Glossary

A

ABI

ABI is an acronym for Application Binary Interface, and it is an interface between two binary program modules at the level of machine code, not source code. Blocknative can monitor smart contract ABIs in real-time.

Address (noun)

A unique string of numbers or text appointing a wallet’s location on a blockchain.

Access (adjective)

Principle of Self-Sovereign Identity. Users must have easy and direct access to their own data.

Access Tokens (noun)

Grants access to premium features on a platform or to a commmunity. The token is a tradable membership for exclusive experiences

Airdrop (noun)

Crypto projects use this marketing technique to send their tokens (e.g. coins and NFTs) directly to wallets to raise awareness.

Alpha (noun)

Valuable advice, recommendations, or info given by someone in a position of knowledge.

Altcoin or Als (noun)

Refers to cryptocurrency that is not Bitcoin such as newer projects with a smaller market cap. Alts is short for Altcoins.

Agent

A representative of an identity. It’s possible that require the use of a wallet. May support transfer.

Authentic Chained Data Container Taks Force (ACDC)

The purpose of the ACDC Task Force, is to draft a TSS (ToIP Standard Specification) that defines the standard requirements for the semantics of Authentic Provenance Chaining of Authentic Data Containers.

Ambient Verifiability

Verifiable by anyone, anywhere, at anytime. E.g. Ambient Duplicity Detection describes the possibility of detecting duplicity by anyone, anywhere, anytime.

Autonomic Identifier

An identifier that is self-certifying and self-sovereign

Autonomic Namespace

A namespace that is self-certifying and hence self-administrating. ANs are therefore portable = truly self sovereign.

API

API is an acronym for Application Programming Interface which is an interface between computers or programs that allows information to pass between them.

Asymmetric encryption

The encryption key (also called the public key) and the corresponding decryption key (also called the private key) are different. Asymmetric encryption is also known as public-key encryption.

App Review

An incentive mechanism for application developers in the early stage (first four years) of the ecosystem and helps with bootstrapping the two-sided market.

ATH & ATL (noun)

ATH is short for ‘all-time high’. The highest price point an asset has ever had. ATL is short for ‘all-time low’, the lowest price point an asset has ever had.

Artificial Intelligence -AI-

The theory and development of computer systems that can perform tasks — often using natural language processing (NLP), machine learning and natural language understanding (NLU) — that normally require human intelligence, comprehension and understanding.

Archival Nodes

An archival node is a full node in the blockchain that keeps a complete history of transactions and address state changes since the genesis block. Blocknative enables users to see archival mempool information on public blockchain networks.

Augmented Reality -AR-

Technology, using involving glasses, visors, goggles or smartphones, that superimposes a computer-generated image on a user’s view of the actual world, providing a composite view that often includes perceptual information.

Avatar

A computerized icon or figure which represents a person, pet or entity in video games, internet forums, games, chat rooms, virtual reality and other channels.

B

Base Fee

The base fee is an algorithmically determined fee that users on the Ethereum blockchain must pay to complete a transaction. The base fee is designed to help smooth transaction fees and prevent sudden spikes by targeting 50% full blocks. Depending on how full the new block is, the Base Fee is automatically increased (the block is more than 50% full) or decreased (the block is less than 50% full).

Bear Market (noun) & Bearish (adjective)

A market is bearish when there is a prolonged downward pricing trend and a pessimistic outlook. Sometimes purposely misspelled as beras.

Bid

The bid price represents the maximum price that a buyer is willing to pay for an NFT or token.

Block (noun)

A block is a batch of data transactions stored on the blockchain.

Blockchain (noun)

A digital list of data records. Records are called blocks which are organized in chronological order, linked together like a chain, and secured using cryptography.

Block Explorer (noun)

A tool used to examine detailed information on blockchains. (E.g. Etherscan for the Ethereum transactions)

Block Gas Estimator Feed

The Block Gas Estimator Feed estimates gas prices for the next block based upon the in-flight transactions that are currently in the mempool (pre-chain transactions). With Blocknative’s Gas Platform, Dapp and wallet developers can integrate gas estimation feeds directly into their product. Ethereum blockchain).

Buidl (noun, verb)

meaning ‘build’, a misspelling on purpose used in crypto communities just like HODL (hold).

Bull Market (noun) & Bullish (adjective)

A market is bullish when there is a prolonged upward pricing trend and an optimistic outlook.

Burn (verb)

A strategy where tokens or other digital assets like NFTs are removed from a circulating supply to influence price and demand. Bitcoin and Ethereum don’t have this, but many other Altcoins do.

Bitcoin

A decentralized, digital cryptocurrency that doesn’t rely upon a central bank or trusted source which can be transferred from user to user on a peer-to-peer network using blockchain technology.

Bitcoin (BTC) address

A string of letters and numbers like: 3E53XjqK4Cxt71BGeP2VhpcotM8LZ853C8

 

Sharing this address allows anyone to send Bitcoin to the address.

Blockstack Browser

A deprecated application for accessing identity and storage.

Blockstack Owner Address

Looks like a bitcoin address but starts with ID for example: ID-1J3PUxY5uDShUnHRrMyU6yKtoHEUPhKULs

Burning

Burning a token means that the token is transferred to an address that is a black hole—one that is not owned by any entity and for which guessing the applicable private key is effectively impossible based on known mathematical principles. This effectively destroys the token by making it unavailable for future use and decreases the total number of tokens available from that point forward.

Bootstrapping

Refers to the process of starting up a computer system.

C

Cancel Transactions

A cancel transaction is a type of replacement transaction where a user submits an identical transaction with a higher gas limit so it is mined before the previous transaction. Once the new replacement transaction is confirmed, the original transaction will get dropped. Blocknative’s mempool monitoring tools can track replacement transactions in real-time.

Centralized (adjective)

In a centralized network, there is a central authority that governs and handles the network.

CEX or Centralized Exchange (noun)

An exchange handling cryptocurrency managed by a centralized business. (E.g. Coinbase, Kraken)

CeFi or Centralized Finance (noun)

Centralized businesses participating in crypto. (E.g. BlockFi)

Coin (noun)

Cryptocurrency built on its own native blockchain, with the purpose to store value and serves as an medium of exchange within that specific ecosystem. (E.g. ETH, BTC)

Cold Wallet (noun)

A hardware device used to store cryptocurrency.

Confirmed Transaction

A confirmed transaction is a transaction that has been included in a block and permanently added to the blockchain.

Principle of Self-Sovereign Identity. Users must give explicit permission for an entity to use or access their data. The process of expressing consent should be interactive and well-understood by people.

Consensus (noun)

A collective judgment in which data processors, called nodes, come to an agreement to verify new transactions and blocks to be added to the blockchain. This process is used by consensus mechanisms such as proof of work and proof of stake.

Consensus hash

A consensus hash is a cryptographic hash that each node calculates at each block. It is derived from the accepted state transitions in the last-processed block, and a geometric series of prior-calculated consensus hashes.

Consensus rules

The rules governing the creation of new valid records in a blockchain database, and the mining algorithms used for this purpose.

Control plane

The part of a network that carries signaling traffic and is responsible for routing. Control packets originate from or are destined for a router. Functions of the control plane include system configuration and management.

Controller

The entity that has the capacity to make changes to an identity, cryptocurrency or VC (verifiable credential).

Control Authority

In identity systems Control Authority is who controls what and that is the primary factor in determining the basis for trust in them. The entity with control authority takes action through operations that affect the creation (inception), updating, rotation, revocation, deletion, deletion, and delegation of the authentication factors and their relation to the identifier.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Correlation

An identifier used to indicate that external parties have observed how wallet contents are related. For example, when a public key is reused, it conveys that some common entity is controlling both identifiers. Tracking correlation allows for software to warn when some new information might be about to be exposed.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Control (adjective)

Principle of Self-Sovereign Identity. People must have ultimate authority over their digital identities and personal data.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Custodial and Non-Custodial Wallets

At the core of every crypto wallet is a public and private key pair. Asymmetric cryptography is at the backbone of all distributed ledgers and web3 technologies; without it, no distributed ledgers would exist. Your private key is used to authorize your transactions and receive information. Whoever has the private key of a wallet can access funds and authorize transactions. The private key is critical. The public key is hashed and then used as your wallet address.

 

The distinction between a custodial and non-custodial wallet is who manages your private keys. If you manage your private keys, the wallet is referred to as a non-custodial wallet because no one has custody of your wallet except you. If a third party controls your private keys, then the wallet is a custodial wallet.

Creator Economy

A class of businesses made up of content creators, curators and community builders which enable the content producers to monetize their creations.

Credential

A credential is an order or document that attests or authorizes the qualification, competence or authority granted to an individual by a third party with de jure or de facto authority.

Cryptocurrency (noun)

A digital currency designed for use as money within a digital ecosystem. It is a medium of exchange, storing value, etc. They are maintained by blockchains.

Cryptography (noun)

The computerized practice of encoding and decoding information for secure communication.

Cypherpunk (verb)

Someone who believes in the use of cryptography to affect social and political change through privacy by cryptography. (E.g. Satoshi Nakamoto, anonymous founder of Bitcoin.)

Crypto wallet

A physical or digital device, computer application or smartphone app that stores the public and/or private keys for cryptocurrency transactions, including sending, receiving, buying, selling, swapping of cryptocurrencies and NFTs and digitally signing information

D

Data breach

When an unauthorized person or party steals, views, transmits, copies, or uses information.

DApp or Decentralized Application (noun)

A software application that runs on a distributed network. It’s not hosted on a centralized server, but instead on a peer-to-peer decentralized network.

DAO

A Digital Decentralized Autonomous Organization (DAO, pronounced like the Chinese concept) is a powerful and very flexible organizational structure built on a blockchain.Alternatively, the first known example of a DAO is referred to as The DAO. The DAO served as a form of investor-directed venture capital fund, which sought to provide enterprises with new decentralized business models. Ethereum-based, The DAO’s code was open source. The organization set the record for the most crowdfunded project in 2016. Those funds were partially stolen by hackers. The hack caused an Ethereum hard-fork which lead to the creation of Ethereum Classic.

DApp or Decentralized Application (noun)

An open source software application with backend (not user-facing) code running on a decentralized peer-to-peer network, rather than a centralized server. You may see alternate spellings: dApps, DApps, Dapps, and Đapps.

A software application that runs on a distributed network. It’s not hosted on a centralized server, but instead on a peer-to-peer decentralized network.

decentralized exchange (DEX)

A decentralized exchange is a platform for exchanging cryptocurrencies based on functionality programmed on the blockchain (i.e., in smart contracts). The trading is peer-to-peer, or between pools of liquidity. This is in contrast with a centralized exchange, which is more akin to a bank or investment firm that specializes in cryptocurrencies. Additionally, there are so-called on-ramp providers, who could be compared to currency brokers, exchanging traditional “fiat” money for cryptocurrencies, and do not hold customer’s funds “on deposit” the way a centralized exchange does. There are important technical and regulatory differences between these, which are constantly evolving.

Decentralized Finances (DeFi)

If cryptocurrency is Web3’s monetary system, its financial system is DeFi. This includes familiar concepts like loans and interest-bearing financial instruments, as well as so-called “DeFi primitives”, novel solutions like token swapping and liquidity pools.

Decentralized Identifier (DID)

If cryptocurrency is Web3’s monetary system, its financial system is DeFi. This includes familiar concepts like loans and interest-bearing financial instruments, as well as so-called “DeFi primitives”, novel solutions like token swapping and liquidity pools.

Decentralized Identity Foundation (DIF)

DIF is an engineering-driven organization focused on developing the foundational elements necessary to establish an open ecosystem for decentralized identity and ensure interop between all participants.

Deposit (web 3)

In most web3 contexts, ‘depositing’ refers to the act of transferring some amount of token(s) to an address other than one’s own, most often to a smart contract controlled by a ‘protocol’, such as a decentralized exchange, video game or multiverse, DAO, etc. Generally, the user will receive something in return for their deposit, and the deposit can be claimed at the user’s discretion, or upon completion of given conditions. Compare with ‘stake’.

Derive / Derivation

To derive something is to obtain it from an original source. In the context of crypto-technology, we often discuss “deriving” wallets and accounts from seed phrases (aka Secret Recovery Phrases, or SRPs). This is literally true: the SRP represents a cryptographic key which is used to derive account addresses deterministically, meaning they will be derived the same way each time. Another, more technical, way of referring to this technology is to refer to “hierarchical deterministic” wallets.

Devcon

This is shorthand for the Ethereum Developers’ Conference.

Digital Asset

A digital commodity that is scarce, electronically transferable, and intangible with a market value.

Digital Credential

A digital credential functions similarly to the physical certificates or ID cards you might carry in your wallet. It’s an electronic record that verifies your qualifications, skills, clearances, or status. For instance, it might certify that you have completed a particular course, graduated from a specific school, or are qualified for a certain job, much like a driver’s license confirms your driving ability.
However, unlike traditional paper or plastic forms, a digital credential is a secure digital file. It incorporates advanced security features that ensure its authenticity and integrity, making it trustworthy and resistant to tampering. You can easily and swiftly distribute it via the internet, and it’s safeguarded against unauthorized copying or alterations. 

Digital Identity

An online or networked identity is adopted by an individual, organization, or electronic device.

Digital Signature

A code generated by public key encryption and attached to an electronically transmitted document to verify the contents of the document.

Distributed Denial of Service (DDoS) Attack

A type of cyber-attack in which the perpetrator continuously overwhelms the system with requests in order to prevent service of legitimate requests.

Distributed Ledger

A type of database which spreads across multiple sites, countries, or institutions. Records are stored sequentially in a continuous ledger. Distributed ledger data can be either “permissioned” or “unpermissioned”, determining who can view it. This term is used, often, to refer in general to public blockchain technology, as ‘crypto’ has come to mean ‘cryptocurrency’, ‘web3’ is the collective community, and ‘blockchain’, after all, is “just” the data structure used to sync the distributed ledger itself.

Distributed Ledger Technology (DLT)

Distributed Ledger Technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time. Unlike traditional databases, distributed ledgers have no central data store or administration functionality.

Double Spend

The ‘double spend’ is the benchmark security concern of blockchain networks: how do we ensure that someone doesn’t send the same transaction to two different entities, essentially “spending their money twice”? This is the cornerstone of the consensus mechanism, ensuring that all nodes of the network are “in agreement” about which assets are allocated to which addresses, on an ongoing basis, to prevent malicious actions such as a double spend.

E

EIP (Ethereum Improvement Proposal)

The EIP process is a public and open process through which suggestions are made as to how to change (and hopefully, improve) the way the Ethereum network functions as a whole; the official repository is here. Individual EIPs are referred to by the name assigned to them in the repository, for example, EIP-1559. Keep in mind that as it is an iterative, lengthy process, some EIPs never get fully approved, and some do, and many end up somewhere in a gray area of ‘partially implemented’.

encrypted vs unencrypted keys

As discussed elsewhere, public and private cryptographic key pairs are one of the technologies that underpins cryptocurrencies and “crypto” tech in general. In MetaMask, for example, an unencrypted private key is 64 characters long, and it is used to unlock or restore wallets. An encrypted key is also 64 letters long and is a regular private key that has gone through the process of encryption. Usually, encrypted private keys are kept within the extension or device they are encrypted by, and they remain out of sight from the user. This is meant to add another layer of security to keep a user’s wallet information safe. By way of example: if the wordunderpin ‘Apple’ was your private key, then it was encrypted three letters down the alphabet, your new encrypted key would be ‘Dssoh’. Since you know the way to encrypt this key, you could derive the original private key from it by reversing the method of encryption.

encryption

Encrpytion, literally ‘in a hidden place’, is the art and science of encoding information to control who can read it, or how it is to be read. Encryption occurs in natural (human) languages, as well as in machine and computer languages. Highly complex, and therefore difficult to decipher, encryption is an essential element enabling blockchain networks to be simultaneously public and secure.

Enterprise Ethereum Alliance (EEA)

A group of Ethereum core developers, startups, and large companies working together to commercialize and use Ethereum for different business applications. Website here.

Entropy

In the context of cryptography, ‘entropy’ refers to ‘randomness’; generally, the more random something is (the more entropy it has), the more secure it is.

Entropy

In the context of cryptography, ‘entropy’ refers to ‘randomness’; generally, the more random something is (the more entropy it has), the more secure it is.

Epoch

An epoch, in general, is a measure of time, or of blockchain progression, on a given blockchain. In Ethereum Proof of Stake, an epoch consists of 32 slots, each lasting 12 seconds, for a total of 6.4 minutes per epoch. There is additional functionality built upon the epoch measure in the Beacon Chain to help ensure security and proper operation of the Chain.

ERC-20 Token Standard

ERC is the abbreviation for Ethereum Request for Comment and is followed by the assignment number of the standard. ERC-20 is a technical standard for smart contracts which is used to issue the majority of tokens (in particular, cryptocurrency tokens) extant on Ethereum. This list of rules states the requirements that a token must fulfill to be compliant and function within the Ethereum network.

ERC-721 Token Standard

As stated above, this is another standard for Ethereum smart contracts, which allows for the issuance of a non-fungible token: this is the standard that created what we all now know as an NFT. This token standard is used to represent a unique digital asset that is not interchangeable, as opposed to the ERC-20 (or other equivalent) standard, which issues identical, interchangeable tokens.

ether (ETH)

Ether is the native currency of the Ethereum blockchain network. Ether—also referred to as ETH (pronounced with a long “e”, like “teeth” without the “t”)—functions as a fuel of the Ethereum ecosystem by acting as a medium of incentive and form of payment for network participants to execute essential operations. The cryptocurrency of Ethereum has a lowercase e. The plural of ether is just ether; its abbreviation is ETH, with a space: I have 10 ETH. (nice!)

ether (denominations)

There are a number of denominations of the currency we know as ‘ether’ or ETH; for the definitive explanation, see the original Ethereum Homestead documentation here.

Ethereum

A public blockchain network and decentralized software platform upon which developers build and run applications. As it is a proper noun, it should always be capitalized.

Etherscan

A popular website for analyzing activity on the Ethereum blockchain. See ‘blockchain explorer’.

ENS (Ethereum Name Service)

The Ethereum Name Service is a protocol, managed by a DAO, which assigns human-readable and easy-to-remember addresses to Ethereum addresses and assets, homologous to the traditional internet’s DNS.

ERC (Ethereum Request Comment)

Ethereum Request for Comment, or ERC, is a bit of a misnomer, as it is used to refer to suggestions for modifications that have already made it through the Ethereum Improvement Protocol (EIP) process and have been made standard on Ethereum. An ERC is, essentially, a set of standards for a given operation or topic on the Ethereum network. The authoritative list can be foundhere.

EVM (Ethereum Virtual Machine)

The EVM is a virtual machine that operates on the Ethereum network. It is Turing complete and allows anyone, anywhere to execute arbitrary EVM bytecode. All Ethereum nodes run on the EVM. It is home for smart contracts based on the Ethereum blockchain.

Exchange

A place to trade cryptocurrency. Centralized exchanges, operated by companies like Coinbase and Gemini, function as intermediaries, while decentralized exchanges do not have a central authority.

F

Faucet

A faucet is an application, sometimes a very simple website, other times more complex, that dispenses cryptocurrency. While some networks, especially those in early launch stages, offer “real Mainnet” tokens via faucets, it is much more common for a faucet to be present on a test network, or testnet. These faucets are used by developers to test out dapps or smart contracts before deploying them on Ethereum Mainnet, or users who want to practice an action on the blockchain with no risk. Tokens dispensed by a test faucet stay on the test networks and cannot be exchanged for mainnet equivalents.

Federated Identity Management System (FIMS)

Allows organizations to share identity information across different platforms using a single sign-on (SSO) process, similar to using a Facebook or Google account to access various services.

While FIMS simplifies user access and can enhance security, it also presents challenges:

  • Increased Breach Risk: A breach in one system can potentially compromise all connected systems.
  • Complex Access Revocation: It can be difficult to remove an individual’s access across all systems quickly.
  • Management Complexity: Managing a FIMS involves overseeing multiple settings and configurations across different platforms, which can be challenging for administrators.

Fiat Currency

Government-issued currency. For example, US Dollars (USD), Euros (EUR), Yuan (CNY), and Yen (JPY).

Fork

‘Forking’ is a term that comes from the world of collaborative software development, and refers to the action of copying an existing application or set of code and modifying it to create an alternate version. At the blockchain protocol level, a ‘fork’ creates an alternative version of a blockchain. Forks are often enacted intentionally to apply upgrades to a network. Soft Forks render two chains with some compatibility, while Hard Forks create a new version of the chain that must be adopted to continue participation. In the instance of a contentious Hard Fork, this can create two versions of a blockchain network. See also “hard fork”.

G

Gas fee

A measure of the computational steps required for a transaction on the Ethereum network. This then equates to a fee for network users paid in small units of ETH specified as gwei. See also “ether (denominations)”. For more on gas, see MetaMask’s user guide here.

Gas limit

The gas limit is the maximum amount you’re willing to pay for any given transaction to go through the Ethereum network. Another way of looking at it is as a “rough estimate” of how much computing power your transaction will take.

Gas price

The gas price is what it sounds like: the cost the network is paid for the computational work being performed in a given transaction. It is paid in units of ETH called gwei. Depending on network congestion, the gas price may vary significantly.

Genesis Block

The initial block of data computed in the history of a blockchain network.

Gwei

A minuscule and common denomination of ETH, and the unit in which gas prices are often specified. See ‘ether (denominations)’ entry for more information.

H

Halving

Many cryptocurrencies have a finite supply, which makes them a scarce digital commodity. For example, the total amount of bitcoin that will ever be issued is 21 million. The number of bitcoins generated per block is decreased 50% every four years. This is called “halving.” The final halving will take place in the year 2140.

Hard Fork

A hard fork occurs when there is a change in the blockchain that is not backward compatible (not compatible with older versions), thus requiring all participants to upgrade to the new version in order to be able to continue participating on the network. See also “fork”.

Hardware Wallet

A hardware wallet is a physical device that is used to store cryptographic keys, and generally, sign transactions. Some hardware wallets can be connected physically or through software to internet connectivity; others are ‘air-gapped’, receiving transaction requests and sending transaction approvals through a mechanism such as a QR code. The overall goal of using a hardware wallet to manage keys and signatures is to reduce the likelihood of your keys or Secret Recovery Phrase from being somehow stolen or compromised, due to being connected to the Internet. For more on hardware wallets, see MetaMask’s Hardware Wallet Hub.

