Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

The amount of cryptocurrency that a validator or node operator themselves locks up (stakes) from their own funds to participate in a Proof-of-Stake (PoS) network. This contrasts with delegated stake…...

Read More

Also commonly known as "wash trading," self-trading in cryptocurrency markets is a prohibited form of market manipulation. It involves an individual, entity, or a group of colluding actors repeatedly…...

Read More

A token standard (e.g., ERC‑1155) that allows both fungible and non‑fungible representations within the same contract....

Read More

The application of natural language processing (NLP), text analysis, computational linguistics, and machine learning techniques to identify, extract, quantify, and interpret the collective emotional…...

Read More

A cross-chain bridge that leverages a Layer 2 sequencer to batch, order, and forward transactions or state commitments to a destination chain....

Read More

The practice of running the transaction sequencing service on dedicated, segregated infrastructure to minimize attack surface and ensure high availability....

Read More

In the architecture of Layer 2 (L2) scaling solutions for blockchains, particularly optimistic rollups and ZK-rollups, a sequencer is a specialized node or entity (currently often a single,…...

Read More

Enterprise-class computing components designed for reliability, performance, and manageability in production environments....

Read More

A network address (URL or socket) where a blockchain-related service—such as an API, RPC, or WebSocket—can be accessed....

Read More

A temporary key pair derived from a master key, used to authorize a limited set of transactions or for a limited time....

Read More

The assurance that once a transaction is included and confirmed on the blockchain, it cannot be reversed or altered....

Read More

The blockchain component that provides final, authoritative resolution of transactions, establishing undisputed ownership of assets and irreversibility of transfers. The settlement layer serves as…...

Read More

The danger that a transaction will not settle as expected due to counterparty default, network reorgs, or operational failures....

Read More

A Small Form-factor Pluggable transceiver that provides modular, hot-swappable network connectivity over fiber or copper....

Read More

SFT

Abbreviation for Semi‑Fungible Token, the ERC‑1155 standard enabling mixed fungible and non‑fungible tokens....

Read More

A cryptographic hash function that produces a 256-bit (32-byte) hash value, widely used in blockchain systems particularly Bitcoin. SHA-256 (Secure Hash Algorithm 256-bit) is part of the SHA-2 family…...

Read More

A cryptographic algorithm that divides a secret (such as a private key or seed phrase) into multiple shares, requiring a predefined threshold number of these shares to reconstruct the original secret…...

Read More

A blockchain architecture that partitions its network into smaller, parallel segments called shards, each capable of processing transactions independently. Sharded blockchains horizontally scale by…...

Read More

A non-fungible token that represents fractional ownership or participation rights in a specific shard of a sharded blockchain or pooled asset....

Read More

A blockchain architecture where multiple chains leverage the same validator set and consensus mechanism for security, allowing specialized chains to benefit from the security guarantees of a larger…...

Read More

A token representing fractional ownership or voting shares in a DAO or protocol, analogous to corporate shares....

Read More

Privacy-enhanced blockchain transactions that encrypt transaction details—such as amounts and addresses—using zero-knowledge proofs....

Read More

An exploit where a transaction’s recipient address is underspecified—missing leading zeros—causing ABI decoding to misalign parameters and potentially redirect funds....

Read More

Sia

A decentralized cloud storage platform where hosts rent storage space and renters pay in Siacoin to store encrypted files....

Read More

A separate blockchain that is pegged to a main Layer 1 blockchain (the 'mainchain') through a two-way peg mechanism, allowing assets to be transferred between them. Sidechains have their own…...

Read More

A cross-blockchain infrastructure component that enables the secure transfer of assets and data between a main blockchain (parent chain) and a connected sidechain running in parallel with different…...

Read More

A specialized security assessment methodology that evaluates blockchain systems, hardware wallets, and cryptographic implementations for vulnerabilities to attacks exploiting physical emissions or…...

Read More

A token creation mechanism that allows users to authorize the minting of new tokens through cryptographic signatures rather than direct blockchain transactions. Signature minting separates the…...

Read More

A security exploit where a valid cryptographic signature is maliciously reused in a different context than originally intended. Signature replay attacks capture legitimately signed messages,…...

Read More

Abbreviation for Supersingular Isogeny Key Exchange. A post-quantum key exchange candidate that was later found to be insecure....

Read More

A legal framework (SAFT) used to raise funds for token projects by selling rights to future tokens under securities compliance before token launch....

Read More

A method for verifying that a transaction is included in the blockchain without downloading the full blockchain, using only block headers and Merkle proofs....

Read More

A variation or specific implementation of a Byzantine Fault Tolerance (BFT) consensus algorithm that aims to be simpler to implement or more efficient in certain contexts than traditional BFT…...

Read More

A user experience pattern that shows users the predicted outcome of blockchain transactions before they're submitted to the network. Simulation Preview UX executes read-only simulations of…...

Read More

A complete computing system built on a single circuit board containing processor, memory, storage, and I/O interfaces, commonly used for running lightweight blockchain nodes, validators, or mining…...

Read More

A wallet dedicated to a single blockchain asset, often offering specialized features for that coin....

Read More

In key management, a single point of failure (SPOF) refers to any component, person, or process whose failure or compromise would lead to the loss of access to or control over cryptographic keys, and…...

Read More

A cryptocurrency wallet where transactions require only one digital signature from a single private key to be authorized and executed on the blockchain. Single-signature wallets are the most common…...

Read More

A punitive mechanism in proof-of-stake and other consensus protocols that confiscates a portion of a participant’s stake for misbehavior or downtime....

Read More

A specialized monitoring system that tracks validator behavior in proof-of-stake blockchains to detect and alert on potential slashing conditions or actual penalty events. Slashing monitoring tools…...

Read More

The potential for a validator in a Proof-of-Stake (PoS) network to lose a portion or all of their staked cryptocurrency as a penalty for malicious behavior (e.g., double-signing blocks, attempting to…...

Read More

Quantitative measurements that track the difference between expected and actual execution prices in decentralized exchange transactions. Slippage metrics analyze factors affecting price deviations…...

Read More

A physical card, typically credit-card sized, embedded with a secure integrated circuit (IC) chip that includes a microprocessor and memory. In a blockchain context, smart cards are utilized for the…...

Read More

Self-executing code deployed on a blockchain that automatically implements the terms of an agreement when predetermined conditions are met. Smart contracts enable trustless automation of digital…...

Read More

A systematic security review of smart contract code to identify vulnerabilities, logic errors, and compliance with best practices before deployment....

Read More

A mechanism in smart contracts that allows them to emit signals or log information to the blockchain when certain actions occur during function execution. Off-chain applications can listen for these…...

Read More

A callable unit of code within a smart contract that performs a specific task or set of operations when invoked. Functions define the contract's interface and behavior, allowing users and other…...

Read More

An abstract definition of a contract’s functions and events in Solidity that specifies how other contracts can interact without exposing implementation....

Read More

A reusable Solidity contract containing common functions that can be statically linked or deployed once and referenced via `delegatecall`....

Read More

The stages a smart contract goes through from development and deployment to interaction, upgrade, and eventual deprecation....

Read More