A standard algorithmic transformation used in blockchain oracle systems to reliably convert temperature data between different measurement scales before recording on-chain. These conversions are…...
Read MoreThe legal frameworks, compliance requirements, and operating rules established by governmental authorities to govern the issuance, distribution, and usage of digital currencies created and controlled…...
Read MoreAn entity that positions itself as the intermediary between trading parties in financial transactions, assuming the counterparty risk by becoming the buyer to every seller and the seller to every…...
Read MoreA digital marketplace operated by a company or organization that facilitates cryptocurrency trading through a centralized order book, custody system, and matching engine. Unlike decentralized…...
Read MoreA specialized financial entity that holds securities in immobilized or dematerialized form, facilitates ownership transfers through book-entry settlement, and provides asset servicing for financial…...
Read MoreThe process of validating that blockchain hardware devices and infrastructure components meet standardized quality, safety, and performance requirements established by recognized authorities. These…...
Read MoreA set of standards and specifications designed to create interoperability between different blockchain networks without requiring blockchain-specific implementations. CAIPs define common interfaces,…...
Read MoreA decentralized network of nodes that autonomously monitor and execute smart contract functions when predefined conditions are met, without requiring manual intervention or centralized automation…...
Read MoreA decentralized oracle network that provides reliable, tamper-proof inputs and outputs for complex smart contracts on any blockchain. Chainlink allows smart contracts to securely access off-chain…...
Read MoreA smart contract-based system that verifies and stores block headers from one blockchain within another blockchain, enabling cross-chain communication with cryptographic verification. Chain relays…...
Read MoreAn event where a blockchain's history is altered when a competing chain becomes longer than the current main chain, causing previously confirmed blocks to be replaced. Chain reorganizations (reorgs)…...
Read MoreA malicious attempt to rewrite blockchain history by creating an alternative version of the blockchain that's longer or has more accumulated proof-of-work than the current chain, causing the network…...
Read MoreFormal documents that define the governance, roles, responsibilities, and operational rules of a blockchain consortium or DAO. They serve as the foundational legal and procedural framework....
Read MoreA cryptographic private key mathematically derived from a parent key in a hierarchical deterministic (HD) wallet structure. Child keys maintain a defined relationship with their parent key, allowing…...
Read MoreA Cardano Improvement Proposal that specifies metadata and minting rules for NFTs on Cardano, enabling standardized issuance and discovery of non‑fungible tokens....
Read MoreA Cardano Improvement Proposal defining a standard API for web‑based dApps to interact securely with Cardano wallets, handling transaction building, signing, and submission....
Read MoreThe encrypted form of data after it has been processed by a cryptographic algorithm using a specific key. Ciphertext appears as a seemingly random sequence of characters that cannot be understood…...
Read MoreA variant of the Emergency Stop Pattern that automatically disables contract functions when predefined thresholds or error rates are exceeded....
Read MoreThe number of coins or tokens that are actively available to the public and circulating in the open market. It excludes locked tokens (e.g., held by founders/team, reserved for staking rewards, in…...
Read MoreA security framework combining concise checklists, threat modeling, and lightweight code review practices to integrate security into agile development lifecycles....
Read MoreA vesting schedule where no tokens vest until a specified cliff date, after which a lump sum becomes available....
Read MoreMalicious software that monitors and alters clipboard contents—often replacing cryptocurrency addresses with attacker-controlled addresses to steal funds....
Read MoreA software development approach where the source code is kept private and not shared publicly. In blockchain contexts, closed source components restrict users and developers from viewing, verifying,…...
Read MoreA service that allows individuals to participate in cryptocurrency mining by renting or purchasing mining hardware or hashing power from a remote data center. Users pay a fee to the cloud mining…...
Read MoreFraudulent services that promise cryptocurrency mining returns by selling remote hashpower but either do not perform mining or misappropriate user funds....
Read MoreA type of cryptocurrency wallet where private keys are stored online on servers managed by a third-party provider, accessible via web browsers or mobile apps. While offering convenience and…...
Read MoreThe first transaction in a cryptocurrency block that creates new coins according to the protocol's monetary policy and delivers them, along with transaction fees, to the miner or validator who…...
Read MoreA wallet feature allowing users to select specific UTXOs when creating transactions, optimizing fees, privacy, and UTXO management....
Read MoreA metric measuring blockchain activity by multiplying the amount of coins in a transaction by the number of days since they were last spent. It highlights dormant coins reactivating....
Read MoreA decentralized CoinJoin protocol that enables peers to collaboratively create a joint transaction without a trusted coordinator, using cryptographic shuffling of output addresses....
Read MoreA method of staking cryptocurrency to earn rewards while keeping the private keys that control the staked coins in a secure, offline (cold) storage environment. This enhances security by protecting…...
Read MoreThe practice of keeping private keys entirely offline in secure environments—hardware devices, paper, or air‑gapped systems—to protect against online attacks....
Read MoreA hardware or offline medium that holds private keys away from any network connection, minimizing exposure to online attacks....
Read MoreA wallet that stores private keys offline—such as hardware, paper, or air‑gapped software wallets—minimizing exposure to online threats....
Read MoreA token backed by assets—fiat, crypto, or commodities—held in reserve to maintain value stability or guarantee redemption....
Read MoreProcesses and systems for tracking, optimizing, and liquidating collateral assets used in lending, derivatives, and cross‑chain protocols....
Read MoreTechniques to maximize capital efficiency by selecting, allocating, and rehypothecating collateral across multiple protocols and chains....
Read MoreA smart contract or off‑chain index that catalogs NFT collections, their metadata schemas, and provenance for discovery and verification....
Read MoreA property of cryptographic hash functions meaning it is computationally infeasible to find two different inputs that produce the exact same hash output....
Read MoreThe percentage fee that a validator or staking pool operator deducts from staking rewards before distributing the remainder to delegators....
Read MoreA cryptographic primitive that allows a user to commit to a chosen value while keeping it hidden, with the ability to reveal the value later. Commitment schemes in blockchain enable binding…...
Read MorePortion of a token’s supply reserved for distribution to the broader user base via airdrops, rewards, grants, or community incentives....
Read MoreDecentralized applications designed to interoperate via shared smart contract standards, enabling developers to stack and combine functionality like financial Legos....
Read MoreThe ability of modular blockchain components and cross‑chain protocols to seamlessly interconnect, enabling assets and data to flow between dApps and networks....
Read MoreLayer‑2 rollup architectures designed with modular, reusable components—such as sequencing, execution, and data availability layers—that can be independently upgraded and composed....
Read More