Hash

In computing, ‘hashing’ is an operation performed on lists or sets of data to create a reliable index for that data. A particular datum, or a reference to it, is fed into an algorithm, which transforms the datum and returns a standardized, and generally unrecognizable, ‘hash’ of it, sometimes referred to as that datum or file’s “digital fingerprint.” Each block in a blockchain contains the hash value that validated the block before it, followed by its own hash value (this is how the continuity of the ‘chain’ is constructed). Hashes can be used to confirm that blockchain transactions are complete and valid. You may see references to the “transaction hash” or “tx hash”; this should be understood as “unique identifier of the transaction”.

Hierarchical Deterministic (HD) wallet

Hierarchical Deterministic wallets were first created for Bitcoin, and enable the creation of a very large number of accounts based on an initial seed phrase. This technology was later adopted in Ethereum wallets; when restoring a MetaMask wallet from the Secret Recovery Phrase, for example, if you “create” accounts, they will be the same accounts as previously created from that same phrase; they are derived from it.

hexadecimal

Hexadecimal is a base 16, rather than base 10, counting system. Used all over Ethereum for a variety of things, a hexadecimal string is comprised of the numbers 0 1 2 3 4 5 6 7 8 9 and letters A B C D E F.

Holder

In a verifiable credential system, the holder is one of three key participants who owns and stores the credential in a digital wallet. Examples of such credentials include college degrees, professional certificates, identity documents, and course completion certificates, which can be stored in an app on their phone. The issuer, such as a university, originally provides the credential, while the verifier, like an employer, checks its authenticity. Holders can present these digital credentials to verifiers to prove their identity and qualifications conveniently, without the need for physical documents. This ensures that the credentials are legitimate and have not been altered.

Hot wallet / Hot Storage

A wallet that is directly connected to the internet at all times; for example, one that is held on a centralized exchange. Hot wallets are considered to have lower security than cold storage systems or hardware wallets.

Hyperledger

Hyperledger is an ecosystem of open-system tools, libraries, and products designed to enable and support enterprise-grade blockchain technology. In general, the products focus on creating solutions for permissioned blockchains–that is, non-public blockchains, with alternative consensus mechanisms other than Proof of Work (PoW) or Proof of Stake (PoS).That said, there are use cases where such institutions would want to integrate with public blockchains, and for that reason Hyperledger Besu and Hyperledger Burrow are actively developed projects, the former being a Java-based Ethereum client, the latter being a smart contract platform which supports EVM bytecode.

I

ID Wallet / Digital Identity Wallet

A digital tool or application that stores and manages a holder’s Verifiable Credentials (VCs). It allows the holder to present their credentials to verifiers securely.

The inability to be altered or changed. This is a key element of blockchain networks: once written onto a blockchain ledger, data cannot be altered. This immutability provides the basis for commerce and trade to take place on blockchain networks. 

Infura

Part of Consensys, Infura offers backend access to the Ethereum network over established HTTP and WebSockets technology. Prior to Infura, developers were obligated to run their own nodes of the networks with which they wanted to interact; Infura provides that access through a set of APIs. This enables developers of dapps and websites seeking to interact with the Ethereum blockchain to do so, and at scale.

Initial Coin Offering (ICO)

An Initial Coin Offering (also called ICO) occurs when a new token project sells advance tokens in exchange for upfront capital. These have been a vehicle for fraud and scams, and as such are subject to ever-evolving regulation and legislation.

Internal Transaction

An internal transaction on the Ethereum network is one that occurs between smart contracts, rather than between addresses. Notably, they are not included on the blockchain, and therefore do not incur gas fees, but they are often crucial to carrying out the action in question, and can be viewed on Etherscan.

Issuer

An entity that creates and issues Verifiable Credentials (VCs) to holders. The issuer signs the credentials to ensure their authenticity and makes the necessary information available for verification.

In a verifiable credential system, an issuer is the party that creates and provides the credential to a holder. A holder can be a person, organization, device, or object. Issuers can be businesses, organizations, or individuals. 

J

JSON-RPC

JSON-RPC is, quite simply, a method used to move data around computer systems, and predates public blockchain technology. It was chosen as a standard for moving data between blockchain networks and Internet browsers and wallets, with the result that these networks have come to be called ‘RPC networks’, despite JSON-RPC not being their defining technical feature.

K

Keystore File

A keystore file is a special, encrypted version of a private key in JSON format. See also ‘private key’.

Know Your Customer (KYC)

A process in which a business must verify the identity and background information (address, financial details, etc.) of their customers. For example, current regulations and laws require banks and other financial institutions to keep and report customers’ personal information and transactions.

 

L

Layer 2

A Layer 2 network, or L2, is a blockchain that is built specifically to scale another network. For a full understanding of how this is achieved, see here. Some popular examples of this in the Ethereum ecosystem are Arbitrum, Optimism, and StarkNet. These chains are specifically built to handle a large number of transactions quickly by relying on Ethereum Mainnet for security functions, while optimizing for speed and scale. These networks are considered “scaling solutions” while not being part of Ethereum’s protocol-level scaling efforts. See also “blockchain trilemma”, “modular blockchain”, “Serenity”. Contrast with “sidechain”.

light client

In computing, a ‘client’ is a software that runs or accesses a program made available by a remote computer. With blockchain networks, then, clients are the programs that sync blockchain data and participate in network consensus.A light client downloads only a small part of the blockchain, allowing users of low-power or low-storage hardware like smartphones and laptops to maintain almost the same guarantee of security as a full node, despite only downloading part of the entire network state.

Liquid Democracy (Delegative Democracy)

A government system where votes can be delegated or proxied to other individuals such as friends, politicians, or subject matter experts. For example, in a liquid democracy, Bernadette could give Ahmad her vote and Ahmad would then vote for both himself and Bernadette. Liquid democracy is used at times as a governance mechanism for Decentralized Autonomous Organizations (DAOs) wherein every participant is able to vote or delegate their vote to another individual.

liquidity

An asset is considered more ‘liquid’ if it can easily be converted into cash, and therefore, ‘liquidity’ refers to the availability of assets to a company or market. Conversely, the harder it is to turn an asset into cash, the more illiquid the asset. For example, stocks are considered relatively liquid assets, as they can be easily converted to cash while real estate is considered an illiquid asset. The liquidity of an asset affects its risk potential and market price.

M

mainnet

The primary network where actual transactions take place on a specific distributed ledger. For example, The Ethereum Mainnet (capitalized in this case) is the public blockchain where network validation and transactions take place.

market cap

Short for ‘market capitalization’, this refers to the total value held in a particular industry, market, company, or asset. For a publicly traded company, the market cap is the total dollar market value of a company’s outstanding shares. For Bitcoin or Ethereum, the total market cap is a reflection of the current existing supply times the market price.

Maximal Extractable Value (MEV)

Originally known as Miner Extractable Value, MEV is a broad complex topic that refers to the inclusion, exclusion, and reordering of transactions within a block in order to extract more value from it, generally in excess of what a validator (or miner, on PoW networks) would earn from producing the block. MEV includes activities such as frontrunning, arbitrage, and what could be considered malicious actions to profit off of other users’ transactions. This is a very active topic of research that is changing rapidly.

memory pool

Often abbreviated as “mempool”. See “transaction pool”.

Merge, the

Finalized in September 2022, the Merge was the culmination of years of work involved in transitioning Ethereum from a Proof of Work consensus model, to Proof of Stake, all while keeping the network live. This was successful, and reduced the network’s carbon footprint by more than 99.9%.

Merkle Patricia trie

Often referred to simply as a “Merkle trie” (pronounced “tree”), a Merkle Patricia trie is a data structure in which a single hash code function (see ‘hash’) splits into smaller branches. In a similar way to a family tree, where a parent branch splits into child branches, which are then extrapolated into grandchild branches, a Merkle Patricia trie keeps a record of the filiation and history of each element. This type of data structure enables for faster verification on a blockchain network.

Mesh

Consensys Mesh is a network of loosely coupled, tightly aligned teams, products, and investments advancing the Ethereum ecosystem and the arrival of web3.

MetaMask

MetaMask, either in its mobile app form on iOS and Android, or in its browser extension form, is a tool to access and interact with blockchains and the decentralized web. It allows users to manage their digital identity and the permission of others to interact with that identity; its functions include that of a wallet, a dapp permissions manager, and access to token swaps. It is an open-source project that encourages developers from other projects to build on top of it through MetaMask Snaps.

mining

The process by which blocks or transactions are verified and added to a blockchain using a Proof of Work (PoW) consensus mechanism. In order to verify a block, a miner must use a computer to solve a cryptographic problem. Once the computer has solved the problem, the block is considered “mined” or verified. On Bitcoin or other PoW blockchains, the first computer to mine or verify the block receives bitcoin, or the equivalent network token, as a reward.

mnemonic phrase

This is an alternative way of referring to a Secret Recovery Phrase, also known as a ‘seed phrase’: a series of words that correspond to a very long cryptographic key, used to generate and control all the addresses of a crypto wallet.

modular blockchain

Bitcoin is an example of a monolithic blockchain: all of the functions of the network (consensus, execution, data availability, and settlement) are run on one chain. This has significant drawbacks (see “blockchain trilemma” for more). A modular blockchain, on the other hand, separates some or all of these functions into separate chains, each one optimized for its specific function, and relying on the other chains for the other functions.Ethereum is currently moving towards modularization, both on a protocol level beginning with the Merge, which split consensus and execution into two chains, and at the level of “Layer 2” networks which provide optimized execution environments, and then “roll up” their data to Ethereum for its consensus functionality.

multi-signature wallet (multisig)

A crypto-asset wallet which requires multiple keys in order to access and transact. Typically, a specified number of individuals are required to approve or “sign” a transaction before they are able to access the wallet. This is different from most wallets, which only require one signature to approve a transaction.

N

node (full node)

Public blockchains consist of a network of computers which sync the network’s data, coordinate transaction requests, and participate in consensus regarding the validity of those transactions; each one of these computers is called a ‘node’. A full node is a computer that can fully validate transactions and download the entire data of a specific blockchain. In contrast, a “lightweight” or “light” node does not download all pieces of a blockchain’s data, and uses a different validation process.

NFT

When discussing Non-Fungible Tokens (NFTs), “fungibility” refers to an object’s ability to be exchanged for another. For example, an individual dollar is considered fungible, as one dollar is fully interchangeable with another. Artwork is usually deemed non-fungible, as paintings or sculptures are likely to be unequal between them in quality, value, or other attributes. A non-fungible token is a type of token that is a unique digital asset and has no equal token. This is in contrast to cryptocurrencies like ether that are fungible in nature.

NFT aggregator

In the initial wave of interest in buying and selling NFTs, a number of NFT marketplaces–websites where you can buy and sell NFTs–were created. As the market matured, aggregators appeared, which offer the user the ability to view available stock and price, buy, and sell across marketplaces from a single unified application. Similar to familiar web2 shopping portals, these have come to be known as NFT Marketplace Aggregators, or just NFT Aggregators.

nonce

The word ‘nonce’ has a few different meanings, and in different contexts, it ends up getting used a lot of different ways. Originally formed from a contraction of a phrase meaning “not more than once”, on the Ethereum Mainnet, “nonce” refers to a unique transaction identification number that increases in value with each successive transaction in order to ensure various safety features (such as preventing a double-spend). Note that due to its broader use in cryptography, you may encounter ‘nonce’ being used differently on other sidechains or decentralized projects.

O

ommer block

Under the Proof of Work (PoW) consensus mechanism, miners received rewards for being the first to mine a new block. However, at times a block would be mined just after, and in competition with, the last block. This block, known as an ommer and previously as an uncle, could get rolled into subsequent blocks and the miner of the original ommer would get a partial block reward. All of this functionality was deprecated as of the launch of the Beacon Chain.

on-ramp, off-ramp

Based on a metaphor from the American highway system, “on-ramp” refers to a tool, or a service provider, or the action, of converting fiat currency into tokens on a blockchain. Conversely, “off-ramp” refers to exchanging on-chain assets for their value in a given fiat currency. There are many providers of such services, and MetaMask users have access to them through the “Buy Crypto” feature.

optimistic rollup

A rollup that assumes the validity and good faith of transactions, and only runs a fraud proof in the case of fraud being alleged. See also ‘rollup’.

Oracle

Typically, an oracle is any entity or person that is relied on to report the outcome of an event. In a blockchain network an oracle (human or machine) helps communicate data to a smart contract, which can then be used to verify an event or specific outcome.

P

P2P (peer-to-peer)

P2P refers to interactions that happen directly between two parties, usually two separate individuals, and have been present in Internet technology in different ways for some time. These interactions are often coordinated through some sort of app or network, which can consist of any number of individuals. Public blockchains can be considered to have a high degree of P2P functionality, as individuals are able to transact or interact with each other without relying on an intermediary or single point of failure.

parity

In a general sense, to say that something ‘has parity’ with another thing means ‘equal in features or other important quality’, and is a phrase often used by software developers and computer scientists.Parity Technologies is the name of a blockchain technology company that is developing a number of significant projects in the blockchain space. One of its first projects was an Ethereum client, known as Parity; its name was changed to Parity Ethereum, and then was spun out as a DAO-owned and operated project called Open Ethereum, which has also been deprecated. See also ‘client’.

permissioned ledger

A blockchain network in which access to ledger or network requires permission from an individual or group of individuals, as opposed to a public blockchain. Permissioned ledgers may have one or many owners. Consensus on a permissioned ledger is conducted by the trusted actors, such as government departments, banks, or other known entities. Permissioned blockchains or ledgers contain highly-verifiable data sets because the consensus process creates a digital signature, which can be seen by all parties. A permissioned ledger is much easier to maintain and considerably faster than a public blockchain. For example, Quorum or Hyperledger Besu are permissioned ledgers that can be more easily set up for large enterprises. In contrast, the public Ethereum blockchain is a permissionless ledger which anyone can access.

Plasma

‘Plasma’ is a term that is used to refer to one of the solutions being built and deployed in order to securely scale the Ethereum network. A Plasma network functions similarly to an optimistic rollup, inasmuch as it relies on Ethereum Mainnet to maintain the record of transactions, and as the source for arbitration or fraud resolution. However, a Plasma network differs in other important technical ways from rollups, and is currently limited to simple operations, such as swaps and token transfers. More technical information is available here.

PoA, PoS, PoW

Acronyms standing for Proof of X consensus mechanisms: Authority, Stake, Work. The “o” is lowercase since you wouldn’t capitalize “of” when writing out the phrase. See also ‘consensus’, ‘Proof of Authority’, ‘Proof of Stake’, ‘Proof of Work’.

PoS/PoW Hybrid

A hybrid consensus model that utilizes a combination of Proof of Stake (PoS) and Proof of Work (PoW) consensus. Using this Hybrid consensus mechanism, blocks are validated from not only miners, but also voters (stakeholders) to form a balanced network governance.

private blockchain

A blockchain or distributed ledger that has a closed network wherein participants are controlled by a single entity. A private blockchain requires a verification process for new participants. A private blockchain may also limit which individuals are able to participate in consensus of the blockchain network. See also ‘permissioned ledger’.

private currency

A currency or token issued by a private individual or firm. Typically, the token or currency is limited to use within the network of that particular firm or individual. This is not to be confused with a “privacy cryptocurrency”, which are cryptocurrencies with specific privacy features, such as hidden user identities.

private key

A private key is an alphanumeric string of data that, in MetaMask, corresponds to a single specific account in a wallet. Private keys can be thought of as a password that enables an individual to control a specific crypto account. Never reveal your private key to anyone, as whoever controls the private key controls the account funds. If you lose your private key, then you lose access to, and control over, that account.

Proof of Authority (PoA)

A consensus mechanism used in private blockchains, granting a single private key the authority to generate all of the blocks or validate transactions.

Proof of Stake (PoS)

A consensus mechanism in which an individual node, or “validator”, validates transactions or blocks. Validators lock up a certain amount of cryptocurrency, such as ether, into a ‘stake’, in order to be able to participate in consensus. If the node validates a block (group of transactions) correctly, then the validator receives a reward. Conversely, if the validator behaves poorly by validating incorrect transactions or by not maintaining sufficient network connectivity, the cryptocurrency they staked can be ‘slashed’, or taken from them and put out of circulation (‘burned’). PoS requires a negligible amount of computing power compared to Proof of Work consensus.

Proof of Work (PoW)

A consensus mechanism in which each block is ‘mined’ by one of the nodes, or a group of nodes, on the network. The computational process involved in committing a series of transactions into a block on the network, known as ‘hashing a block’, is technically quite simple, and therefore subject to attack. Under PoW, each miner must solve a math problem to find a set, difficult variable in order to be able to propose their block to the network as the next to be ‘mined’. In effect, the process of hashing each block becomes a competition. This addition of solving for a target increases the difficulty of successfully hashing each block, and consequently the security of the network.For each hashed block, the overall process of hashing will have taken some time and computational effort. Thus, a hashed block is considered Proof of Work, and the miner that successfully hashes the block first receives a reward, in the form of cryptocurrency. PoW is singificantly more energy-intensive than other consensus mechanisms, such as Proof of Stake.

protocol

Formally speaking, a ‘protocol’ is a set of rules governing how a process is carried out. This concept is used throughout public blockchain networks and web3 to refer to the way smart contracts execute their functionality in the same way regardless of the user. The products or services built on top of smart contracts are often referred to as ‘protocols’ by extension.

public blockchain

A globally open network wherein anyone can participate in transactions, participate in the consensus protocol to help determine which blocks get added to the chain, maintain and examine the contents of the chain.

public key

Public blockchain networks are just that: public. Their data is accessible and readable by anyone. In order to have any degree of usability when it comes to allowing users to do some things, like send transactions, but not others, like steal other peoples’ tokens, cryptographic technology is used. In particular, a design paradigm known as ‘public/private key pairs’ is employed to ensure users can interact with others on the network as they wish, while keeping their own account secure.These key pairs consist of two long strings of alphanumeric characters. A public key can be derived mathematically from its corresponding private key, but the inverse is not true: it is mathematically impossible to derive a private key from its corresponding public key. This allows, for example, users to have a public wallet address that anyone can use to send them tokens, with the peace of mind that as long as they properly keep the corresponding private key safe, those tokens cannot be stolen. See also ‘private key’.

R

relayer

In the field of Decentralized Finance (DeFi), a relayer is any party or entity which hosts an off-chain orderbook. Relayers help traders discover counter-parties and cryptographically move orders between them. 0x is an example of a popular Ethereum relayer protocol.

Reusable ID / Reusable Identity

In the field of Decentralized Finance (DeFi), a relayer is any party or entity which hosts an off-chain orderbook. Relayers help traders discover counter-parties and cryptographically move orders between them. 0x is an example of a popular Ethereum relayer protocol.

rollups

Rollups (pronounced “roll ups”) are one element in the set of tools and infrastructure being built as scaling solutions for the Ethereum network. They consist, in general, of networks which prioritize their ability to compute transactions and smart contract functionality, and then ‘roll up’ those transactions to Ethereum Mainnet for secure verification of their validity. There are different ways of approaching this problem from a technical point of view, namely Zero Knowledge, or ZK, rollups, and Optimistic rollups. Arbitrum and Optimism are prominent examples. See the entries on both of these types of rollup for more, and more in-depth discussion here.

RPC

The Remote Procedure Call is a technology that is used to transfer data between endpoints. You may often see it referred to as JSON-RPC, which is its full name; see ‘JSON-RPC’ for further details.

rug pull

Similar to the traditional financial scam of a pyramid scheme, a ‘rug pull’ is a cryptocurrency or crypto-token based scam in which the creators of the token create hype, through injecting liquidity into their token, airdropping, and other schemes, and once investors pile in and boost the price of the token up to a certain point, the creators liquidate their (generally majority) share of the tokens, leaving their investors with next to nothing.

S

Satoshi Nakamoto

A pseudonymous individual or entity who created the Bitcoin protocol, solving the digital currency issue of the “double spend.” Nakamoto first published their white paper describing the project in 2008, and the first Bitcoin software was released one year later.

scalability

A change in size or scale to handle a network’s demands. This word is used to refer to a blockchain project’s ability to handle network traffic, future growth, and capacity in its intended application.

Seed (phrase) / Secret Recovery Phrase

The seed phrase, mnemonic, or Secret Recovery Phrase is a crucial part of public blockchain technology, originally created for Bitcoin, and goes by many names. However, they all refer to a set of ordered words which correspond to determined values. These values never change, and therefore the same string of words in the same order will always produce the same number–this is the underlying functionality that allows seed phrases to back up wallets. This is also where the name ‘hierarchical deterministic wallets’ comes from, as all the accounts in a given wallet are deterministically created from the seed phrase, and they are hierarchically controlled by it.A Secret Recovery Phrase is exactly what it sounds like: something that is secret, and should be known only to the owner of the account. If the seed phrase is given to someone else, that person has complete control over the account; they can drain it of tokens and funds, execute transactions with it, etc.

self-executing

Functioning by itself, not controlled by any other party other than itself. Self-executing smart contracts cut costs and overhead by removing the need for an arbitrator and trust toward a third party. See also ‘protocol’.

Serenity

The Ethereum network is working on a series of technical upgrades that will allow massive increases in transaction throughput, amongst other things. The plan that outlined these changes was originally referred to as ‘Serenity’, although that name has become less popular, in favor of specific descriptions of the upgrades themselves.

serialization

The process of converting a data structure into a sequence of bytes. Ethereum internally uses an encoding format called recursive-length prefix encoding (RLP).

sharding

Sharding, in public blockchains, refers to splitting an entire network into multiple portions, called “shards.” Each shard would contain its own independent state, meaning a unique set of account balances and smart contracts. Sharding is currently being investigated and developed as one of the set of tools and solutions for scaling Ethereum.

sidechains

A ‘sidechain’ refers to a chain that is connected to another (most often, to Ethereum) through a bridge, allowing assets to be transferred between them. In contrast to a Layer 2 network or a rollup, a sidechain is a full blockchain network in and of itself, and does not rely on Ethereum for consensus. It therefore must be evaluated independently in terms of its security, stability, and other features. See also “blockchain trilemma”, “modular blockchain”.Note: Bridges exist for good reason; sending tokens from a sidechain to Ethereum mainnet or vice versa would result in token loss.

slashing condition

Under a Proof of Stake (PoS) consensus mechanism, a slashing condition is one that causes the validator’s deposit to be destroyed when they trigger it. See also ‘Proof of Stake’.

slot

A slot, under Ethereum Proof of Stake consensus, is a 12-second period of time during which a new block may (or may not) be proposed. Every 32 slots comprise an epoch. See also ‘epoch’.

smart contracts

Smart contracts are programs that have been published on a public blockchain, and can be used by anyone. While they often contain agreements or sets of actions between parties that emulate a traditional legal contract, they are not, in and of themselves, legal documents. Smart contracts are automated actions that can be coded and executed once a set of conditions is met, and are the dominant form of programming on the Ethereum Virtual Machine.

soft fork

A change to the blockchain protocol resulting in only previously valid blocks and transactions being made invalid. Since old nodes will recognize the new blocks as valid, a soft fork is backward-compatible. However, this can result in a potential divide in the blockchain, as the old software generates blocks that read as invalid according to the new rules. Contrast with ‘hard fork’; for more basic information regarding forks, see ‘fork’.

