to…...
Read MoreThe component of blockchain architecture that defines the rules and standards for how data is formatted, transmitted, and processed within the network. The protocol layer contains the specifications…...
Read MoreThe mechanism by which fees and revenues generated by a protocol—such as trading fees, interest, or insurance premiums—are allocated among stakeholders, treasury, and development funds....
Read MoreA digital asset issued by a blockchain protocol that grants holders access to network features, governance rights, or economic incentives within that ecosystem....
Read MoreIn smart contract development, a proxy contract is a contract that acts as an intermediary, forwarding calls and messages to another contract (the logic contract) while maintaining its own storage…...
Read MoreA smart contract design pattern that separates logic and storage by routing calls through a proxy contract which delegates execution to an implementation contract....
Read More