Solidity

The programming language developers use to write smart contracts on the Ethereum network. Try it out on Remix. See also ‘smart contract’.

stablecoin

A cryptocurrency whose value has been ‘pegged’ to that of something considered a ‘stable’ asset, like fiat currency or gold. It theoretically remains stable in price, as it is measured against a known amount of an asset which should be less subject to fluctuation. Always spelled as one word.

staking

On the Ethereum Proof of Stake network, those wishing to participate in consensus must first lock up, or ‘stake’, 32 ETH into a smart contract; this ETH may be ‘slashed’ (taken from them and ‘burned’, put out of circulation) in the event that their validator behaves maliciously or does not meet performance requirements. Similar Proof of Stake mechanisms are in operation on other networks, as well.Although this is the canonical meaning of the word, similar actions taken at the level of a decentralized exchange (DEX) or another dapp are often called ‘staking’, though it would probably be more accurate and descriptive to just call this ‘locking up tokens’.

state

The set of data that a blockchain network strictly needs to keep track of, and that represents data currently relevant to applications on the chain.

state channels

State channels are part of the set of tools and platforms involved in scaling Ethereum. While a complex topic, state channels are essentially methods through which the current ‘state’ of the blockchain can be exported, and then based on that, any given number of transactions can take place off-chain, and then be moved back onto the main Ethereum chain.

swap

As the number of different blockchain projects and tokens has proliferated, the system by which users exchange one token for another has come to be known as swapping, and the individual action, a swap. Within MetaMask, users have access to a powerful aggregator showing them information about swaps across the ecosystem, this is MetaMask Swaps.

szabo

A denomination of ETH. See also ‘ether (denominations)’.

T

testnet

A testnet is a blockchain network that mirrors, as closely as possible, the current conditions of a corresponding ‘main’ network. Testnets are used by developers to verify that their smart contracts and other functionality work as intended, before permanently recording their code to a live blockchain network (and often spending significant gas fees in the process!).Tokens minted on testnets are not transferrable for their equivalent value on mainnets.

Testnet Kovan

An Ethereum testnet that uses Proof of Authority consensus, available through MetaMask; website here.

Testnet Rinkeby

An Ethereum testnet that uses Proof of Authority consensus, available through MetaMask; faucet here. Following the transition to Proof of Stake, Rinkeby scheduled its deprecation for the end of 2023.

Testnet Ropsten

An Ethereum testnet that used Proof of Work, and, following the transition to Proof of Stake, was deprecated.

token

A token represents an asset issued on an existing blockchain; the transfer of tokens and the addresses that currently hold them are the subject of the network’s consensus activities. There are many types of tokens; see also ‘ERC-20’ and ‘ERC-721’ entries.

Total Value Locked (TVL)

Total Value Locked, or TVL, is a common expression used in many contexts across the crypto ecosystem, so it’s important to pay attention to the specifics. In general, it refers to how much value, in tokens, has been deposited into something.Most often, it refers to a protocol, which is an application on the blockchain, or a set of protocols. For example, a decentralized token trading platform might have a series of liquidity pools, which are protocols enabling swaps between tokens, and the platform may quote the “TVL” for all the pools combined. Alternatively, if a network uses proof of stake for their consensus mechanism, they may represent the TVL of all the tokens staked into that consensus protocol.

transaction block

A collection of transactions on a blockchain network, gathered into a set or a block that can then be hashed and added to the blockchain. See ‘hash’.

transaction fee

A small fee imposed on transactions sent across a blockchain network. These fees are used to pay network validators or miners for their participation in consensus, and thus ensure that a blockchain network is self-sustaining.

transaction pool

When a user submits a transaction to the Ethereum network–or many other networks based on Ethereum–the transaction goes into what’s known as a “transaction pool”, or “txpool” for short. This is essentially a queue of transactions that are waiting to be added to a block and recorded to the blockchain. There are mechanisms that determine which transactions are “picked up” and included in the next block, and there is currently a lot of research surrounding how this decision gets made (see “MEV”). In Bitcoin, the transaction pool is referred to as the “memory pool”, or “mempool”, and often these terms are used interchangeably.

Trust Triangle
The relationship between the issuers, holders, and verifiers is called the trust triangle simply because you need an element of trust among these entities for them to work together. Also, this term is typically used to convey human relationships in the digital world. The party verifying these credentials can check authenticity and validity without informing or consulting the issuer of the credentials, hence safeguarding the sovereignty of the holder.
trustless

‘Trustless’ is a term that gets used a lot in the decentralized web, and it deserves some explanation.Traditionally, to call something ‘trustless’ would sound like a negative thing. In the context of decentralized technology, it has a more technical meaning: since everyone has a copy of the ledger of all transactions ever executed, there is no need for a centralized entity that ‘must be trusted’ as the source of truth. With public blockchain networks, data isn’t kept on some centralized server somewhere that could be hacked or changed arbitrarily; anyone can verify the transactions themselves. This is why the term ‘trustless’ was coined: there is no need for trust, although, in a way, the rules and assurances built into the blockchain provide the basis for greater trust between people, because the system is guaranteed to work the same for everyone.

Turing-complete

Any machine that can calculate on a level equal to a programmable computer is Turing-complete, or computationally universal. The Ethereum Virtual Machine, which processes smart contracts and transactions, is Turing-complete, despite not existing on a single physical computer.

V

validator

A participant in Proof of Stake (PoS) consensus. On Ethereum’s Proof of Stake network, validators need to stake 32 ETH in order to get included in the validator set. See also ‘staking’.

validity proof

The proof submitted along with certain types of rollups to prove that the transactions are valid. See also ‘rollups’.

Validium

One of the technologies developed for scaling of the Ethereum network; see more here.

W

Wallet

In Ethereum-based blockchain technology, a ‘wallet’ is a something that allows you to manage private keys, your Secret Recovery Phrase, and the accounts generated from it. This could be an internet-connected ‘hot wallet’, like MetaMask, or an ‘airgapped’ hardware wallet. In more technical speak, you could say “the wallet is the client, not the keys.”It is very common for people to use the word ‘wallet’ to refer to their SRP itself, or the accounts generated from it, or even to one account.

web3 / Web 3.0

Web3, or Web 3.0, are terms used synonymously with “the decentralized web” and are often used to refer, broadly, to the blockchain and decentralized technology ecosystems and communities as a whole.

Z

zk-SNARKs

Zero-Knowledge Succinct Non-interactive ARguments of Knowledge are an incredible technology, and vital to the scaling of blockchain technology and the decentralized web. They are mathematically complex and can be daunting; this explanation from the Ethereum Foundation is a good primer.

zero address

The Zero Address is an address on the Ethereum network that is the recipient of a special transaction used to register the creation of a new smart contract on the network.

#

51% Attack

If more than half the computer power or mining hash rate on a network is run by a single person or a single group of people, then a 51% attack is in operation. This means that this entity has full control of the network and can negatively affect a cryptocurrency by taking over mining operations, stopping or changing transactions, and double-spending coins.

A

ABI

ABI is an acronym for Application Binary Interface, and it is an interface between two binary program modules at the level of machine code, not source code. Blocknative can monitor smart contract ABIs in real-time.

Address (noun)

A unique string of numbers or text appointing a wallet’s location on a blockchain.

Access (adjective)

Principle of Self-Sovereign Identity. Users must have easy and direct access to their own data.

Access Tokens (noun)

Grants access to premium features on a platform or to a commmunity. The token is a tradable membership for exclusive experiences

Airdrop (noun)

Crypto projects use this marketing technique to send their tokens (e.g. coins and NFTs) directly to wallets to raise awareness.

Alpha (noun)

Valuable advice, recommendations, or info given by someone in a position of knowledge.

Altcoin or Als (noun)

Refers to cryptocurrency that is not Bitcoin such as newer projects with a smaller market cap. Alts is short for Altcoins.

Agent

A representative of an identity. It’s possible that require the use of a wallet. May support transfer.

Authentic Chained Data Container Taks Force (ACDC)

The purpose of the ACDC Task Force, is to draft a TSS (ToIP Standard Specification) that defines the standard requirements for the semantics of Authentic Provenance Chaining of Authentic Data Containers.

Ambient Verifiability

Verifiable by anyone, anywhere, at anytime. E.g. Ambient Duplicity Detection describes the possibility of detecting duplicity by anyone, anywhere, anytime.

Autonomic Identifier

An identifier that is self-certifying and self-sovereign

Autonomic Namespace

A namespace that is self-certifying and hence self-administrating. ANs are therefore portable = truly self sovereign.

API

API is an acronym for Application Programming Interface which is an interface between computers or programs that allows information to pass between them.

Asymmetric encryption

The encryption key (also called the public key) and the corresponding decryption key (also called the private key) are different. Asymmetric encryption is also known as public-key encryption.

App Review

An incentive mechanism for application developers in the early stage (first four years) of the ecosystem and helps with bootstrapping the two-sided market.

ATH & ATL (noun)

ATH is short for ‘all-time high’. The highest price point an asset has ever had. ATL is short for ‘all-time low’, the lowest price point an asset has ever had.

Artificial Intelligence -AI-

The theory and development of computer systems that can perform tasks — often using natural language processing (NLP), machine learning and natural language understanding (NLU) — that normally require human intelligence, comprehension and understanding.

Archival Nodes

An archival node is a full node in the blockchain that keeps a complete history of transactions and address state changes since the genesis block. Blocknative enables users to see archival mempool information on public blockchain networks.

Augmented Reality -AR-

Technology, using involving glasses, visors, goggles or smartphones, that superimposes a computer-generated image on a user’s view of the actual world, providing a composite view that often includes perceptual information.

Avatar

A computerized icon or figure which represents a person, pet or entity in video games, internet forums, games, chat rooms, virtual reality and other channels.

B

Base Fee

The base fee is an algorithmically determined fee that users on the Ethereum blockchain must pay to complete a transaction. The base fee is designed to help smooth transaction fees and prevent sudden spikes by targeting 50% full blocks. Depending on how full the new block is, the Base Fee is automatically increased (the block is more than 50% full) or decreased (the block is less than 50% full).

Bear Market (noun) & Bearish (adjective)

A market is bearish when there is a prolonged downward pricing trend and a pessimistic outlook. Sometimes purposely misspelled as beras.

Bid

The bid price represents the maximum price that a buyer is willing to pay for an NFT or token.

Block (noun)

A block is a batch of data transactions stored on the blockchain.

Blockchain (noun)

A digital list of data records. Records are called blocks which are organized in chronological order, linked together like a chain, and secured using cryptography.

Block Explorer (noun)

A tool used to examine detailed information on blockchains. (E.g. Etherscan for the Ethereum transactions)

Block Gas Estimator Feed

The Block Gas Estimator Feed estimates gas prices for the next block based upon the in-flight transactions that are currently in the mempool (pre-chain transactions). With Blocknative’s Gas Platform, Dapp and wallet developers can integrate gas estimation feeds directly into their product. Ethereum blockchain).

Buidl (noun, verb)

meaning ‘build’, a misspelling on purpose used in crypto communities just like HODL (hold).

Bull Market (noun) & Bullish (adjective)

A market is bullish when there is a prolonged upward pricing trend and an optimistic outlook.

Burn (verb)

A strategy where tokens or other digital assets like NFTs are removed from a circulating supply to influence price and demand. Bitcoin and Ethereum don’t have this, but many other Altcoins do.

Bitcoin

A decentralized, digital cryptocurrency that doesn’t rely upon a central bank or trusted source which can be transferred from user to user on a peer-to-peer network using blockchain technology.

Bitcoin (BTC) address

A string of letters and numbers like: 3E53XjqK4Cxt71BGeP2VhpcotM8LZ853C8

 

Sharing this address allows anyone to send Bitcoin to the address.

Blockstack Browser

A deprecated application for accessing identity and storage.

Blockstack Owner Address

Looks like a bitcoin address but starts with ID for example: ID-1J3PUxY5uDShUnHRrMyU6yKtoHEUPhKULs

Burning

Burning a token means that the token is transferred to an address that is a black hole—one that is not owned by any entity and for which guessing the applicable private key is effectively impossible based on known mathematical principles. This effectively destroys the token by making it unavailable for future use and decreases the total number of tokens available from that point forward.

Bootstrapping

Refers to the process of starting up a computer system.

C

Cancel Transactions

A cancel transaction is a type of replacement transaction where a user submits an identical transaction with a higher gas limit so it is mined before the previous transaction. Once the new replacement transaction is confirmed, the original transaction will get dropped. Blocknative’s mempool monitoring tools can track replacement transactions in real-time.

Centralized (adjective)

In a centralized network, there is a central authority that governs and handles the network.

CEX or Centralized Exchange (noun)

An exchange handling cryptocurrency managed by a centralized business. (E.g. Coinbase, Kraken)

CeFi or Centralized Finance (noun)

Centralized businesses participating in crypto. (E.g. BlockFi)

Coin (noun)

Cryptocurrency built on its own native blockchain, with the purpose to store value and serves as an medium of exchange within that specific ecosystem. (E.g. ETH, BTC)

Cold Wallet (noun)

A hardware device used to store cryptocurrency.

Confirmed Transaction

A confirmed transaction is a transaction that has been included in a block and permanently added to the blockchain.

Consent (adjective)

Principle of Self-Sovereign Identity. Users must give explicit permission for an entity to use or access their data. The process of expressing consent should be interactive and well-understood by people.

Consensus (noun)

A collective judgment in which data processors, called nodes, come to an agreement to verify new transactions and blocks to be added to the blockchain. This process is used by consensus mechanisms such as proof of work and proof of stake.

Consensus hash

A consensus hash is a cryptographic hash that each node calculates at each block. It is derived from the accepted state transitions in the last-processed block, and a geometric series of prior-calculated consensus hashes.

Consensus rules

The rules governing the creation of new valid records in a blockchain database, and the mining algorithms used for this purpose.

Control plane

The part of a network that carries signaling traffic and is responsible for routing. Control packets originate from or are destined for a router. Functions of the control plane include system configuration and management.

Controller

The entity that has the capacity to make changes to an identity, cryptocurrency or VC (verifiable credential).

Control Authority

In identity systems Control Authority is who controls what and that is the primary factor in determining the basis for trust in them. The entity with control authority takes action through operations that affect the creation (inception), updating, rotation, revocation, deletion, deletion, and delegation of the authentication factors and their relation to the identifier.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Correlation

An identifier used to indicate that external parties have observed how wallet contents are related. For example, when a public key is reused, it conveys that some common entity is controlling both identifiers. Tracking correlation allows for software to warn when some new information might be about to be exposed.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Control (adjective)

Principle of Self-Sovereign Identity. People must have ultimate authority over their digital identities and personal data.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Custodial and Non-Custodial Wallets

At the core of every crypto wallet is a public and private key pair. Asymmetric cryptography is at the backbone of all distributed ledgers and web3 technologies; without it, no distributed ledgers would exist. Your private key is used to authorize your transactions and receive information. Whoever has the private key of a wallet can access funds and authorize transactions. The private key is critical. The public key is hashed and then used as your wallet address.

 

The distinction between a custodial and non-custodial wallet is who manages your private keys. If you manage your private keys, the wallet is referred to as a non-custodial wallet because no one has custody of your wallet except you. If a third party controls your private keys, then the wallet is a custodial wallet.

Creator Economy

A class of businesses made up of content creators, curators and community builders which enable the content producers to monetize their creations.

Credential

A credential is an order or document that attests or authorizes the qualification, competence or authority granted to an individual by a third party with de jure or de facto authority.

Cryptocurrency (noun)

A digital currency designed for use as money within a digital ecosystem. It is a medium of exchange, storing value, etc. They are maintained by blockchains.

Cryptography (noun)

The computerized practice of encoding and decoding information for secure communication.

Cypherpunk (verb)

Someone who believes in the use of cryptography to affect social and political change through privacy by cryptography. (E.g. Satoshi Nakamoto, anonymous founder of Bitcoin.)

Crypto wallet

A physical or digital device, computer application or smartphone app that stores the public and/or private keys for cryptocurrency transactions, including sending, receiving, buying, selling, swapping of cryptocurrencies and NFTs and digitally signing information

D

Data breach

When an unauthorized person or party steals, views, transmits, copies, or uses information.

DApp or Decentralized Application (noun)

A software application that runs on a distributed network. It’s not hosted on a centralized server, but instead on a peer-to-peer decentralized network.

DAO

A Digital Decentralized Autonomous Organization (DAO, pronounced like the Chinese concept) is a powerful and very flexible organizational structure built on a blockchain.Alternatively, the first known example of a DAO is referred to as The DAO. The DAO served as a form of investor-directed venture capital fund, which sought to provide enterprises with new decentralized business models. Ethereum-based, The DAO’s code was open source. The organization set the record for the most crowdfunded project in 2016. Those funds were partially stolen by hackers. The hack caused an Ethereum hard-fork which lead to the creation of Ethereum Classic.

DApp or Decentralized Application (noun)

An open source software application with backend (not user-facing) code running on a decentralized peer-to-peer network, rather than a centralized server. You may see alternate spellings: dApps, DApps, Dapps, and Đapps.

A software application that runs on a distributed network. It’s not hosted on a centralized server, but instead on a peer-to-peer decentralized network.

decentralized exchange (DEX)

A decentralized exchange is a platform for exchanging cryptocurrencies based on functionality programmed on the blockchain (i.e., in smart contracts). The trading is peer-to-peer, or between pools of liquidity. This is in contrast with a centralized exchange, which is more akin to a bank or investment firm that specializes in cryptocurrencies. Additionally, there are so-called on-ramp providers, who could be compared to currency brokers, exchanging traditional “fiat” money for cryptocurrencies, and do not hold customer’s funds “on deposit” the way a centralized exchange does. There are important technical and regulatory differences between these, which are constantly evolving.

Decentralized Finances (DeFi)

If cryptocurrency is Web3’s monetary system, its financial system is DeFi. This includes familiar concepts like loans and interest-bearing financial instruments, as well as so-called “DeFi primitives”, novel solutions like token swapping and liquidity pools.

Decentralized Identifier (DID)

If cryptocurrency is Web3’s monetary system, its financial system is DeFi. This includes familiar concepts like loans and interest-bearing financial instruments, as well as so-called “DeFi primitives”, novel solutions like token swapping and liquidity pools.

Decentralized Identity Foundation (DIF)

DIF is an engineering-driven organization focused on developing the foundational elements necessary to establish an open ecosystem for decentralized identity and ensure interop between all participants.

Deposit (web 3)

In most web3 contexts, ‘depositing’ refers to the act of transferring some amount of token(s) to an address other than one’s own, most often to a smart contract controlled by a ‘protocol’, such as a decentralized exchange, video game or multiverse, DAO, etc. Generally, the user will receive something in return for their deposit, and the deposit can be claimed at the user’s discretion, or upon completion of given conditions. Compare with ‘stake’.

Derive / Derivation

To derive something is to obtain it from an original source. In the context of crypto-technology, we often discuss “deriving” wallets and accounts from seed phrases (aka Secret Recovery Phrases, or SRPs). This is literally true: the SRP represents a cryptographic key which is used to derive account addresses deterministically, meaning they will be derived the same way each time. Another, more technical, way of referring to this technology is to refer to “hierarchical deterministic” wallets.

Devcon

This is shorthand for the Ethereum Developers’ Conference.

Digital Asset

A digital commodity that is scarce, electronically transferable, and intangible with a market value.

Digital Credential

A digital credential functions similarly to the physical certificates or ID cards you might carry in your wallet. It’s an electronic record that verifies your qualifications, skills, clearances, or status. For instance, it might certify that you have completed a particular course, graduated from a specific school, or are qualified for a certain job, much like a driver’s license confirms your driving ability.
However, unlike traditional paper or plastic forms, a digital credential is a secure digital file. It incorporates advanced security features that ensure its authenticity and integrity, making it trustworthy and resistant to tampering. You can easily and swiftly distribute it via the internet, and it’s safeguarded against unauthorized copying or alterations. 

Digital Identity

An online or networked identity is adopted by an individual, organization, or electronic device.

Digital Signature

A code generated by public key encryption and attached to an electronically transmitted document to verify the contents of the document.

Distributed Denial of Service (DDoS) Attack

A type of cyber-attack in which the perpetrator continuously overwhelms the system with requests in order to prevent service of legitimate requests.

Distributed Ledger

A type of database which spreads across multiple sites, countries, or institutions. Records are stored sequentially in a continuous ledger. Distributed ledger data can be either “permissioned” or “unpermissioned”, determining who can view it. This term is used, often, to refer in general to public blockchain technology, as ‘crypto’ has come to mean ‘cryptocurrency’, ‘web3’ is the collective community, and ‘blockchain’, after all, is “just” the data structure used to sync the distributed ledger itself.

Distributed Ledger Technology (DLT)

Distributed Ledger Technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time. Unlike traditional databases, distributed ledgers have no central data store or administration functionality.

Double Spend

The ‘double spend’ is the benchmark security concern of blockchain networks: how do we ensure that someone doesn’t send the same transaction to two different entities, essentially “spending their money twice”? This is the cornerstone of the consensus mechanism, ensuring that all nodes of the network are “in agreement” about which assets are allocated to which addresses, on an ongoing basis, to prevent malicious actions such as a double spend.

E

EIP (Ethereum Improvement Proposal)

The EIP process is a public and open process through which suggestions are made as to how to change (and hopefully, improve) the way the Ethereum network functions as a whole; the official repository is here. Individual EIPs are referred to by the name assigned to them in the repository, for example, EIP-1559. Keep in mind that as it is an iterative, lengthy process, some EIPs never get fully approved, and some do, and many end up somewhere in a gray area of ‘partially implemented’.

encrypted vs unencrypted keys

As discussed elsewhere, public and private cryptographic key pairs are one of the technologies that underpins cryptocurrencies and “crypto” tech in general. In MetaMask, for example, an unencrypted private key is 64 characters long, and it is used to unlock or restore wallets. An encrypted key is also 64 letters long and is a regular private key that has gone through the process of encryption. Usually, encrypted private keys are kept within the extension or device they are encrypted by, and they remain out of sight from the user. This is meant to add another layer of security to keep a user’s wallet information safe. By way of example: if the wordunderpin ‘Apple’ was your private key, then it was encrypted three letters down the alphabet, your new encrypted key would be ‘Dssoh’. Since you know the way to encrypt this key, you could derive the original private key from it by reversing the method of encryption.

encryption

Encrpytion, literally ‘in a hidden place’, is the art and science of encoding information to control who can read it, or how it is to be read. Encryption occurs in natural (human) languages, as well as in machine and computer languages. Highly complex, and therefore difficult to decipher, encryption is an essential element enabling blockchain networks to be simultaneously public and secure.

Enterprise Ethereum Alliance (EEA)

A group of Ethereum core developers, startups, and large companies working together to commercialize and use Ethereum for different business applications. Website here.

Entropy

In the context of cryptography, ‘entropy’ refers to ‘randomness’; generally, the more random something is (the more entropy it has), the more secure it is.

Entropy

In the context of cryptography, ‘entropy’ refers to ‘randomness’; generally, the more random something is (the more entropy it has), the more secure it is.

Epoch

An epoch, in general, is a measure of time, or of blockchain progression, on a given blockchain. In Ethereum Proof of Stake, an epoch consists of 32 slots, each lasting 12 seconds, for a total of 6.4 minutes per epoch. There is additional functionality built upon the epoch measure in the Beacon Chain to help ensure security and proper operation of the Chain.

ERC-20 Token Standard

ERC is the abbreviation for Ethereum Request for Comment and is followed by the assignment number of the standard. ERC-20 is a technical standard for smart contracts which is used to issue the majority of tokens (in particular, cryptocurrency tokens) extant on Ethereum. This list of rules states the requirements that a token must fulfill to be compliant and function within the Ethereum network.

ERC-721 Token Standard

As stated above, this is another standard for Ethereum smart contracts, which allows for the issuance of a non-fungible token: this is the standard that created what we all now know as an NFT. This token standard is used to represent a unique digital asset that is not interchangeable, as opposed to the ERC-20 (or other equivalent) standard, which issues identical, interchangeable tokens.

ether (ETH)

Ether is the native currency of the Ethereum blockchain network. Ether—also referred to as ETH (pronounced with a long “e”, like “teeth” without the “t”)—functions as a fuel of the Ethereum ecosystem by acting as a medium of incentive and form of payment for network participants to execute essential operations. The cryptocurrency of Ethereum has a lowercase e. The plural of ether is just ether; its abbreviation is ETH, with a space: I have 10 ETH. (nice!)

ether (denominations)

There are a number of denominations of the currency we know as ‘ether’ or ETH; for the definitive explanation, see the original Ethereum Homestead documentation here.

Ethereum

A public blockchain network and decentralized software platform upon which developers build and run applications. As it is a proper noun, it should always be capitalized.

Etherscan

A popular website for analyzing activity on the Ethereum blockchain. See ‘blockchain explorer’.

ENS (Ethereum Name Service)

The Ethereum Name Service is a protocol, managed by a DAO, which assigns human-readable and easy-to-remember addresses to Ethereum addresses and assets, homologous to the traditional internet’s DNS.

ERC (Ethereum Request Comment)

Ethereum Request for Comment, or ERC, is a bit of a misnomer, as it is used to refer to suggestions for modifications that have already made it through the Ethereum Improvement Protocol (EIP) process and have been made standard on Ethereum. An ERC is, essentially, a set of standards for a given operation or topic on the Ethereum network. The authoritative list can be foundhere.

EVM (Ethereum Virtual Machine)

The EVM is a virtual machine that operates on the Ethereum network. It is Turing complete and allows anyone, anywhere to execute arbitrary EVM bytecode. All Ethereum nodes run on the EVM. It is home for smart contracts based on the Ethereum blockchain.

Exchange

A place to trade cryptocurrency. Centralized exchanges, operated by companies like Coinbase and Gemini, function as intermediaries, while decentralized exchanges do not have a central authority.

F

Faucet

A faucet is an application, sometimes a very simple website, other times more complex, that dispenses cryptocurrency. While some networks, especially those in early launch stages, offer “real Mainnet” tokens via faucets, it is much more common for a faucet to be present on a test network, or testnet. These faucets are used by developers to test out dapps or smart contracts before deploying them on Ethereum Mainnet, or users who want to practice an action on the blockchain with no risk. Tokens dispensed by a test faucet stay on the test networks and cannot be exchanged for mainnet equivalents.

Federated Identity Management System (FIMS)

Allows organizations to share identity information across different platforms using a single sign-on (SSO) process, similar to using a Facebook or Google account to access various services.

While FIMS simplifies user access and can enhance security, it also presents challenges:

  • Increased Breach Risk: A breach in one system can potentially compromise all connected systems.
  • Complex Access Revocation: It can be difficult to remove an individual’s access across all systems quickly.
  • Management Complexity: Managing a FIMS involves overseeing multiple settings and configurations across different platforms, which can be challenging for administrators.

Fiat Currency

Government-issued currency. For example, US Dollars (USD), Euros (EUR), Yuan (CNY), and Yen (JPY).

Fork

‘Forking’ is a term that comes from the world of collaborative software development, and refers to the action of copying an existing application or set of code and modifying it to create an alternate version. At the blockchain protocol level, a ‘fork’ creates an alternative version of a blockchain. Forks are often enacted intentionally to apply upgrades to a network. Soft Forks render two chains with some compatibility, while Hard Forks create a new version of the chain that must be adopted to continue participation. In the instance of a contentious Hard Fork, this can create two versions of a blockchain network. See also “hard fork”.

G

Gas fee

A measure of the computational steps required for a transaction on the Ethereum network. This then equates to a fee for network users paid in small units of ETH specified as gwei. See also “ether (denominations)”. For more on gas, see MetaMask’s user guide here.

Gas limit

The gas limit is the maximum amount you’re willing to pay for any given transaction to go through the Ethereum network. Another way of looking at it is as a “rough estimate” of how much computing power your transaction will take.

Gas price

The gas price is what it sounds like: the cost the network is paid for the computational work being performed in a given transaction. It is paid in units of ETH called gwei. Depending on network congestion, the gas price may vary significantly.

Genesis Block

The initial block of data computed in the history of a blockchain network.

Gwei

A minuscule and common denomination of ETH, and the unit in which gas prices are often specified. See ‘ether (denominations)’ entry for more information.

H

Halving

Many cryptocurrencies have a finite supply, which makes them a scarce digital commodity. For example, the total amount of bitcoin that will ever be issued is 21 million. The number of bitcoins generated per block is decreased 50% every four years. This is called “halving.” The final halving will take place in the year 2140.

Hard Fork

A hard fork occurs when there is a change in the blockchain that is not backward compatible (not compatible with older versions), thus requiring all participants to upgrade to the new version in order to be able to continue participating on the network. See also “fork”.

Hardware Wallet

A hardware wallet is a physical device that is used to store cryptographic keys, and generally, sign transactions. Some hardware wallets can be connected physically or through software to internet connectivity; others are ‘air-gapped’, receiving transaction requests and sending transaction approvals through a mechanism such as a QR code. The overall goal of using a hardware wallet to manage keys and signatures is to reduce the likelihood of your keys or Secret Recovery Phrase from being somehow stolen or compromised, due to being connected to the Internet. For more on hardware wallets, see MetaMask’s Hardware Wallet Hub.

Hash

In computing, ‘hashing’ is an operation performed on lists or sets of data to create a reliable index for that data. A particular datum, or a reference to it, is fed into an algorithm, which transforms the datum and returns a standardized, and generally unrecognizable, ‘hash’ of it, sometimes referred to as that datum or file’s “digital fingerprint.” Each block in a blockchain contains the hash value that validated the block before it, followed by its own hash value (this is how the continuity of the ‘chain’ is constructed). Hashes can be used to confirm that blockchain transactions are complete and valid. You may see references to the “transaction hash” or “tx hash”; this should be understood as “unique identifier of the transaction”.

Hierarchical Deterministic (HD) wallet

Hierarchical Deterministic wallets were first created for Bitcoin, and enable the creation of a very large number of accounts based on an initial seed phrase. This technology was later adopted in Ethereum wallets; when restoring a MetaMask wallet from the Secret Recovery Phrase, for example, if you “create” accounts, they will be the same accounts as previously created from that same phrase; they are derived from it.

hexadecimal

Hexadecimal is a base 16, rather than base 10, counting system. Used all over Ethereum for a variety of things, a hexadecimal string is comprised of the numbers 0 1 2 3 4 5 6 7 8 9 and letters A B C D E F.

Holder

In a verifiable credential system, the holder is one of three key participants who owns and stores the credential in a digital wallet. Examples of such credentials include college degrees, professional certificates, identity documents, and course completion certificates, which can be stored in an app on their phone. The issuer, such as a university, originally provides the credential, while the verifier, like an employer, checks its authenticity. Holders can present these digital credentials to verifiers to prove their identity and qualifications conveniently, without the need for physical documents. This ensures that the credentials are legitimate and have not been altered.

Hot wallet / Hot Storage

A wallet that is directly connected to the internet at all times; for example, one that is held on a centralized exchange. Hot wallets are considered to have lower security than cold storage systems or hardware wallets.

Hyperledger

Hyperledger is an ecosystem of open-system tools, libraries, and products designed to enable and support enterprise-grade blockchain technology. In general, the products focus on creating solutions for permissioned blockchains–that is, non-public blockchains, with alternative consensus mechanisms other than Proof of Work (PoW) or Proof of Stake (PoS).That said, there are use cases where such institutions would want to integrate with public blockchains, and for that reason Hyperledger Besu and Hyperledger Burrow are actively developed projects, the former being a Java-based Ethereum client, the latter being a smart contract platform which supports EVM bytecode.

I

ID Wallet / Digital Identity Wallet

A digital tool or application that stores and manages a holder’s Verifiable Credentials (VCs). It allows the holder to present their credentials to verifiers securely.

The inability to be altered or changed. This is a key element of blockchain networks: once written onto a blockchain ledger, data cannot be altered. This immutability provides the basis for commerce and trade to take place on blockchain networks. 

Infura

Part of Consensys, Infura offers backend access to the Ethereum network over established HTTP and WebSockets technology. Prior to Infura, developers were obligated to run their own nodes of the networks with which they wanted to interact; Infura provides that access through a set of APIs. This enables developers of dapps and websites seeking to interact with the Ethereum blockchain to do so, and at scale.

Initial Coin Offering (ICO)

An Initial Coin Offering (also called ICO) occurs when a new token project sells advance tokens in exchange for upfront capital. These have been a vehicle for fraud and scams, and as such are subject to ever-evolving regulation and legislation.

Internal Transaction

An internal transaction on the Ethereum network is one that occurs between smart contracts, rather than between addresses. Notably, they are not included on the blockchain, and therefore do not incur gas fees, but they are often crucial to carrying out the action in question, and can be viewed on Etherscan.

Issuer

An entity that creates and issues Verifiable Credentials (VCs) to holders. The issuer signs the credentials to ensure their authenticity and makes the necessary information available for verification.

In a verifiable credential system, an issuer is the party that creates and provides the credential to a holder. A holder can be a person, organization, device, or object. Issuers can be businesses, organizations, or individuals. 

J

JSON-RPC

JSON-RPC is, quite simply, a method used to move data around computer systems, and predates public blockchain technology. It was chosen as a standard for moving data between blockchain networks and Internet browsers and wallets, with the result that these networks have come to be called ‘RPC networks’, despite JSON-RPC not being their defining technical feature.

K

K

keystore file

A keystore file is a special, encrypted version of a private key in JSON format. See also ‘private key’.

Know Your Customer (KYC)

A process in which a business must verify the identity and background information (address, financial details, etc.) of their customers. For example, current regulations and laws require banks and other financial institutions to keep and report customers’ personal information and transactions.

L

Layer 2

A Layer 2 network, or L2, is a blockchain that is built specifically to scale another network. For a full understanding of how this is achieved, see here. Some popular examples of this in the Ethereum ecosystem are Arbitrum, Optimism, and StarkNet. These chains are specifically built to handle a large number of transactions quickly by relying on Ethereum Mainnet for security functions, while optimizing for speed and scale. These networks are considered “scaling solutions” while not being part of Ethereum’s protocol-level scaling efforts. See also “blockchain trilemma”, “modular blockchain”, “Serenity”. Contrast with “sidechain”.

light client

In computing, a ‘client’ is a software that runs or accesses a program made available by a remote computer. With blockchain networks, then, clients are the programs that sync blockchain data and participate in network consensus.A light client downloads only a small part of the blockchain, allowing users of low-power or low-storage hardware like smartphones and laptops to maintain almost the same guarantee of security as a full node, despite only downloading part of the entire network state.

Liquid Democracy (Delegative Democracy)

A government system where votes can be delegated or proxied to other individuals such as friends, politicians, or subject matter experts. For example, in a liquid democracy, Bernadette could give Ahmad her vote and Ahmad would then vote for both himself and Bernadette. Liquid democracy is used at times as a governance mechanism for Decentralized Autonomous Organizations (DAOs) wherein every participant is able to vote or delegate their vote to another individual.

liquidity

An asset is considered more ‘liquid’ if it can easily be converted into cash, and therefore, ‘liquidity’ refers to the availability of assets to a company or market. Conversely, the harder it is to turn an asset into cash, the more illiquid the asset. For example, stocks are considered relatively liquid assets, as they can be easily converted to cash while real estate is considered an illiquid asset. The liquidity of an asset affects its risk potential and market price.

M

mainnet

The primary network where actual transactions take place on a specific distributed ledger. For example, The Ethereum Mainnet (capitalized in this case) is the public blockchain where network validation and transactions take place.

market cap

Short for ‘market capitalization’, this refers to the total value held in a particular industry, market, company, or asset. For a publicly traded company, the market cap is the total dollar market value of a company’s outstanding shares. For Bitcoin or Ethereum, the total market cap is a reflection of the current existing supply times the market price.

Maximal Extractable Value (MEV)

Originally known as Miner Extractable Value, MEV is a broad complex topic that refers to the inclusion, exclusion, and reordering of transactions within a block in order to extract more value from it, generally in excess of what a validator (or miner, on PoW networks) would earn from producing the block. MEV includes activities such as frontrunning, arbitrage, and what could be considered malicious actions to profit off of other users’ transactions. This is a very active topic of research that is changing rapidly.

memory pool

Often abbreviated as “mempool”. See “transaction pool”.

Merge, the

Finalized in September 2022, the Merge was the culmination of years of work involved in transitioning Ethereum from a Proof of Work consensus model, to Proof of Stake, all while keeping the network live. This was successful, and reduced the network’s carbon footprint by more than 99.9%.

Merkle Patricia trie

Often referred to simply as a “Merkle trie” (pronounced “tree”), a Merkle Patricia trie is a data structure in which a single hash code function (see ‘hash’) splits into smaller branches. In a similar way to a family tree, where a parent branch splits into child branches, which are then extrapolated into grandchild branches, a Merkle Patricia trie keeps a record of the filiation and history of each element. This type of data structure enables for faster verification on a blockchain network.

Mesh

Consensys Mesh is a network of loosely coupled, tightly aligned teams, products, and investments advancing the Ethereum ecosystem and the arrival of web3.

MetaMask

MetaMask, either in its mobile app form on iOS and Android, or in its browser extension form, is a tool to access and interact with blockchains and the decentralized web. It allows users to manage their digital identity and the permission of others to interact with that identity; its functions include that of a wallet, a dapp permissions manager, and access to token swaps. It is an open-source project that encourages developers from other projects to build on top of it through MetaMask Snaps.

mining

The process by which blocks or transactions are verified and added to a blockchain using a Proof of Work (PoW) consensus mechanism. In order to verify a block, a miner must use a computer to solve a cryptographic problem. Once the computer has solved the problem, the block is considered “mined” or verified. On Bitcoin or other PoW blockchains, the first computer to mine or verify the block receives bitcoin, or the equivalent network token, as a reward.

mnemonic phrase

This is an alternative way of referring to a Secret Recovery Phrase, also known as a ‘seed phrase’: a series of words that correspond to a very long cryptographic key, used to generate and control all the addresses of a crypto wallet.

modular blockchain

Bitcoin is an example of a monolithic blockchain: all of the functions of the network (consensus, execution, data availability, and settlement) are run on one chain. This has significant drawbacks (see “blockchain trilemma” for more). A modular blockchain, on the other hand, separates some or all of these functions into separate chains, each one optimized for its specific function, and relying on the other chains for the other functions.Ethereum is currently moving towards modularization, both on a protocol level beginning with the Merge, which split consensus and execution into two chains, and at the level of “Layer 2” networks which provide optimized execution environments, and then “roll up” their data to Ethereum for its consensus functionality.

multi-signature wallet (multisig)

A crypto-asset wallet which requires multiple keys in order to access and transact. Typically, a specified number of individuals are required to approve or “sign” a transaction before they are able to access the wallet. This is different from most wallets, which only require one signature to approve a transaction.

N

node (full node)

Public blockchains consist of a network of computers which sync the network’s data, coordinate transaction requests, and participate in consensus regarding the validity of those transactions; each one of these computers is called a ‘node’. A full node is a computer that can fully validate transactions and download the entire data of a specific blockchain. In contrast, a “lightweight” or “light” node does not download all pieces of a blockchain’s data, and uses a different validation process.

NFT

When discussing Non-Fungible Tokens (NFTs), “fungibility” refers to an object’s ability to be exchanged for another. For example, an individual dollar is considered fungible, as one dollar is fully interchangeable with another. Artwork is usually deemed non-fungible, as paintings or sculptures are likely to be unequal between them in quality, value, or other attributes. A non-fungible token is a type of token that is a unique digital asset and has no equal token. This is in contrast to cryptocurrencies like ether that are fungible in nature.

NFT aggregator

In the initial wave of interest in buying and selling NFTs, a number of NFT marketplaces–websites where you can buy and sell NFTs–were created. As the market matured, aggregators appeared, which offer the user the ability to view available stock and price, buy, and sell across marketplaces from a single unified application. Similar to familiar web2 shopping portals, these have come to be known as NFT Marketplace Aggregators, or just NFT Aggregators.

nonce

The word ‘nonce’ has a few different meanings, and in different contexts, it ends up getting used a lot of different ways. Originally formed from a contraction of a phrase meaning “not more than once”, on the Ethereum Mainnet, “nonce” refers to a unique transaction identification number that increases in value with each successive transaction in order to ensure various safety features (such as preventing a double-spend). Note that due to its broader use in cryptography, you may encounter ‘nonce’ being used differently on other sidechains or decentralized projects.

O

ommer block

Under the Proof of Work (PoW) consensus mechanism, miners received rewards for being the first to mine a new block. However, at times a block would be mined just after, and in competition with, the last block. This block, known as an ommer and previously as an uncle, could get rolled into subsequent blocks and the miner of the original ommer would get a partial block reward. All of this functionality was deprecated as of the launch of the Beacon Chain.

on-ramp, off-ramp

Based on a metaphor from the American highway system, “on-ramp” refers to a tool, or a service provider, or the action, of converting fiat currency into tokens on a blockchain. Conversely, “off-ramp” refers to exchanging on-chain assets for their value in a given fiat currency. There are many providers of such services, and MetaMask users have access to them through the “Buy Crypto” feature.

optimistic rollup

A rollup that assumes the validity and good faith of transactions, and only runs a fraud proof in the case of fraud being alleged. See also ‘rollup’.

Oracle

Typically, an oracle is any entity or person that is relied on to report the outcome of an event. In a blockchain network an oracle (human or machine) helps communicate data to a smart contract, which can then be used to verify an event or specific outcome.

P

P2P (peer-to-peer)

P2P refers to interactions that happen directly between two parties, usually two separate individuals, and have been present in Internet technology in different ways for some time. These interactions are often coordinated through some sort of app or network, which can consist of any number of individuals. Public blockchains can be considered to have a high degree of P2P functionality, as individuals are able to transact or interact with each other without relying on an intermediary or single point of failure.

parity

In a general sense, to say that something ‘has parity’ with another thing means ‘equal in features or other important quality’, and is a phrase often used by software developers and computer scientists.Parity Technologies is the name of a blockchain technology company that is developing a number of significant projects in the blockchain space. One of its first projects was an Ethereum client, known as Parity; its name was changed to Parity Ethereum, and then was spun out as a DAO-owned and operated project called Open Ethereum, which has also been deprecated. See also ‘client’.

permissioned ledger

A blockchain network in which access to ledger or network requires permission from an individual or group of individuals, as opposed to a public blockchain. Permissioned ledgers may have one or many owners. Consensus on a permissioned ledger is conducted by the trusted actors, such as government departments, banks, or other known entities. Permissioned blockchains or ledgers contain highly-verifiable data sets because the consensus process creates a digital signature, which can be seen by all parties. A permissioned ledger is much easier to maintain and considerably faster than a public blockchain. For example, Quorum or Hyperledger Besu are permissioned ledgers that can be more easily set up for large enterprises. In contrast, the public Ethereum blockchain is a permissionless ledger which anyone can access.

Plasma

‘Plasma’ is a term that is used to refer to one of the solutions being built and deployed in order to securely scale the Ethereum network. A Plasma network functions similarly to an optimistic rollup, inasmuch as it relies on Ethereum Mainnet to maintain the record of transactions, and as the source for arbitration or fraud resolution. However, a Plasma network differs in other important technical ways from rollups, and is currently limited to simple operations, such as swaps and token transfers. More technical information is available here.

PoA, PoS, PoW

Acronyms standing for Proof of X consensus mechanisms: Authority, Stake, Work. The “o” is lowercase since you wouldn’t capitalize “of” when writing out the phrase. See also ‘consensus’, ‘Proof of Authority’, ‘Proof of Stake’, ‘Proof of Work’.

PoS/PoW Hybrid

A hybrid consensus model that utilizes a combination of Proof of Stake (PoS) and Proof of Work (PoW) consensus. Using this Hybrid consensus mechanism, blocks are validated from not only miners, but also voters (stakeholders) to form a balanced network governance.

private blockchain

A blockchain or distributed ledger that has a closed network wherein participants are controlled by a single entity. A private blockchain requires a verification process for new participants. A private blockchain may also limit which individuals are able to participate in consensus of the blockchain network. See also ‘permissioned ledger’.

private currency

A currency or token issued by a private individual or firm. Typically, the token or currency is limited to use within the network of that particular firm or individual. This is not to be confused with a “privacy cryptocurrency”, which are cryptocurrencies with specific privacy features, such as hidden user identities.

private key

A private key is an alphanumeric string of data that, in MetaMask, corresponds to a single specific account in a wallet. Private keys can be thought of as a password that enables an individual to control a specific crypto account. Never reveal your private key to anyone, as whoever controls the private key controls the account funds. If you lose your private key, then you lose access to, and control over, that account.

Proof of Authority (PoA)

A consensus mechanism used in private blockchains, granting a single private key the authority to generate all of the blocks or validate transactions.

Proof of Stake (PoS)

A consensus mechanism in which an individual node, or “validator”, validates transactions or blocks. Validators lock up a certain amount of cryptocurrency, such as ether, into a ‘stake’, in order to be able to participate in consensus. If the node validates a block (group of transactions) correctly, then the validator receives a reward. Conversely, if the validator behaves poorly by validating incorrect transactions or by not maintaining sufficient network connectivity, the cryptocurrency they staked can be ‘slashed’, or taken from them and put out of circulation (‘burned’). PoS requires a negligible amount of computing power compared to Proof of Work consensus.

Proof of Work (PoW)

A consensus mechanism in which each block is ‘mined’ by one of the nodes, or a group of nodes, on the network. The computational process involved in committing a series of transactions into a block on the network, known as ‘hashing a block’, is technically quite simple, and therefore subject to attack. Under PoW, each miner must solve a math problem to find a set, difficult variable in order to be able to propose their block to the network as the next to be ‘mined’. In effect, the process of hashing each block becomes a competition. This addition of solving for a target increases the difficulty of successfully hashing each block, and consequently the security of the network.For each hashed block, the overall process of hashing will have taken some time and computational effort. Thus, a hashed block is considered Proof of Work, and the miner that successfully hashes the block first receives a reward, in the form of cryptocurrency. PoW is singificantly more energy-intensive than other consensus mechanisms, such as Proof of Stake.

protocol

Formally speaking, a ‘protocol’ is a set of rules governing how a process is carried out. This concept is used throughout public blockchain networks and web3 to refer to the way smart contracts execute their functionality in the same way regardless of the user. The products or services built on top of smart contracts are often referred to as ‘protocols’ by extension.

public blockchain

A globally open network wherein anyone can participate in transactions, participate in the consensus protocol to help determine which blocks get added to the chain, maintain and examine the contents of the chain.

public key

Public blockchain networks are just that: public. Their data is accessible and readable by anyone. In order to have any degree of usability when it comes to allowing users to do some things, like send transactions, but not others, like steal other peoples’ tokens, cryptographic technology is used. In particular, a design paradigm known as ‘public/private key pairs’ is employed to ensure users can interact with others on the network as they wish, while keeping their own account secure.These key pairs consist of two long strings of alphanumeric characters. A public key can be derived mathematically from its corresponding private key, but the inverse is not true: it is mathematically impossible to derive a private key from its corresponding public key. This allows, for example, users to have a public wallet address that anyone can use to send them tokens, with the peace of mind that as long as they properly keep the corresponding private key safe, those tokens cannot be stolen. See also ‘private key’.

R

relayer

In the field of Decentralized Finance (DeFi), a relayer is any party or entity which hosts an off-chain orderbook. Relayers help traders discover counter-parties and cryptographically move orders between them. 0x is an example of a popular Ethereum relayer protocol.

Reusable ID / Reusable Identity

In the field of Decentralized Finance (DeFi), a relayer is any party or entity which hosts an off-chain orderbook. Relayers help traders discover counter-parties and cryptographically move orders between them. 0x is an example of a popular Ethereum relayer protocol.

rollups

Rollups (pronounced “roll ups”) are one element in the set of tools and infrastructure being built as scaling solutions for the Ethereum network. They consist, in general, of networks which prioritize their ability to compute transactions and smart contract functionality, and then ‘roll up’ those transactions to Ethereum Mainnet for secure verification of their validity. There are different ways of approaching this problem from a technical point of view, namely Zero Knowledge, or ZK, rollups, and Optimistic rollups. Arbitrum and Optimism are prominent examples. See the entries on both of these types of rollup for more, and more in-depth discussion here.

RPC

The Remote Procedure Call is a technology that is used to transfer data between endpoints. You may often see it referred to as JSON-RPC, which is its full name; see ‘JSON-RPC’ for further details.

rug pull

Similar to the traditional financial scam of a pyramid scheme, a ‘rug pull’ is a cryptocurrency or crypto-token based scam in which the creators of the token create hype, through injecting liquidity into their token, airdropping, and other schemes, and once investors pile in and boost the price of the token up to a certain point, the creators liquidate their (generally majority) share of the tokens, leaving their investors with next to nothing.

S

Satoshi Nakamoto

A pseudonymous individual or entity who created the Bitcoin protocol, solving the digital currency issue of the “double spend.” Nakamoto first published their white paper describing the project in 2008, and the first Bitcoin software was released one year later.

scalability

A change in size or scale to handle a network’s demands. This word is used to refer to a blockchain project’s ability to handle network traffic, future growth, and capacity in its intended application.

Seed (phrase) / Secret Recovery Phrase

The seed phrase, mnemonic, or Secret Recovery Phrase is a crucial part of public blockchain technology, originally created for Bitcoin, and goes by many names. However, they all refer to a set of ordered words which correspond to determined values. These values never change, and therefore the same string of words in the same order will always produce the same number–this is the underlying functionality that allows seed phrases to back up wallets. This is also where the name ‘hierarchical deterministic wallets’ comes from, as all the accounts in a given wallet are deterministically created from the seed phrase, and they are hierarchically controlled by it.A Secret Recovery Phrase is exactly what it sounds like: something that is secret, and should be known only to the owner of the account. If the seed phrase is given to someone else, that person has complete control over the account; they can drain it of tokens and funds, execute transactions with it, etc.

self-executing

Functioning by itself, not controlled by any other party other than itself. Self-executing smart contracts cut costs and overhead by removing the need for an arbitrator and trust toward a third party. See also ‘protocol’.

Serenity

The Ethereum network is working on a series of technical upgrades that will allow massive increases in transaction throughput, amongst other things. The plan that outlined these changes was originally referred to as ‘Serenity’, although that name has become less popular, in favor of specific descriptions of the upgrades themselves.

serialization

The process of converting a data structure into a sequence of bytes. Ethereum internally uses an encoding format called recursive-length prefix encoding (RLP).

sharding

Sharding, in public blockchains, refers to splitting an entire network into multiple portions, called “shards.” Each shard would contain its own independent state, meaning a unique set of account balances and smart contracts. Sharding is currently being investigated and developed as one of the set of tools and solutions for scaling Ethereum.

sidechains

A ‘sidechain’ refers to a chain that is connected to another (most often, to Ethereum) through a bridge, allowing assets to be transferred between them. In contrast to a Layer 2 network or a rollup, a sidechain is a full blockchain network in and of itself, and does not rely on Ethereum for consensus. It therefore must be evaluated independently in terms of its security, stability, and other features. See also “blockchain trilemma”, “modular blockchain”.Note: Bridges exist for good reason; sending tokens from a sidechain to Ethereum mainnet or vice versa would result in token loss.

slashing condition

Under a Proof of Stake (PoS) consensus mechanism, a slashing condition is one that causes the validator’s deposit to be destroyed when they trigger it. See also ‘Proof of Stake’.

slot

A slot, under Ethereum Proof of Stake consensus, is a 12-second period of time during which a new block may (or may not) be proposed. Every 32 slots comprise an epoch. See also ‘epoch’.

smart contracts

Smart contracts are programs that have been published on a public blockchain, and can be used by anyone. While they often contain agreements or sets of actions between parties that emulate a traditional legal contract, they are not, in and of themselves, legal documents. Smart contracts are automated actions that can be coded and executed once a set of conditions is met, and are the dominant form of programming on the Ethereum Virtual Machine.

soft fork

A change to the blockchain protocol resulting in only previously valid blocks and transactions being made invalid. Since old nodes will recognize the new blocks as valid, a soft fork is backward-compatible. However, this can result in a potential divide in the blockchain, as the old software generates blocks that read as invalid according to the new rules. Contrast with ‘hard fork’; for more basic information regarding forks, see ‘fork’.

Solidity

The programming language developers use to write smart contracts on the Ethereum network. Try it out on Remix. See also ‘smart contract’.

stablecoin

A cryptocurrency whose value has been ‘pegged’ to that of something considered a ‘stable’ asset, like fiat currency or gold. It theoretically remains stable in price, as it is measured against a known amount of an asset which should be less subject to fluctuation. Always spelled as one word.

staking

On the Ethereum Proof of Stake network, those wishing to participate in consensus must first lock up, or ‘stake’, 32 ETH into a smart contract; this ETH may be ‘slashed’ (taken from them and ‘burned’, put out of circulation) in the event that their validator behaves maliciously or does not meet performance requirements. Similar Proof of Stake mechanisms are in operation on other networks, as well.Although this is the canonical meaning of the word, similar actions taken at the level of a decentralized exchange (DEX) or another dapp are often called ‘staking’, though it would probably be more accurate and descriptive to just call this ‘locking up tokens’.

state

The set of data that a blockchain network strictly needs to keep track of, and that represents data currently relevant to applications on the chain.

state channels

State channels are part of the set of tools and platforms involved in scaling Ethereum. While a complex topic, state channels are essentially methods through which the current ‘state’ of the blockchain can be exported, and then based on that, any given number of transactions can take place off-chain, and then be moved back onto the main Ethereum chain.

swap

As the number of different blockchain projects and tokens has proliferated, the system by which users exchange one token for another has come to be known as swapping, and the individual action, a swap. Within MetaMask, users have access to a powerful aggregator showing them information about swaps across the ecosystem, this is MetaMask Swaps.

szabo

A denomination of ETH. See also ‘ether (denominations)’.

T

testnet

A testnet is a blockchain network that mirrors, as closely as possible, the current conditions of a corresponding ‘main’ network. Testnets are used by developers to verify that their smart contracts and other functionality work as intended, before permanently recording their code to a live blockchain network (and often spending significant gas fees in the process!).Tokens minted on testnets are not transferrable for their equivalent value on mainnets.

Testnet Kovan

An Ethereum testnet that uses Proof of Authority consensus, available through MetaMask; website here.

Testnet Rinkeby

An Ethereum testnet that uses Proof of Authority consensus, available through MetaMask; faucet here. Following the transition to Proof of Stake, Rinkeby scheduled its deprecation for the end of 2023.

Testnet Ropsten

An Ethereum testnet that used Proof of Work, and, following the transition to Proof of Stake, was deprecated.

token

A token represents an asset issued on an existing blockchain; the transfer of tokens and the addresses that currently hold them are the subject of the network’s consensus activities. There are many types of tokens; see also ‘ERC-20’ and ‘ERC-721’ entries.

Total Value Locked (TVL)

Total Value Locked, or TVL, is a common expression used in many contexts across the crypto ecosystem, so it’s important to pay attention to the specifics. In general, it refers to how much value, in tokens, has been deposited into something.Most often, it refers to a protocol, which is an application on the blockchain, or a set of protocols. For example, a decentralized token trading platform might have a series of liquidity pools, which are protocols enabling swaps between tokens, and the platform may quote the “TVL” for all the pools combined. Alternatively, if a network uses proof of stake for their consensus mechanism, they may represent the TVL of all the tokens staked into that consensus protocol.

transaction block

A collection of transactions on a blockchain network, gathered into a set or a block that can then be hashed and added to the blockchain. See ‘hash’.

transaction fee

A small fee imposed on transactions sent across a blockchain network. These fees are used to pay network validators or miners for their participation in consensus, and thus ensure that a blockchain network is self-sustaining.

transaction pool

When a user submits a transaction to the Ethereum network–or many other networks based on Ethereum–the transaction goes into what’s known as a “transaction pool”, or “txpool” for short. This is essentially a queue of transactions that are waiting to be added to a block and recorded to the blockchain. There are mechanisms that determine which transactions are “picked up” and included in the next block, and there is currently a lot of research surrounding how this decision gets made (see “MEV”). In Bitcoin, the transaction pool is referred to as the “memory pool”, or “mempool”, and often these terms are used interchangeably.

Trust Triangle
The relationship between the issuers, holders, and verifiers is called the trust triangle simply because you need an element of trust among these entities for them to work together. Also, this term is typically used to convey human relationships in the digital world. The party verifying these credentials can check authenticity and validity without informing or consulting the issuer of the credentials, hence safeguarding the sovereignty of the holder.
trustless

‘Trustless’ is a term that gets used a lot in the decentralized web, and it deserves some explanation.Traditionally, to call something ‘trustless’ would sound like a negative thing. In the context of decentralized technology, it has a more technical meaning: since everyone has a copy of the ledger of all transactions ever executed, there is no need for a centralized entity that ‘must be trusted’ as the source of truth. With public blockchain networks, data isn’t kept on some centralized server somewhere that could be hacked or changed arbitrarily; anyone can verify the transactions themselves. This is why the term ‘trustless’ was coined: there is no need for trust, although, in a way, the rules and assurances built into the blockchain provide the basis for greater trust between people, because the system is guaranteed to work the same for everyone.

Turing-complete

Any machine that can calculate on a level equal to a programmable computer is Turing-complete, or computationally universal. The Ethereum Virtual Machine, which processes smart contracts and transactions, is Turing-complete, despite not existing on a single physical computer.

V

validator

A participant in Proof of Stake (PoS) consensus. On Ethereum’s Proof of Stake network, validators need to stake 32 ETH in order to get included in the validator set. See also ‘staking’.

validity proof

The proof submitted along with certain types of rollups to prove that the transactions are valid. See also ‘rollups’.

Validium

One of the technologies developed for scaling of the Ethereum network; see more here.

W

Wallet

In Ethereum-based blockchain technology, a ‘wallet’ is a something that allows you to manage private keys, your Secret Recovery Phrase, and the accounts generated from it. This could be an internet-connected ‘hot wallet’, like MetaMask, or an ‘airgapped’ hardware wallet. In more technical speak, you could say “the wallet is the client, not the keys.”It is very common for people to use the word ‘wallet’ to refer to their SRP itself, or the accounts generated from it, or even to one account.

web3 / Web 3.0

Web3, or Web 3.0, are terms used synonymously with “the decentralized web” and are often used to refer, broadly, to the blockchain and decentralized technology ecosystems and communities as a whole.

Z

zk-SNARKs

Zero-Knowledge Succinct Non-interactive ARguments of Knowledge are an incredible technology, and vital to the scaling of blockchain technology and the decentralized web. They are mathematically complex and can be daunting; this explanation from the Ethereum Foundation is a good primer.

zero address

The Zero Address is an address on the Ethereum network that is the recipient of a special transaction used to register the creation of a new smart contract on the network.

#

51% Attack

If more than half the computer power or mining hash rate on a network is run by a single person or a single group of people, then a 51% attack is in operation. This means that this entity has full control of the network and can negatively affect a cryptocurrency by taking over mining operations, stopping or changing transactions, and double-spending coins.

D

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

ABI

ABI is an acronym for Application Binary Interface, and it is an interface between two binary program modules at the level of machine code, not source code. Blocknative can monitor smart contract ABIs in real-time.

Address (noun)

A unique string of numbers or text appointing a wallet’s location on a blockchain.

Access (adjective)

Principle of Self-Sovereign Identity. Users must have easy and direct access to their own data.

Access Tokens (noun)

Grants access to premium features on a platform or to a commmunity. The token is a tradable membership for exclusive experiences

Airdrop (noun)

Crypto projects use this marketing technique to send their tokens (e.g. coins and NFTs) directly to wallets to raise awareness.

Alpha (noun)

Valuable advice, recommendations, or info given by someone in a position of knowledge.

Altcoin or Als (noun)

Refers to cryptocurrency that is not Bitcoin such as newer projects with a smaller market cap. Alts is short for Altcoins.

Agent

A representative of an identity. It’s possible that require the use of a wallet. May support transfer.

Authentic Chained Data Container Taks Force (ACDC)

The purpose of the ACDC Task Force, is to draft a TSS (ToIP Standard Specification) that defines the standard requirements for the semantics of Authentic Provenance Chaining of Authentic Data Containers.

Ambient Verifiability

Verifiable by anyone, anywhere, at anytime. E.g. Ambient Duplicity Detection describes the possibility of detecting duplicity by anyone, anywhere, anytime.

Autonomic Identifier

An identifier that is self-certifying and self-sovereign

Autonomic Namespace

A namespace that is self-certifying and hence self-administrating. ANs are therefore portable = truly self sovereign.

API

API is an acronym for Application Programming Interface which is an interface between computers or programs that allows information to pass between them.

Asymmetric encryption

The encryption key (also called the public key) and the corresponding decryption key (also called the private key) are different. Asymmetric encryption is also known as public-key encryption.

App Review

An incentive mechanism for application developers in the early stage (first four years) of the ecosystem and helps with bootstrapping the two-sided market.

ATH & ATL (noun)

ATH is short for ‘all-time high’. The highest price point an asset has ever had. ATL is short for ‘all-time low’, the lowest price point an asset has ever had.

Artificial Intelligence -AI-

The theory and development of computer systems that can perform tasks — often using natural language processing (NLP), machine learning and natural language understanding (NLU) — that normally require human intelligence, comprehension and understanding.

Archival Nodes

An archival node is a full node in the blockchain that keeps a complete history of transactions and address state changes since the genesis block. Blocknative enables users to see archival mempool information on public blockchain networks.

Augmented Reality -AR-

Technology, using involving glasses, visors, goggles or smartphones, that superimposes a computer-generated image on a user’s view of the actual world, providing a composite view that often includes perceptual information.

Avatar

A computerized icon or figure which represents a person, pet or entity in video games, internet forums, games, chat rooms, virtual reality and other channels.

B

Base Fee

The base fee is an algorithmically determined fee that users on the Ethereum blockchain must pay to complete a transaction. The base fee is designed to help smooth transaction fees and prevent sudden spikes by targeting 50% full blocks. Depending on how full the new block is, the Base Fee is automatically increased (the block is more than 50% full) or decreased (the block is less than 50% full).

Bear Market (noun) & Bearish (adjective)

A market is bearish when there is a prolonged downward pricing trend and a pessimistic outlook. Sometimes purposely misspelled as beras.

Bid

The bid price represents the maximum price that a buyer is willing to pay for an NFT or token.

Block (noun)

A block is a batch of data transactions stored on the blockchain.

Blockchain (noun)

A digital list of data records. Records are called blocks which are organized in chronological order, linked together like a chain, and secured using cryptography.

Block Explorer (noun)

A tool used to examine detailed information on blockchains. (E.g. Etherscan for the Ethereum transactions)

Block Gas Estimator Feed

The Block Gas Estimator Feed estimates gas prices for the next block based upon the in-flight transactions that are currently in the mempool (pre-chain transactions). With Blocknative’s Gas Platform, Dapp and wallet developers can integrate gas estimation feeds directly into their product. Ethereum blockchain).

Buidl (noun, verb)

meaning ‘build’, a misspelling on purpose used in crypto communities just like HODL (hold).

Bull Market (noun) & Bullish (adjective)

A market is bullish when there is a prolonged upward pricing trend and an optimistic outlook.

Burn (verb)

A strategy where tokens or other digital assets like NFTs are removed from a circulating supply to influence price and demand. Bitcoin and Ethereum don’t have this, but many other Altcoins do.

Bitcoin

A decentralized, digital cryptocurrency that doesn’t rely upon a central bank or trusted source which can be transferred from user to user on a peer-to-peer network using blockchain technology.

Bitcoin (BTC) address

A string of letters and numbers like: 3E53XjqK4Cxt71BGeP2VhpcotM8LZ853C8

 

Sharing this address allows anyone to send Bitcoin to the address.

Blockstack Browser

A deprecated application for accessing identity and storage.

Blockstack Owner Address

Looks like a bitcoin address but starts with ID for example: ID-1J3PUxY5uDShUnHRrMyU6yKtoHEUPhKULs

Burning

Burning a token means that the token is transferred to an address that is a black hole—one that is not owned by any entity and for which guessing the applicable private key is effectively impossible based on known mathematical principles. This effectively destroys the token by making it unavailable for future use and decreases the total number of tokens available from that point forward.

Bootstrapping

Refers to the process of starting up a computer system.

C

Cancel Transactions

A cancel transaction is a type of replacement transaction where a user submits an identical transaction with a higher gas limit so it is mined before the previous transaction. Once the new replacement transaction is confirmed, the original transaction will get dropped. Blocknative’s mempool monitoring tools can track replacement transactions in real-time.

Centralized (adjective)

In a centralized network, there is a central authority that governs and handles the network.

CEX or Centralized Exchange (noun)

An exchange handling cryptocurrency managed by a centralized business. (E.g. Coinbase, Kraken)

CeFi or Centralized Finance (noun)

Centralized businesses participating in crypto. (E.g. BlockFi)

Coin (noun)

Cryptocurrency built on its own native blockchain, with the purpose to store value and serves as an medium of exchange within that specific ecosystem. (E.g. ETH, BTC)

Cold Wallet (noun)

A hardware device used to store cryptocurrency.

Confirmed Transaction

A confirmed transaction is a transaction that has been included in a block and permanently added to the blockchain.

Consent (adjective)

Principle of Self-Sovereign Identity. Users must give explicit permission for an entity to use or access their data. The process of expressing consent should be interactive and well-understood by people.

Consensus (noun)

A collective judgment in which data processors, called nodes, come to an agreement to verify new transactions and blocks to be added to the blockchain. This process is used by consensus mechanisms such as proof of work and proof of stake.

Consensus hash

A consensus hash is a cryptographic hash that each node calculates at each block. It is derived from the accepted state transitions in the last-processed block, and a geometric series of prior-calculated consensus hashes.

Consensus rules

The rules governing the creation of new valid records in a blockchain database, and the mining algorithms used for this purpose.

Control plane

The part of a network that carries signaling traffic and is responsible for routing. Control packets originate from or are destined for a router. Functions of the control plane include system configuration and management.

Controller

The entity that has the capacity to make changes to an identity, cryptocurrency or VC (verifiable credential).

Control Authority

In identity systems Control Authority is who controls what and that is the primary factor in determining the basis for trust in them. The entity with control authority takes action through operations that affect the creation (inception), updating, rotation, revocation, deletion, deletion, and delegation of the authentication factors and their relation to the identifier.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Correlation

An identifier used to indicate that external parties have observed how wallet contents are related. For example, when a public key is reused, it conveys that some common entity is controlling both identifiers. Tracking correlation allows for software to warn when some new information might be about to be exposed.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Control (adjective)

Principle of Self-Sovereign Identity. People must have ultimate authority over their digital identities and personal data.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Custodial and Non-Custodial Wallets

At the core of every crypto wallet is a public and private key pair. Asymmetric cryptography is at the backbone of all distributed ledgers and web3 technologies; without it, no distributed ledgers would exist. Your private key is used to authorize your transactions and receive information. Whoever has the private key of a wallet can access funds and authorize transactions. The private key is critical. The public key is hashed and then used as your wallet address.

 

The distinction between a custodial and non-custodial wallet is who manages your private keys. If you manage your private keys, the wallet is referred to as a non-custodial wallet because no one has custody of your wallet except you. If a third party controls your private keys, then the wallet is a custodial wallet.

Creator Economy

A class of businesses made up of content creators, curators and community builders which enable the content producers to monetize their creations.

Credential

A credential is an order or document that attests or authorizes the qualification, competence or authority granted to an individual by a third party with de jure or de facto authority.

Cryptocurrency (noun)

A digital currency designed for use as money within a digital ecosystem. It is a medium of exchange, storing value, etc. They are maintained by blockchains.

Cryptography (noun)

The computerized practice of encoding and decoding information for secure communication.

Cypherpunk (verb)

Someone who believes in the use of cryptography to affect social and political change through privacy by cryptography. (E.g. Satoshi Nakamoto, anonymous founder of Bitcoin.)

Crypto wallet

A physical or digital device, computer application or smartphone app that stores the public and/or private keys for cryptocurrency transactions, including sending, receiving, buying, selling, swapping of cryptocurrencies and NFTs and digitally signing information

D

Data breach

When an unauthorized person or party steals, views, transmits, copies, or uses information.

DApp or Decentralized Application (noun)

A software application that runs on a distributed network. It’s not hosted on a centralized server, but instead on a peer-to-peer decentralized network.

DAO

A Digital Decentralized Autonomous Organization (DAO, pronounced like the Chinese concept) is a powerful and very flexible organizational structure built on a blockchain.Alternatively, the first known example of a DAO is referred to as The DAO. The DAO served as a form of investor-directed venture capital fund, which sought to provide enterprises with new decentralized business models. Ethereum-based, The DAO’s code was open source. The organization set the record for the most crowdfunded project in 2016. Those funds were partially stolen by hackers. The hack caused an Ethereum hard-fork which lead to the creation of Ethereum Classic.

DApp or Decentralized Application (noun)

An open source software application with backend (not user-facing) code running on a decentralized peer-to-peer network, rather than a centralized server. You may see alternate spellings: dApps, DApps, Dapps, and Đapps.

A software application that runs on a distributed network. It’s not hosted on a centralized server, but instead on a peer-to-peer decentralized network.

decentralized exchange (DEX)

A decentralized exchange is a platform for exchanging cryptocurrencies based on functionality programmed on the blockchain (i.e., in smart contracts). The trading is peer-to-peer, or between pools of liquidity. This is in contrast with a centralized exchange, which is more akin to a bank or investment firm that specializes in cryptocurrencies. Additionally, there are so-called on-ramp providers, who could be compared to currency brokers, exchanging traditional “fiat” money for cryptocurrencies, and do not hold customer’s funds “on deposit” the way a centralized exchange does. There are important technical and regulatory differences between these, which are constantly evolving.

Decentralized Finances (DeFi)

If cryptocurrency is Web3’s monetary system, its financial system is DeFi. This includes familiar concepts like loans and interest-bearing financial instruments, as well as so-called “DeFi primitives”, novel solutions like token swapping and liquidity pools.

Deposit (web 3)

In most web3 contexts, ‘depositing’ refers to the act of transferring some amount of token(s) to an address other than one’s own, most often to a smart contract controlled by a ‘protocol’, such as a decentralized exchange, video game or multiverse, DAO, etc. Generally, the user will receive something in return for their deposit, and the deposit can be claimed at the user’s discretion, or upon completion of given conditions. Compare with ‘stake’.

Derive / Derivation

To derive something is to obtain it from an original source. In the context of crypto-technology, we often discuss “deriving” wallets and accounts from seed phrases (aka Secret Recovery Phrases, or SRPs). This is literally true: the SRP represents a cryptographic key which is used to derive account addresses deterministically, meaning they will be derived the same way each time. Another, more technical, way of referring to this technology is to refer to “hierarchical deterministic” wallets.

Devcon

This is shorthand for the Ethereum Developers’ Conference.

Digital Asset

A digital commodity that is scarce, electronically transferable, and intangible with a market value.

Digital Credential

A digital credential functions similarly to the physical certificates or ID cards you might carry in your wallet. It’s an electronic record that verifies your qualifications, skills, clearances, or status. For instance, it might certify that you have completed a particular course, graduated from a specific school, or are qualified for a certain job, much like a driver’s license confirms your driving ability.
However, unlike traditional paper or plastic forms, a digital credential is a secure digital file. It incorporates advanced security features that ensure its authenticity and integrity, making it trustworthy and resistant to tampering. You can easily and swiftly distribute it via the internet, and it’s safeguarded against unauthorized copying or alterations. 

Digital Identity

An online or networked identity is adopted by an individual, organization, or electronic device.

Digital Signature

A code generated by public key encryption and attached to an electronically transmitted document to verify the contents of the document.

Distributed Denial of Service (DDoS) Attack

A type of cyber-attack in which the perpetrator continuously overwhelms the system with requests in order to prevent service of legitimate requests.

digital signature

A code generated by public key encryption and attached to an electronically transmitted document to verify the contents of the document.

Distributed Denial of Service (DDoS) Attack

A type of cyber-attack in which the perpetrator continuously overwhelms the system with requests in order to prevent service of legitimate requests.

distributed ledger

A type of database which spreads across multiple sites, countries, or institutions. Records are stored sequentially in a continuous ledger. Distributed ledger data can be either “permissioned” or “unpermissioned”, determining who can view it. This term is used, often, to refer in general to public blockchain technology, as ‘crypto’ has come to mean ‘cryptocurrency’, ‘web3’ is the collective community, and ‘blockchain’, after all, is “just” the data structure used to sync the distributed ledger itself.

double spend

The ‘double spend’ is the benchmark security concern of blockchain networks: how do we ensure that someone doesn’t send the same transaction to two different entities, essentially “spending their money twice”? This is the cornerstone of the consensus mechanism, ensuring that all nodes of the network are “in agreement” about which assets are allocated to which addresses, on an ongoing basis, to prevent malicious actions such as a double spend.

E

EIP (Ethereum Improvement Proposal)

The EIP process is a public and open process through which suggestions are made as to how to change (and hopefully, improve) the way the Ethereum network functions as a whole; the official repository is here. Individual EIPs are referred to by the name assigned to them in the repository, for example, EIP-1559. Keep in mind that as it is an iterative, lengthy process, some EIPs never get fully approved, and some do, and many end up somewhere in a gray area of ‘partially implemented’.

encrypted vs unencrypted keys

As discussed elsewhere, public and private cryptographic key pairs are one of the technologies that underpins cryptocurrencies and “crypto” tech in general. In MetaMask, an unencrypted private key is 64 characters long, and it is used to unlock or restore wallets. An encrypted key is also 64 letters long and is a regular private key that has gone through the process of encryption. Usually, encrypted private keys are kept within the extension or device they are encrypted by, and they remain out of sight from the user. This is meant to add another layer of security to keep a user’s wallet information safe.By way of example: if the world ‘Apple’ was your private key, then it was encrypted three letters down the alphabet, your new encrypted key would be ‘Dssoh’. Since you know the way to encrypt this key, you could derive the original private key from it by reversing the method of encryption.

encryption

Encrpytion, literally ‘in a hidden place’, is the art and science of encoding information to control who can read it, or how it is to be read. Encryption occurs in natural (human) languages, as well as in machine and computer languages. Highly complex, and therefore difficult to decipher, encryption is an essential element enabling blockchain networks to be simultaneously public and secure.

Enterprise Ethereum Alliance (EEA)

A group of Ethereum core developers, startups, and large companies working together to commercialize and use Ethereum for different business applications. Website here.

entropy

In the context of cryptography, ‘entropy’ refers to ‘randomness’; generally, the more random something is (the more entropy it has), the more secure it is.

epoch

An epoch, in general, is a measure of time, or of blockchain progression, on a given blockchain. In Ethereum Proof of Stake, an epoch consists of 32 slots, each lasting 12 seconds, for a total of 6.4 minutes per epoch. There is additional functionality built upon the epoch measure in the Beacon Chain to help ensure security and proper operation of the Chain.

ERC-20 Token Standard

ERC is the abbreviation for Ethereum Request for Comment and is followed by the assignment number of the standard. ERC-20 is a technical standard for smart contracts which is used to issue the majority of tokens (in particular, cryptocurrency tokens) extant on Ethereum. This list of rules states the requirements that a token must fulfill to be compliant and function within the Ethereum network.

ERC-721 Token Standard

As stated above, this is another standard for Ethereum smart contracts, which allows for the issuance of a non-fungible token: this is the standard that created what we all now know as an NFT. This token standard is used to represent a unique digital asset that is not interchangeable, as opposed to the ERC-20 (or other equivalent) standard, which issues identical, interchangeable tokens.

ether (ETH)

Ether is the native currency of the Ethereum blockchain network. Ether—also referred to as ETH (pronounced with a long “e”, like “teeth” without the “t”)—functions as a fuel of the Ethereum ecosystem by acting as a medium of incentive and form of payment for network participants to execute essential operations. The cryptocurrency of Ethereum has a lowercase e. The plural of ether is just ether; its abbreviation is ETH, with a space: I have 10 ETH. (nice!)

ether (denominations)

There are a number of denominations of the currency we know as ‘ether’ or ETH; for the definitive explanation, see the original Ethereum Homestead documentation here.

Ethereum

A public blockchain network and decentralized software platform upon which developers build and run applications. As it is a proper noun, it should always be capitalized.

Etherscan

A popular website for analyzing activity on the Ethereum blockchain. See ‘blockchain explorer’.

ENS

The Ethereum Name Service is a protocol, managed by a DAO, which assigns human-readable and easy-to-remember addresses to Ethereum addresses and assets, homologous to the traditional internet’s DNS.

ERC

Ethereum Request for Comment, or ERC, is a bit of a misnomer, as it is used to refer to suggestions for modifications that have already made it through the Ethereum Improvement Protocol (EIP) process and have been made standard on Ethereum. An ERC is, essentially, a set of standards for a given operation or topic on the Ethereum network. The authoritative list can be foundhere.

EVM (Ethereum Virtual Machine)

The EVM is a virtual machine that operates on the Ethereum network. It is Turing complete and allows anyone, anywhere to execute arbitrary EVM bytecode. All Ethereum nodes run on the EVM. It is home for smart contracts based on the Ethereum blockchain.

exchange

A place to trade cryptocurrency. Centralized exchanges, operated by companies like Coinbase and Gemini, function as intermediaries, while decentralized exchanges do not have a central authority.

F

faucet

A faucet is an application, sometimes a very simple website, other times more complex, that dispenses cryptocurrency. While some networks, especially those in early launch stages, offer “real Mainnet” tokens via faucets, it is much more common for a faucet to be present on a test network, or testnet. These faucets are used by developers to test out dapps or smart contracts before deploying them on Ethereum Mainnet, or users who want to practice an action on the blockchain with no risk. Tokens dispensed by a test faucet stay on the test networks and cannot be exchanged for mainnet equivalents.

Federated Identity Management System (FIMS) 

Allows organizations to share identity information across different platforms using a single sign-on (SSO) process, similar to using a Facebook or Google account to access various services.

While FIMS simplifies user access and can enhance security, it also presents challenges:

  • Increased Breach Risk: A breach in one system can potentially compromise all connected systems.
  • Complex Access Revocation: It can be difficult to remove an individual’s access across all systems quickly.
  • Management Complexity: Managing a FIMS involves overseeing multiple settings and configurations across different platforms, which can be challenging for administrators.
fiat currency

Government-issued currency. For example, US Dollars (USD), Euros (EUR), Yuan (CNY), and Yen (JPY).

final, finality

A transaction is considered “final” once it can no longer be changed. In a sense, this happens once there are sufficient confirmations of the transaction, but for all intents and purposes, a transaction is final once the block that contains it is mined or validated. Keep in mind that this reflects a fundamental rule of blockchains: unlike traditional financial systems where charges can be “reversed”, there is no “undoing” a transaction on the blockchain. Once finality is reached, the transaction is immutable.

finney

A denomination of ether. See ether (denomination).

fork

‘Forking’ is a term that comes from the world of collaborative software development, and refers to the action of copying an existing application or set of code and modifying it to create an alternate version. At the blockchain protocol level, a ‘fork’ creates an alternative version of a blockchain. Forks are often enacted intentionally to apply upgrades to a network. Soft Forks render two chains with some compatibility, while Hard Forks create a new version of the chain that must be adopted to continue participation. In the instance of a contentious Hard Fork, this can create two versions of a blockchain network. See also “hard fork”.

G

gas

A measure of the computational steps required for a transaction on the Ethereum network. This then equates to a fee for network users paid in small units of ETH specified as gwei. See also “ether (denominations)”. For more on gas, see MetaMask’s user guide here.

gas limit

The gas limit is the maximum amount you’re willing to pay for any given transaction to go through the Ethereum network. Another way of looking at it is as a “rough estimate” of how much computing power your transaction will take.

gas price

The gas price is what it sounds like: the cost the network is paid for the computational work being performed in a given transaction. It is paid in units of ETH called gwei. Depending on network congestion, the gas price may vary significantly.

genesis block

The initial block of data computed in the history of a blockchain network.

gwei

A minuscule and common denomination of ETH, and the unit in which gas prices are often specified. See ‘ether (denominations)’ entry for more information.

H

halving

Many cryptocurrencies have a finite supply, which makes them a scarce digital commodity. For example, the total amount of bitcoin that will ever be issued is 21 million. The number of bitcoins generated per block is decreased 50% every four years. This is called “halving.” The final halving will take place in the year 2140.

hard fork

A hard fork occurs when there is a change in the blockchain that is not backward compatible (not compatible with older versions), thus requiring all participants to upgrade to the new version in order to be able to continue participating on the network. See also “fork”.

hardware wallet

A hardware wallet is a physical device that is used to store cryptographic keys, and generally, sign transactions. Some hardware wallets can be connected physically or through software to internet connectivity; others are ‘air-gapped’, receiving transaction requests and sending transaction approvals through a mechanism such as a QR code. The overall goal of using a hardware wallet to manage keys and signatures is to reduce the likelihood of your keys or Secret Recovery Phrase from being somehow stolen or compromised, due to being connected to the Internet. For more on hardware wallets, see MetaMask’s Hardware Wallet Hub.

hash

In computing, ‘hashing’ is an operation performed on lists or sets of data to create a reliable index for that data. A particular datum, or a reference to it, is fed into an algorithm, which transforms the datum and returns a standardized, and generally unrecognizable, ‘hash’ of it, sometimes referred to as that datum or file’s “digital fingerprint.” Each block in a blockchain contains the hash value that validated the block before it, followed by its own hash value (this is how the continuity of the ‘chain’ is constructed). Hashes can be used to confirm that blockchain transactions are complete and valid. You may see references to the “transaction hash” or “tx hash”; this should be understood as “unique identifier of the transaction”.

HD wallet

Hierarchical Deterministic wallets were first created for Bitcoin, and enable the creation of a very large number of accounts based on an initial seed phrase. This technology was later adopted in Ethereum wallets; when restoring a MetaMask wallet from the Secret Recovery Phrase, for example, if you “create” accounts, they will be the same accounts as previously created from that same phrase; they are derived from it.

hexadecimal

Hexadecimal is a base 16, rather than base 10, counting system. Used all over Ethereum for a variety of things, a hexadecimal string is comprised of the numbers 0 1 2 3 4 5 6 7 8 9 and letters A B C D E F.

HOLDER

In a verifiable credential system, the holder is one of three key participants who owns and stores the credential in a digital wallet. Examples of such credentials include college degrees, professional certificates, identity documents, and course completion certificates, which can be stored in an app on their phone.

The issuer, such as a university, originally provides the credential, while the verifier, like an employer, checks its authenticity. Holders can present these digital credentials to verifiers to prove their identity and qualifications conveniently, without the need for physical documents. This ensures that the credentials are legitimate and have not been altered.

hot wallet / hot storage

A wallet that is directly connected to the internet at all times; for example, one that is held on a centralized exchange. Hot wallets are considered to have lower security than cold storage systems or hardware wallets.

Hyperledger

Hyperledger is an ecosystem of open-system tools, libraries, and products designed to enable and support enterprise-grade blockchain technology. In general, the products focus on creating solutions for permissioned blockchains–that is, non-public blockchains, with alternative consensus mechanisms other than Proof of Work (PoW) or Proof of Stake (PoS).That said, there are use cases where such institutions would want to integrate with public blockchains, and for that reason Hyperledger Besu and Hyperledger Burrow are actively developed projects, the former being a Java-based Ethereum client, the latter being a smart contract platform which supports EVM bytecode.

I

ID Wallet / Digital Identity Wallet
A Digital Identity Wallet (DIW) is an application that allows the secure storage, management, and sharing of personal identification data, credentials and other pieces of information, often called “attributes”, relating to the owner of that virtual wallet. Think of it as a digital version of your physical wallet, but instead of holding tangible items like cash or credit cards, it holds digital attributes. Digital identity wallets can exist in various forms, including mobile apps, browser extensions, or even dedicated hardware devices.immutability

The inability to be altered or changed. This is a key element of blockchain networks: once written onto a blockchain ledger, data cannot be altered. This immutability provides the basis for commerce and trade to take place on blockchain networks.

Infura

Part of Consensys, Infura offers backend access to the Ethereum network over established HTTP and WebSockets technology. Prior to Infura, developers were obligated to run their own nodes of the networks with which they wanted to interact; Infura provides that access through a set of APIs. This enables developers of dapps and websites seeking to interact with the Ethereum blockchain to do so, and at scale.

ICO

An Initial Coin Offering (also called ICO) occurs when a new token project sells advance tokens in exchange for upfront capital. These have been a vehicle for fraud and scams, and as such are subject to ever-evolving regulation and legislation.

internal transaction

An internal transaction on the Ethereum network is one that occurs between smart contracts, rather than between addresses. Notably, they are not included on the blockchain, and therefore do not incur gas fees, but they are often crucial to carrying out the action in question, and can be viewed on Etherscan. For more detail, see MetaMask’s article on the topic.

InterPlanetary File System (IPFS)

A decentralized file storage and referencing system for the Ethereum blockchain, and the internet as a whole. IFPS is an open source protocol that enables storing and sharing hypermedia (text, audio, visual) in a distributed manner without relying on a single point of failure. This distributed file system enables applications to run faster, safer and more transparently.

ISSUER

In a verifiable credential system, an issuer is the party that creates and provides the credential to a holder. A holder can be a person, organization, device, or object. Issuers can be businesses, organizations, or individuals. 

J
JSON-RPC

JSON-RPC is, quite simply, a method used to move data around computer systems, and predates public blockchain technology. It was chosen as a standard for moving data between blockchain networks and Internet browsers and wallets, with the result that these networks have come to be called ‘RPC networks’, despite JSON-RPC not being their defining technical feature.

K

keystore file

A keystore file is a special, encrypted version of a private key in JSON format. See also ‘private key’.

Know Your Customer (KYC)

A process in which a business must verify the identity and background information (address, financial details, etc.) of their customers. For example, current regulations and laws require banks and other financial institutions to keep and report customers’ personal information and transactions.

L

Layer 2

A Layer 2 network, or L2, is a blockchain that is built specifically to scale another network. For a full understanding of how this is achieved, see here. Some popular examples of this in the Ethereum ecosystem are Arbitrum, Optimism, and StarkNet. These chains are specifically built to handle a large number of transactions quickly by relying on Ethereum Mainnet for security functions, while optimizing for speed and scale. These networks are considered “scaling solutions” while not being part of Ethereum’s protocol-level scaling efforts. See also “blockchain trilemma”, “modular blockchain”, “Serenity”. Contrast with “sidechain”.

light client

In computing, a ‘client’ is a software that runs or accesses a program made available by a remote computer. With blockchain networks, then, clients are the programs that sync blockchain data and participate in network consensus.A light client downloads only a small part of the blockchain, allowing users of low-power or low-storage hardware like smartphones and laptops to maintain almost the same guarantee of security as a full node, despite only downloading part of the entire network state.

Liquid Democracy (Delegative Democracy)

A government system where votes can be delegated or proxied to other individuals such as friends, politicians, or subject matter experts. For example, in a liquid democracy, Bernadette could give Ahmad her vote and Ahmad would then vote for both himself and Bernadette. Liquid democracy is used at times as a governance mechanism for Decentralized Autonomous Organizations (DAOs) wherein every participant is able to vote or delegate their vote to another individual.

liquidity

An asset is considered more ‘liquid’ if it can easily be converted into cash, and therefore, ‘liquidity’ refers to the availability of assets to a company or market. Conversely, the harder it is to turn an asset into cash, the more illiquid the asset. For example, stocks are considered relatively liquid assets, as they can be easily converted to cash while real estate is considered an illiquid asset. The liquidity of an asset affects its risk potential and market price.

M

mainnet

The primary network where actual transactions take place on a specific distributed ledger. For example, The Ethereum Mainnet (capitalized in this case) is the public blockchain where network validation and transactions take place.

market cap

Short for ‘market capitalization’, this refers to the total value held in a particular industry, market, company, or asset. For a publicly traded company, the market cap is the total dollar market value of a company’s outstanding shares. For Bitcoin or Ethereum, the total market cap is a reflection of the current existing supply times the market price.

Maximal Extractable Value (MEV)

Originally known as Miner Extractable Value, MEV is a broad complex topic that refers to the inclusion, exclusion, and reordering of transactions within a block in order to extract more value from it, generally in excess of what a validator (or miner, on PoW networks) would earn from producing the block. MEV includes activities such as frontrunning, arbitrage, and what could be considered malicious actions to profit off of other users’ transactions. This is a very active topic of research that is changing rapidly.

memory pool

Often abbreviated as “mempool”. See “transaction pool”.

Merge, the

Finalized in September 2022, the Merge was the culmination of years of work involved in transitioning Ethereum from a Proof of Work consensus model, to Proof of Stake, all while keeping the network live. This was successful, and reduced the network’s carbon footprint by more than 99.9%.

Merkle Patricia trie

Often referred to simply as a “Merkle trie” (pronounced “tree”), a Merkle Patricia trie is a data structure in which a single hash code function (see ‘hash’) splits into smaller branches. In a similar way to a family tree, where a parent branch splits into child branches, which are then extrapolated into grandchild branches, a Merkle Patricia trie keeps a record of the filiation and history of each element. This type of data structure enables for faster verification on a blockchain network.

Mesh

Consensys Mesh is a network of loosely coupled, tightly aligned teams, products, and investments advancing the Ethereum ecosystem and the arrival of web3.

MetaMask

MetaMask, either in its mobile app form on iOS and Android, or in its browser extension form, is a tool to access and interact with blockchains and the decentralized web. It allows users to manage their digital identity and the permission of others to interact with that identity; its functions include that of a wallet, a dapp permissions manager, and access to token swaps. It is an open-source project that encourages developers from other projects to build on top of it through MetaMask Snaps.

mining

The process by which blocks or transactions are verified and added to a blockchain using a Proof of Work (PoW) consensus mechanism. In order to verify a block, a miner must use a computer to solve a cryptographic problem. Once the computer has solved the problem, the block is considered “mined” or verified. On Bitcoin or other PoW blockchains, the first computer to mine or verify the block receives bitcoin, or the equivalent network token, as a reward.

mnemonic phrase

This is an alternative way of referring to a Secret Recovery Phrase, also known as a ‘seed phrase’: a series of words that correspond to a very long cryptographic key, used to generate and control all the addresses of a crypto wallet.

modular blockchain

Bitcoin is an example of a monolithic blockchain: all of the functions of the network (consensus, execution, data availability, and settlement) are run on one chain. This has significant drawbacks (see “blockchain trilemma” for more). A modular blockchain, on the other hand, separates some or all of these functions into separate chains, each one optimized for its specific function, and relying on the other chains for the other functions.Ethereum is currently moving towards modularization, both on a protocol level beginning with the Merge, which split consensus and execution into two chains, and at the level of “Layer 2” networks which provide optimized execution environments, and then “roll up” their data to Ethereum for its consensus functionality.

multi-signature wallet (multisig)

A crypto-asset wallet which requires multiple keys in order to access and transact. Typically, a specified number of individuals are required to approve or “sign” a transaction before they are able to access the wallet. This is different from most wallets, which only require one signature to approve a transaction.

N

node (full node)

Public blockchains consist of a network of computers which sync the network’s data, coordinate transaction requests, and participate in consensus regarding the validity of those transactions; each one of these computers is called a ‘node’. A full node is a computer that can fully validate transactions and download the entire data of a specific blockchain. In contrast, a “lightweight” or “light” node does not download all pieces of a blockchain’s data, and uses a different validation process.

NFT

When discussing Non-Fungible Tokens (NFTs), “fungibility” refers to an object’s ability to be exchanged for another. For example, an individual dollar is considered fungible, as one dollar is fully interchangeable with another. Artwork is usually deemed non-fungible, as paintings or sculptures are likely to be unequal between them in quality, value, or other attributes. A non-fungible token is a type of token that is a unique digital asset and has no equal token. This is in contrast to cryptocurrencies like ether that are fungible in nature.

NFT aggregator

In the initial wave of interest in buying and selling NFTs, a number of NFT marketplaces–websites where you can buy and sell NFTs–were created. As the market matured, aggregators appeared, which offer the user the ability to view available stock and price, buy, and sell across marketplaces from a single unified application. Similar to familiar web2 shopping portals, these have come to be known as NFT Marketplace Aggregators, or just NFT Aggregators.

nonce

The word ‘nonce’ has a few different meanings, and in different contexts, it ends up getting used a lot of different ways. Originally formed from a contraction of a phrase meaning “not more than once”, on the Ethereum Mainnet, “nonce” refers to a unique transaction identification number that increases in value with each successive transaction in order to ensure various safety features (such as preventing a double-spend). Note that due to its broader use in cryptography, you may encounter ‘nonce’ being used differently on other sidechains or decentralized projects.

O

ommer block

Under the Proof of Work (PoW) consensus mechanism, miners received rewards for being the first to mine a new block. However, at times a block would be mined just after, and in competition with, the last block. This block, known as an ommer and previously as an uncle, could get rolled into subsequent blocks and the miner of the original ommer would get a partial block reward. All of this functionality was deprecated as of the launch of the Beacon Chain.

on-ramp, off-ramp

Based on a metaphor from the American highway system, “on-ramp” refers to a tool, or a service provider, or the action, of converting fiat currency into tokens on a blockchain. Conversely, “off-ramp” refers to exchanging on-chain assets for their value in a given fiat currency. There are many providers of such services, and MetaMask users have access to them through the “Buy Crypto” feature.

optimistic rollup

A rollup that assumes the validity and good faith of transactions, and only runs a fraud proof in the case of fraud being alleged. See also ‘rollup’.

Oracle

Typically, an oracle is any entity or person that is relied on to report the outcome of an event. In a blockchain network an oracle (human or machine) helps communicate data to a smart contract, which can then be used to verify an event or specific outcome.

P

P2P (peer-to-peer)

P2P refers to interactions that happen directly between two parties, usually two separate individuals, and have been present in Internet technology in different ways for some time. These interactions are often coordinated through some sort of app or network, which can consist of any number of individuals. Public blockchains can be considered to have a high degree of P2P functionality, as individuals are able to transact or interact with each other without relying on an intermediary or single point of failure.

parity

In a general sense, to say that something ‘has parity’ with another thing means ‘equal in features or other important quality’, and is a phrase often used by software developers and computer scientists.Parity Technologies is the name of a blockchain technology company that is developing a number of significant projects in the blockchain space. One of its first projects was an Ethereum client, known as Parity; its name was changed to Parity Ethereum, and then was spun out as a DAO-owned and operated project called Open Ethereum, which has also been deprecated. See also ‘client’.

permissioned ledger

A blockchain network in which access to ledger or network requires permission from an individual or group of individuals, as opposed to a public blockchain. Permissioned ledgers may have one or many owners. Consensus on a permissioned ledger is conducted by the trusted actors, such as government departments, banks, or other known entities. Permissioned blockchains or ledgers contain highly-verifiable data sets because the consensus process creates a digital signature, which can be seen by all parties. A permissioned ledger is much easier to maintain and considerably faster than a public blockchain. For example, Quorum or Hyperledger Besu are permissioned ledgers that can be more easily set up for large enterprises. In contrast, the public Ethereum blockchain is a permissionless ledger which anyone can access.

Plasma

‘Plasma’ is a term that is used to refer to one of the solutions being built and deployed in order to securely scale the Ethereum network. A Plasma network functions similarly to an optimistic rollup, inasmuch as it relies on Ethereum Mainnet to maintain the record of transactions, and as the source for arbitration or fraud resolution. However, a Plasma network differs in other important technical ways from rollups, and is currently limited to simple operations, such as swaps and token transfers. More technical information is available here.

PoA, PoS, PoW

Acronyms standing for Proof of X consensus mechanisms: Authority, Stake, Work. The “o” is lowercase since you wouldn’t capitalize “of” when writing out the phrase. See also ‘consensus’, ‘Proof of Authority’, ‘Proof of Stake’, ‘Proof of Work’.

PoS/PoW Hybrid

A hybrid consensus model that utilizes a combination of Proof of Stake (PoS) and Proof of Work (PoW) consensus. Using this Hybrid consensus mechanism, blocks are validated from not only miners, but also voters (stakeholders) to form a balanced network governance.

private blockchain

A blockchain or distributed ledger that has a closed network wherein participants are controlled by a single entity. A private blockchain requires a verification process for new participants. A private blockchain may also limit which individuals are able to participate in consensus of the blockchain network. See also ‘permissioned ledger’.

private currency

A currency or token issued by a private individual or firm. Typically, the token or currency is limited to use within the network of that particular firm or individual. This is not to be confused with a “privacy cryptocurrency”, which are cryptocurrencies with specific privacy features, such as hidden user identities.

private key

A private key is an alphanumeric string of data that, in MetaMask, corresponds to a single specific account in a wallet. Private keys can be thought of as a password that enables an individual to control a specific crypto account. Never reveal your private key to anyone, as whoever controls the private key controls the account funds. If you lose your private key, then you lose access to, and control over, that account.

Proof of Authority (PoA)

A consensus mechanism used in private blockchains, granting a single private key the authority to generate all of the blocks or validate transactions.

Proof of Stake (PoS)

A consensus mechanism in which an individual node, or “validator”, validates transactions or blocks. Validators lock up a certain amount of cryptocurrency, such as ether, into a ‘stake’, in order to be able to participate in consensus. If the node validates a block (group of transactions) correctly, then the validator receives a reward. Conversely, if the validator behaves poorly by validating incorrect transactions or by not maintaining sufficient network connectivity, the cryptocurrency they staked can be ‘slashed’, or taken from them and put out of circulation (‘burned’). PoS requires a negligible amount of computing power compared to Proof of Work consensus.

Proof of Work (PoW)

A consensus mechanism in which each block is ‘mined’ by one of the nodes, or a group of nodes, on the network. The computational process involved in committing a series of transactions into a block on the network, known as ‘hashing a block’, is technically quite simple, and therefore subject to attack. Under PoW, each miner must solve a math problem to find a set, difficult variable in order to be able to propose their block to the network as the next to be ‘mined’. In effect, the process of hashing each block becomes a competition. This addition of solving for a target increases the difficulty of successfully hashing each block, and consequently the security of the network.For each hashed block, the overall process of hashing will have taken some time and computational effort. Thus, a hashed block is considered Proof of Work, and the miner that successfully hashes the block first receives a reward, in the form of cryptocurrency. PoW is singificantly more energy-intensive than other consensus mechanisms, such as Proof of Stake.

protocol

Formally speaking, a ‘protocol’ is a set of rules governing how a process is carried out. This concept is used throughout public blockchain networks and web3 to refer to the way smart contracts execute their functionality in the same way regardless of the user. The products or services built on top of smart contracts are often referred to as ‘protocols’ by extension.

public blockchain

A globally open network wherein anyone can participate in transactions, participate in the consensus protocol to help determine which blocks get added to the chain, maintain and examine the contents of the chain.

public key

Public blockchain networks are just that: public. Their data is accessible and readable by anyone. In order to have any degree of usability when it comes to allowing users to do some things, like send transactions, but not others, like steal other peoples’ tokens, cryptographic technology is used. In particular, a design paradigm known as ‘public/private key pairs’ is employed to ensure users can interact with others on the network as they wish, while keeping their own account secure.These key pairs consist of two long strings of alphanumeric characters. A public key can be derived mathematically from its corresponding private key, but the inverse is not true: it is mathematically impossible to derive a private key from its corresponding public key. This allows, for example, users to have a public wallet address that anyone can use to send them tokens, with the peace of mind that as long as they properly keep the corresponding private key safe, those tokens cannot be stolen. See also ‘private key’.

R

relayer

In the field of Decentralized Finance (DeFi), a relayer is any party or entity which hosts an off-chain orderbook. Relayers help traders discover counter-parties and cryptographically move orders between them. 0x is an example of a popular Ethereum relayer protocol.

Reusable ID / Reusable Identity

In the field of Decentralized Finance (DeFi), a relayer is any party or entity which hosts an off-chain orderbook. Relayers help traders discover counter-parties and cryptographically move orders between them. 0x is an example of a popular Ethereum relayer protocol.

rollups

Rollups (pronounced “roll ups”) are one element in the set of tools and infrastructure being built as scaling solutions for the Ethereum network. They consist, in general, of networks which prioritize their ability to compute transactions and smart contract functionality, and then ‘roll up’ those transactions to Ethereum Mainnet for secure verification of their validity. There are different ways of approaching this problem from a technical point of view, namely Zero Knowledge, or ZK, rollups, and Optimistic rollups. Arbitrum and Optimism are prominent examples. See the entries on both of these types of rollup for more, and more in-depth discussion here.

RPC

The Remote Procedure Call is a technology that is used to transfer data between endpoints. You may often see it referred to as JSON-RPC, which is its full name; see ‘JSON-RPC’ for further details.

rug pull

Similar to the traditional financial scam of a pyramid scheme, a ‘rug pull’ is a cryptocurrency or crypto-token based scam in which the creators of the token create hype, through injecting liquidity into their token, airdropping, and other schemes, and once investors pile in and boost the price of the token up to a certain point, the creators liquidate their (generally majority) share of the tokens, leaving their investors with next to nothing.

S

Satoshi Nakamoto

A pseudonymous individual or entity who created the Bitcoin protocol, solving the digital currency issue of the “double spend.” Nakamoto first published their white paper describing the project in 2008, and the first Bitcoin software was released one year later.

scalability

A change in size or scale to handle a network’s demands. This word is used to refer to a blockchain project’s ability to handle network traffic, future growth, and capacity in its intended application.

Seed (phrase) / Secret Recovery Phrase

The seed phrase, mnemonic, or Secret Recovery Phrase is a crucial part of public blockchain technology, originally created for Bitcoin, and goes by many names. However, they all refer to a set of ordered words which correspond to determined values. These values never change, and therefore the same string of words in the same order will always produce the same number–this is the underlying functionality that allows seed phrases to back up wallets. This is also where the name ‘hierarchical deterministic wallets’ comes from, as all the accounts in a given wallet are deterministically created from the seed phrase, and they are hierarchically controlled by it.A Secret Recovery Phrase is exactly what it sounds like: something that is secret, and should be known only to the owner of the account. If the seed phrase is given to someone else, that person has complete control over the account; they can drain it of tokens and funds, execute transactions with it, etc.

self-executing

Functioning by itself, not controlled by any other party other than itself. Self-executing smart contracts cut costs and overhead by removing the need for an arbitrator and trust toward a third party. See also ‘protocol’.

Serenity

The Ethereum network is working on a series of technical upgrades that will allow massive increases in transaction throughput, amongst other things. The plan that outlined these changes was originally referred to as ‘Serenity’, although that name has become less popular, in favor of specific descriptions of the upgrades themselves.

serialization

The process of converting a data structure into a sequence of bytes. Ethereum internally uses an encoding format called recursive-length prefix encoding (RLP).

sharding

Sharding, in public blockchains, refers to splitting an entire network into multiple portions, called “shards.” Each shard would contain its own independent state, meaning a unique set of account balances and smart contracts. Sharding is currently being investigated and developed as one of the set of tools and solutions for scaling Ethereum.

sidechains

A ‘sidechain’ refers to a chain that is connected to another (most often, to Ethereum) through a bridge, allowing assets to be transferred between them. In contrast to a Layer 2 network or a rollup, a sidechain is a full blockchain network in and of itself, and does not rely on Ethereum for consensus. It therefore must be evaluated independently in terms of its security, stability, and other features. See also “blockchain trilemma”, “modular blockchain”.Note: Bridges exist for good reason; sending tokens from a sidechain to Ethereum mainnet or vice versa would result in token loss.

slashing condition

Under a Proof of Stake (PoS) consensus mechanism, a slashing condition is one that causes the validator’s deposit to be destroyed when they trigger it. See also ‘Proof of Stake’.

slot

A slot, under Ethereum Proof of Stake consensus, is a 12-second period of time during which a new block may (or may not) be proposed. Every 32 slots comprise an epoch. See also ‘epoch’.

smart contracts

Smart contracts are programs that have been published on a public blockchain, and can be used by anyone. While they often contain agreements or sets of actions between parties that emulate a traditional legal contract, they are not, in and of themselves, legal documents. Smart contracts are automated actions that can be coded and executed once a set of conditions is met, and are the dominant form of programming on the Ethereum Virtual Machine.

soft fork

A change to the blockchain protocol resulting in only previously valid blocks and transactions being made invalid. Since old nodes will recognize the new blocks as valid, a soft fork is backward-compatible. However, this can result in a potential divide in the blockchain, as the old software generates blocks that read as invalid according to the new rules. Contrast with ‘hard fork’; for more basic information regarding forks, see ‘fork’.

Solidity

The programming language developers use to write smart contracts on the Ethereum network. Try it out on Remix. See also ‘smart contract’.

stablecoin

A cryptocurrency whose value has been ‘pegged’ to that of something considered a ‘stable’ asset, like fiat currency or gold. It theoretically remains stable in price, as it is measured against a known amount of an asset which should be less subject to fluctuation. Always spelled as one word.

staking

On the Ethereum Proof of Stake network, those wishing to participate in consensus must first lock up, or ‘stake’, 32 ETH into a smart contract; this ETH may be ‘slashed’ (taken from them and ‘burned’, put out of circulation) in the event that their validator behaves maliciously or does not meet performance requirements. Similar Proof of Stake mechanisms are in operation on other networks, as well.Although this is the canonical meaning of the word, similar actions taken at the level of a decentralized exchange (DEX) or another dapp are often called ‘staking’, though it would probably be more accurate and descriptive to just call this ‘locking up tokens’.

state

The set of data that a blockchain network strictly needs to keep track of, and that represents data currently relevant to applications on the chain.

state channels

State channels are part of the set of tools and platforms involved in scaling Ethereum. While a complex topic, state channels are essentially methods through which the current ‘state’ of the blockchain can be exported, and then based on that, any given number of transactions can take place off-chain, and then be moved back onto the main Ethereum chain.

swap

As the number of different blockchain projects and tokens has proliferated, the system by which users exchange one token for another has come to be known as swapping, and the individual action, a swap. Within MetaMask, users have access to a powerful aggregator showing them information about swaps across the ecosystem, this is MetaMask Swaps.

szabo

A denomination of ETH. See also ‘ether (denominations)’.

T

testnet

A testnet is a blockchain network that mirrors, as closely as possible, the current conditions of a corresponding ‘main’ network. Testnets are used by developers to verify that their smart contracts and other functionality work as intended, before permanently recording their code to a live blockchain network (and often spending significant gas fees in the process!).Tokens minted on testnets are not transferrable for their equivalent value on mainnets.

Testnet Kovan

An Ethereum testnet that uses Proof of Authority consensus, available through MetaMask; website here.

Testnet Rinkeby

An Ethereum testnet that uses Proof of Authority consensus, available through MetaMask; faucet here. Following the transition to Proof of Stake, Rinkeby scheduled its deprecation for the end of 2023.

Testnet Ropsten

An Ethereum testnet that used Proof of Work, and, following the transition to Proof of Stake, was deprecated.

token

A token represents an asset issued on an existing blockchain; the transfer of tokens and the addresses that currently hold them are the subject of the network’s consensus activities. There are many types of tokens; see also ‘ERC-20’ and ‘ERC-721’ entries.

Total Value Locked (TVL)

Total Value Locked, or TVL, is a common expression used in many contexts across the crypto ecosystem, so it’s important to pay attention to the specifics. In general, it refers to how much value, in tokens, has been deposited into something.Most often, it refers to a protocol, which is an application on the blockchain, or a set of protocols. For example, a decentralized token trading platform might have a series of liquidity pools, which are protocols enabling swaps between tokens, and the platform may quote the “TVL” for all the pools combined. Alternatively, if a network uses proof of stake for their consensus mechanism, they may represent the TVL of all the tokens staked into that consensus protocol.

transaction block

A collection of transactions on a blockchain network, gathered into a set or a block that can then be hashed and added to the blockchain. See ‘hash’.

transaction fee

A small fee imposed on transactions sent across a blockchain network. These fees are used to pay network validators or miners for their participation in consensus, and thus ensure that a blockchain network is self-sustaining.

transaction pool

When a user submits a transaction to the Ethereum network–or many other networks based on Ethereum–the transaction goes into what’s known as a “transaction pool”, or “txpool” for short. This is essentially a queue of transactions that are waiting to be added to a block and recorded to the blockchain. There are mechanisms that determine which transactions are “picked up” and included in the next block, and there is currently a lot of research surrounding how this decision gets made (see “MEV”). In Bitcoin, the transaction pool is referred to as the “memory pool”, or “mempool”, and often these terms are used interchangeably.

 

Trust Triangle
The relationship between the issuers, holders, and verifiers is called the trust triangle simply because you need an element of trust among these entities for them to work together. Also, this term is typically used to convey human relationships in the digital world. The party verifying these credentials can check authenticity and validity without informing or consulting the issuer of the credentials, hence safeguarding the sovereignty of the holder.
trustless

‘Trustless’ is a term that gets used a lot in the decentralized web, and it deserves some explanation.Traditionally, to call something ‘trustless’ would sound like a negative thing. In the context of decentralized technology, it has a more technical meaning: since everyone has a copy of the ledger of all transactions ever executed, there is no need for a centralized entity that ‘must be trusted’ as the source of truth. With public blockchain networks, data isn’t kept on some centralized server somewhere that could be hacked or changed arbitrarily; anyone can verify the transactions themselves. This is why the term ‘trustless’ was coined: there is no need for trust, although, in a way, the rules and assurances built into the blockchain provide the basis for greater trust between people, because the system is guaranteed to work the same for everyone.

Turing-complete

Any machine that can calculate on a level equal to a programmable computer is Turing-complete, or computationally universal. The Ethereum Virtual Machine, which processes smart contracts and transactions, is Turing-complete, despite not existing on a single physical computer.

V

validator

A participant in Proof of Stake (PoS) consensus. On Ethereum’s Proof of Stake network, validators need to stake 32 ETH in order to get included in the validator set. See also ‘staking’.

validity proof

The proof submitted along with certain types of rollups to prove that the transactions are valid. See also ‘rollups’.

Validium

One of the technologies developed for scaling of the Ethereum network; see more here.

W

Wallet

In Ethereum-based blockchain technology, a ‘wallet’ is a something that allows you to manage private keys, your Secret Recovery Phrase, and the accounts generated from it. This could be an internet-connected ‘hot wallet’, like MetaMask, or an ‘airgapped’ hardware wallet. In more technical speak, you could say “the wallet is the client, not the keys.”It is very common for people to use the word ‘wallet’ to refer to their SRP itself, or the accounts generated from it, or even to one account.

web3 / Web 3.0

Web3, or Web 3.0, are terms used synonymously with “the decentralized web” and are often used to refer, broadly, to the blockchain and decentralized technology ecosystems and communities as a whole.

Z

zk-SNARKs

Zero-Knowledge Succinct Non-interactive ARguments of Knowledge are an incredible technology, and vital to the scaling of blockchain technology and the decentralized web. They are mathematically complex and can be daunting; this explanation from the Ethereum Foundation is a good primer.

zero address

The Zero Address is an address on the Ethereum network that is the recipient of a special transaction used to register the creation of a new smart contract on the network.

#

51% Attack

If more than half the computer power or mining hash rate on a network is run by a single person or a single group of people, then a 51% attack is in operation. This means that this entity has full control of the network and can negatively affect a cryptocurrency by taking over mining operations, stopping or changing transactions, and double-spending coins.

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

ABI

ABI is an acronym for Application Binary Interface, and it is an interface between two binary program modules at the level of machine code, not source code. Blocknative can monitor smart contract ABIs in real-time.

Address (noun)

A unique string of numbers or text appointing a wallet’s location on a blockchain.

Access (adjective)

Principle of Self-Sovereign Identity. Users must have easy and direct access to their own data.

Access Tokens (noun)

Grants access to premium features on a platform or to a commmunity. The token is a tradable membership for exclusive experiences

Airdrop (noun)

Crypto projects use this marketing technique to send their tokens (e.g. coins and NFTs) directly to wallets to raise awareness.

Alpha (noun)

Valuable advice, recommendations, or info given by someone in a position of knowledge.

Altcoin or Als (noun)

Refers to cryptocurrency that is not Bitcoin such as newer projects with a smaller market cap. Alts is short for Altcoins.

Agent

A representative of an identity. It’s possible that require the use of a wallet. May support transfer.

Authentic Chained Data Container Taks Force (ACDC)

The purpose of the ACDC Task Force, is to draft a TSS (ToIP Standard Specification) that defines the standard requirements for the semantics of Authentic Provenance Chaining of Authentic Data Containers.

Ambient Verifiability

Verifiable by anyone, anywhere, at anytime. E.g. Ambient Duplicity Detection describes the possibility of detecting duplicity by anyone, anywhere, anytime.

Autonomic Identifier

An identifier that is self-certifying and self-sovereign

Autonomic Namespace

A namespace that is self-certifying and hence self-administrating. ANs are therefore portable = truly self sovereign.

API

API is an acronym for Application Programming Interface which is an interface between computers or programs that allows information to pass between them.

Asymmetric encryption

The encryption key (also called the public key) and the corresponding decryption key (also called the private key) are different. Asymmetric encryption is also known as public-key encryption.

App Review

An incentive mechanism for application developers in the early stage (first four years) of the ecosystem and helps with bootstrapping the two-sided market.

ATH & ATL (noun)

ATH is short for ‘all-time high’. The highest price point an asset has ever had. ATL is short for ‘all-time low’, the lowest price point an asset has ever had.

Artificial Intelligence -AI-

The theory and development of computer systems that can perform tasks — often using natural language processing (NLP), machine learning and natural language understanding (NLU) — that normally require human intelligence, comprehension and understanding.

Archival Nodes

An archival node is a full node in the blockchain that keeps a complete history of transactions and address state changes since the genesis block. Blocknative enables users to see archival mempool information on public blockchain networks.

Augmented Reality -AR-

Technology, using involving glasses, visors, goggles or smartphones, that superimposes a computer-generated image on a user’s view of the actual world, providing a composite view that often includes perceptual information.

Avatar

A computerized icon or figure which represents a person, pet or entity in video games, internet forums, games, chat rooms, virtual reality and other channels.

B

Base Fee

The base fee is an algorithmically determined fee that users on the Ethereum blockchain must pay to complete a transaction. The base fee is designed to help smooth transaction fees and prevent sudden spikes by targeting 50% full blocks. Depending on how full the new block is, the Base Fee is automatically increased (the block is more than 50% full) or decreased (the block is less than 50% full).

Bear Market (noun) & Bearish (adjective)

A market is bearish when there is a prolonged downward pricing trend and a pessimistic outlook. Sometimes purposely misspelled as beras.

Bid

The bid price represents the maximum price that a buyer is willing to pay for an NFT or token.

Block (noun)

A block is a batch of data transactions stored on the blockchain.

Blockchain (noun)

A digital list of data records. Records are called blocks which are organized in chronological order, linked together like a chain, and secured using cryptography.

Block Explorer (noun)

A tool used to examine detailed information on blockchains. (E.g. Etherscan for the Ethereum transactions)

Block Gas Estimator Feed

The Block Gas Estimator Feed estimates gas prices for the next block based upon the in-flight transactions that are currently in the mempool (pre-chain transactions). With Blocknative’s Gas Platform, Dapp and wallet developers can integrate gas estimation feeds directly into their product. Ethereum blockchain).

Buidl (noun, verb)

meaning ‘build’, a misspelling on purpose used in crypto communities just like HODL (hold).

Bull Market (noun) & Bullish (adjective)

A market is bullish when there is a prolonged upward pricing trend and an optimistic outlook.

Burn (verb)

A strategy where tokens or other digital assets like NFTs are removed from a circulating supply to influence price and demand. Bitcoin and Ethereum don’t have this, but many other Altcoins do.

Bitcoin

A decentralized, digital cryptocurrency that doesn’t rely upon a central bank or trusted source which can be transferred from user to user on a peer-to-peer network using blockchain technology.

Bitcoin (BTC) address

A string of letters and numbers like: 3E53XjqK4Cxt71BGeP2VhpcotM8LZ853C8

 

Sharing this address allows anyone to send Bitcoin to the address.

Blockstack Browser

A deprecated application for accessing identity and storage.

Blockstack Owner Address

Looks like a bitcoin address but starts with ID for example: ID-1J3PUxY5uDShUnHRrMyU6yKtoHEUPhKULs

Burning

Burning a token means that the token is transferred to an address that is a black hole—one that is not owned by any entity and for which guessing the applicable private key is effectively impossible based on known mathematical principles. This effectively destroys the token by making it unavailable for future use and decreases the total number of tokens available from that point forward.

Bootstrapping

Refers to the process of starting up a computer system.

C

Cancel Transactions

A cancel transaction is a type of replacement transaction where a user submits an identical transaction with a higher gas limit so it is mined before the previous transaction. Once the new replacement transaction is confirmed, the original transaction will get dropped. Blocknative’s mempool monitoring tools can track replacement transactions in real-time.

Centralized (adjective)

In a centralized network, there is a central authority that governs and handles the network.

CEX or Centralized Exchange (noun)

An exchange handling cryptocurrency managed by a centralized business. (E.g. Coinbase, Kraken)

CeFi or Centralized Finance (noun)

Centralized businesses participating in crypto. (E.g. BlockFi)

Coin (noun)

Cryptocurrency built on its own native blockchain, with the purpose to store value and serves as an medium of exchange within that specific ecosystem. (E.g. ETH, BTC)

Cold Wallet (noun)

A hardware device used to store cryptocurrency.

Confirmed Transaction

A confirmed transaction is a transaction that has been included in a block and permanently added to the blockchain.

Consent (adjective)

Principle of Self-Sovereign Identity. Users must give explicit permission for an entity to use or access their data. The process of expressing consent should be interactive and well-understood by people.

Consensus (noun)

A collective judgment in which data processors, called nodes, come to an agreement to verify new transactions and blocks to be added to the blockchain. This process is used by consensus mechanisms such as proof of work and proof of stake.

Consensus hash

A consensus hash is a cryptographic hash that each node calculates at each block. It is derived from the accepted state transitions in the last-processed block, and a geometric series of prior-calculated consensus hashes.

Consensus rules

The rules governing the creation of new valid records in a blockchain database, and the mining algorithms used for this purpose.

Control plane

The part of a network that carries signaling traffic and is responsible for routing. Control packets originate from or are destined for a router. Functions of the control plane include system configuration and management.

Controller

The entity that has the capacity to make changes to an identity, cryptocurrency or VC (verifiable credential).

Control Authority

In identity systems Control Authority is who controls what and that is the primary factor in determining the basis for trust in them. The entity with control authority takes action through operations that affect the creation (inception), updating, rotation, revocation, deletion, deletion, and delegation of the authentication factors and their relation to the identifier.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Correlation

An identifier used to indicate that external parties have observed how wallet contents are related. For example, when a public key is reused, it conveys that some common entity is controlling both identifiers. Tracking correlation allows for software to warn when some new information might be about to be exposed.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Control (adjective)

Principle of Self-Sovereign Identity. People must have ultimate authority over their digital identities and personal data.

How these events are ordered and their dependence on previous operations is important. The record of these operations is the source of truth for the identity system.

Custodial and Non-Custodial Wallets

At the core of every crypto wallet is a public and private key pair. Asymmetric cryptography is at the backbone of all distributed ledgers and web3 technologies; without it, no distributed ledgers would exist. Your private key is used to authorize your transactions and receive information. Whoever has the private key of a wallet can access funds and authorize transactions. The private key is critical. The public key is hashed and then used as your wallet address.

 

The distinction between a custodial and non-custodial wallet is who manages your private keys. If you manage your private keys, the wallet is referred to as a non-custodial wallet because no one has custody of your wallet except you. If a third party controls your private keys, then the wallet is a custodial wallet.

Creator Economy

A class of businesses made up of content creators, curators and community builders which enable the content producers to monetize their creations.

Credential

A credential is an order or document that attests or authorizes the qualification, competence or authority granted to an individual by a third party with de jure or de facto authority.

Cryptocurrency (noun)

A digital currency designed for use as money within a digital ecosystem. It is a medium of exchange, storing value, etc. They are maintained by blockchains.

Cryptography (noun)

The computerized practice of encoding and decoding information for secure communication.

Cypherpunk (verb)

Someone who believes in the use of cryptography to affect social and political change through privacy by cryptography. (E.g. Satoshi Nakamoto, anonymous founder of Bitcoin.)

Crypto wallet

A physical or digital device, computer application or smartphone app that stores the public and/or private keys for cryptocurrency transactions, including sending, receiving, buying, selling, swapping of cryptocurrencies and NFTs and digitally signing information

D

Data breach

When an unauthorized person or party steals, views, transmits, copies, or uses information.

DApp or Decentralized Application (noun)

A software application that runs on a distributed network. It’s not hosted on a centralized server, but instead on a peer-to-peer decentralized network.

DAO

A Digital Decentralized Autonomous Organization (DAO, pronounced like the Chinese concept) is a powerful and very flexible organizational structure built on a blockchain.Alternatively, the first known example of a DAO is referred to as The DAO. The DAO served as a form of investor-directed venture capital fund, which sought to provide enterprises with new decentralized business models. Ethereum-based, The DAO’s code was open source. The organization set the record for the most crowdfunded project in 2016. Those funds were partially stolen by hackers. The hack caused an Ethereum hard-fork which lead to the creation of Ethereum Classic.

DApp or Decentralized Application (noun)

An open source software application with backend (not user-facing) code running on a decentralized peer-to-peer network, rather than a centralized server. You may see alternate spellings: dApps, DApps, Dapps, and Đapps.

A software application that runs on a distributed network. It’s not hosted on a centralized server, but instead on a peer-to-peer decentralized network.

decentralized exchange (DEX)

A decentralized exchange is a platform for exchanging cryptocurrencies based on functionality programmed on the blockchain (i.e., in smart contracts). The trading is peer-to-peer, or between pools of liquidity. This is in contrast with a centralized exchange, which is more akin to a bank or investment firm that specializes in cryptocurrencies. Additionally, there are so-called on-ramp providers, who could be compared to currency brokers, exchanging traditional “fiat” money for cryptocurrencies, and do not hold customer’s funds “on deposit” the way a centralized exchange does. There are important technical and regulatory differences between these, which are constantly evolving.

Decentralized Finances (DeFi)

If cryptocurrency is Web3’s monetary system, its financial system is DeFi. This includes familiar concepts like loans and interest-bearing financial instruments, as well as so-called “DeFi primitives”, novel solutions like token swapping and liquidity pools.

Deposit (web 3)

In most web3 contexts, ‘depositing’ refers to the act of transferring some amount of token(s) to an address other than one’s own, most often to a smart contract controlled by a ‘protocol’, such as a decentralized exchange, video game or multiverse, DAO, etc. Generally, the user will receive something in return for their deposit, and the deposit can be claimed at the user’s discretion, or upon completion of given conditions. Compare with ‘stake’.

Derive / Derivation

To derive something is to obtain it from an original source. In the context of crypto-technology, we often discuss “deriving” wallets and accounts from seed phrases (aka Secret Recovery Phrases, or SRPs). This is literally true: the SRP represents a cryptographic key which is used to derive account addresses deterministically, meaning they will be derived the same way each time. Another, more technical, way of referring to this technology is to refer to “hierarchical deterministic” wallets.

Devcon

This is shorthand for the Ethereum Developers’ Conference.

Devcon

This is shorthand for the Ethereum Developers’ Conference.

difficulty

The concept outlining how hard it is to verify blocks in a blockchain network during Proof of Work mining. In the Bitcoin network, the difficulty of mining adjusts every 2016 blocks. This is to keep block verification time at ten minutes.

difficulty bomb

The difficulty bomb, along with the Beacon Chain and others, was a key element of Ethereum’s upgrade to Ethereum 2.0 and a Proof of Stake (PoS) consensus mechanism. As the name indicates, the difficulty bomb was a software mechanism that increased block verification difficulty, making it more expensive and difficult–eventually, prohibitively so–to mine a new block. Through economic incentive, and later, the raw limitations of computing power, this forced the shift to PoS consensus. See also ‘Proof of Stake’, ‘the Merge’.

digital asset

A digital commodity that is scarce, electronically transferable, and intangible with a market value.

Digital Credential 
A digital credential functions similarly to the physical certificates or ID cards you might carry in your wallet. It’s an electronic record that verifies your qualifications, skills, clearances, or status. For instance, it might certify that you have completed a particular course, graduated from a specific school, or are qualified for a certain job, much like a driver’s license confirms your ability to drive.
However, unlike traditional paper or plastic forms, a digital credential is a secure digital file. It incorporates advanced security features that ensure its authenticity and integrity, making it trustworthy and resistant to tampering. You can easily and swiftly distribute it via the internet, and it’s safeguarded against unauthorized copying or alterations. 
digital identity

An online or networked identity is adopted by an individual, organization, or electronic device.

digital signature

A code generated by public key encryption and attached to an electronically transmitted document to verify the contents of the document.

Distributed Denial of Service (DDoS) Attack

A type of cyber-attack in which the perpetrator continuously overwhelms the system with requests in order to prevent service of legitimate requests.

distributed ledger

A type of database which spreads across multiple sites, countries, or institutions. Records are stored sequentially in a continuous ledger. Distributed ledger data can be either “permissioned” or “unpermissioned”, determining who can view it. This term is used, often, to refer in general to public blockchain technology, as ‘crypto’ has come to mean ‘cryptocurrency’, ‘web3’ is the collective community, and ‘blockchain’, after all, is “just” the data structure used to sync the distributed ledger itself.

double spend

The ‘double spend’ is the benchmark security concern of blockchain networks: how do we ensure that someone doesn’t send the same transaction to two different entities, essentially “spending their money twice”? This is the cornerstone of the consensus mechanism, ensuring that all nodes of the network are “in agreement” about which assets are allocated to which addresses, on an ongoing basis, to prevent malicious actions such as a double spend.

E

EIP (Ethereum Improvement Proposal)

The EIP process is a public and open process through which suggestions are made as to how to change (and hopefully, improve) the way the Ethereum network functions as a whole; the official repository is here. Individual EIPs are referred to by the name assigned to them in the repository, for example, EIP-1559. Keep in mind that as it is an iterative, lengthy process, some EIPs never get fully approved, and some do, and many end up somewhere in a gray area of ‘partially implemented’.

encrypted vs unencrypted keys

As discussed elsewhere, public and private cryptographic key pairs are one of the technologies that underpins cryptocurrencies and “crypto” tech in general. In MetaMask, an unencrypted private key is 64 characters long, and it is used to unlock or restore wallets. An encrypted key is also 64 letters long and is a regular private key that has gone through the process of encryption. Usually, encrypted private keys are kept within the extension or device they are encrypted by, and they remain out of sight from the user. This is meant to add another layer of security to keep a user’s wallet information safe.By way of example: if the world ‘Apple’ was your private key, then it was encrypted three letters down the alphabet, your new encrypted key would be ‘Dssoh’. Since you know the way to encrypt this key, you could derive the original private key from it by reversing the method of encryption.

encryption

Encrpytion, literally ‘in a hidden place’, is the art and science of encoding information to control who can read it, or how it is to be read. Encryption occurs in natural (human) languages, as well as in machine and computer languages. Highly complex, and therefore difficult to decipher, encryption is an essential element enabling blockchain networks to be simultaneously public and secure.

Enterprise Ethereum Alliance (EEA)

A group of Ethereum core developers, startups, and large companies working together to commercialize and use Ethereum for different business applications. Website here.

entropy

In the context of cryptography, ‘entropy’ refers to ‘randomness’; generally, the more random something is (the more entropy it has), the more secure it is.

epoch

An epoch, in general, is a measure of time, or of blockchain progression, on a given blockchain. In Ethereum Proof of Stake, an epoch consists of 32 slots, each lasting 12 seconds, for a total of 6.4 minutes per epoch. There is additional functionality built upon the epoch measure in the Beacon Chain to help ensure security and proper operation of the Chain.

ERC-20 Token Standard

ERC is the abbreviation for Ethereum Request for Comment and is followed by the assignment number of the standard. ERC-20 is a technical standard for smart contracts which is used to issue the majority of tokens (in particular, cryptocurrency tokens) extant on Ethereum. This list of rules states the requirements that a token must fulfill to be compliant and function within the Ethereum network.

ERC-721 Token Standard

As stated above, this is another standard for Ethereum smart contracts, which allows for the issuance of a non-fungible token: this is the standard that created what we all now know as an NFT. This token standard is used to represent a unique digital asset that is not interchangeable, as opposed to the ERC-20 (or other equivalent) standard, which issues identical, interchangeable tokens.

ether (ETH)

Ether is the native currency of the Ethereum blockchain network. Ether—also referred to as ETH (pronounced with a long “e”, like “teeth” without the “t”)—functions as a fuel of the Ethereum ecosystem by acting as a medium of incentive and form of payment for network participants to execute essential operations. The cryptocurrency of Ethereum has a lowercase e. The plural of ether is just ether; its abbreviation is ETH, with a space: I have 10 ETH. (nice!)

ether (denominations)

There are a number of denominations of the currency we know as ‘ether’ or ETH; for the definitive explanation, see the original Ethereum Homestead documentation here.

Ethereum

A public blockchain network and decentralized software platform upon which developers build and run applications. As it is a proper noun, it should always be capitalized.

Etherscan

A popular website for analyzing activity on the Ethereum blockchain. See ‘blockchain explorer’.

ENS

The Ethereum Name Service is a protocol, managed by a DAO, which assigns human-readable and easy-to-remember addresses to Ethereum addresses and assets, homologous to the traditional internet’s DNS.

ERC

Ethereum Request for Comment, or ERC, is a bit of a misnomer, as it is used to refer to suggestions for modifications that have already made it through the Ethereum Improvement Protocol (EIP) process and have been made standard on Ethereum. An ERC is, essentially, a set of standards for a given operation or topic on the Ethereum network. The authoritative list can be foundhere.

EVM (Ethereum Virtual Machine)

The EVM is a virtual machine that operates on the Ethereum network. It is Turing complete and allows anyone, anywhere to execute arbitrary EVM bytecode. All Ethereum nodes run on the EVM. It is home for smart contracts based on the Ethereum blockchain.

exchange

A place to trade cryptocurrency. Centralized exchanges, operated by companies like Coinbase and Gemini, function as intermediaries, while decentralized exchanges do not have a central authority.

F

faucet

A faucet is an application, sometimes a very simple website, other times more complex, that dispenses cryptocurrency. While some networks, especially those in early launch stages, offer “real Mainnet” tokens via faucets, it is much more common for a faucet to be present on a test network, or testnet. These faucets are used by developers to test out dapps or smart contracts before deploying them on Ethereum Mainnet, or users who want to practice an action on the blockchain with no risk. Tokens dispensed by a test faucet stay on the test networks and cannot be exchanged for mainnet equivalents.

Federated Identity Management System (FIMS) 

Allows organizations to share identity information across different platforms using a single sign-on (SSO) process, similar to using a Facebook or Google account to access various services.

While FIMS simplifies user access and can enhance security, it also presents challenges:

  • Increased Breach Risk: A breach in one system can potentially compromise all connected systems.
  • Complex Access Revocation: It can be difficult to remove an individual’s access across all systems quickly.
  • Management Complexity: Managing a FIMS involves overseeing multiple settings and configurations across different platforms, which can be challenging for administrators.
fiat currency

Government-issued currency. For example, US Dollars (USD), Euros (EUR), Yuan (CNY), and Yen (JPY).

final, finality

A transaction is considered “final” once it can no longer be changed. In a sense, this happens once there are sufficient confirmations of the transaction, but for all intents and purposes, a transaction is final once the block that contains it is mined or validated. Keep in mind that this reflects a fundamental rule of blockchains: unlike traditional financial systems where charges can be “reversed”, there is no “undoing” a transaction on the blockchain. Once finality is reached, the transaction is immutable.

finney

A denomination of ether. See ether (denomination).

fork

‘Forking’ is a term that comes from the world of collaborative software development, and refers to the action of copying an existing application or set of code and modifying it to create an alternate version. At the blockchain protocol level, a ‘fork’ creates an alternative version of a blockchain. Forks are often enacted intentionally to apply upgrades to a network. Soft Forks render two chains with some compatibility, while Hard Forks create a new version of the chain that must be adopted to continue participation. In the instance of a contentious Hard Fork, this can create two versions of a blockchain network. See also “hard fork”.

G

gas

A measure of the computational steps required for a transaction on the Ethereum network. This then equates to a fee for network users paid in small units of ETH specified as gwei. See also “ether (denominations)”. For more on gas, see MetaMask’s user guide here.

gas limit

The gas limit is the maximum amount you’re willing to pay for any given transaction to go through the Ethereum network. Another way of looking at it is as a “rough estimate” of how much computing power your transaction will take.

gas price

The gas price is what it sounds like: the cost the network is paid for the computational work being performed in a given transaction. It is paid in units of ETH called gwei. Depending on network congestion, the gas price may vary significantly.

genesis block

The initial block of data computed in the history of a blockchain network.

gwei

A minuscule and common denomination of ETH, and the unit in which gas prices are often specified. See ‘ether (denominations)’ entry for more information.

H

halving

Many cryptocurrencies have a finite supply, which makes them a scarce digital commodity. For example, the total amount of bitcoin that will ever be issued is 21 million. The number of bitcoins generated per block is decreased 50% every four years. This is called “halving.” The final halving will take place in the year 2140.

hard fork

A hard fork occurs when there is a change in the blockchain that is not backward compatible (not compatible with older versions), thus requiring all participants to upgrade to the new version in order to be able to continue participating on the network. See also “fork”.

hardware wallet

A hardware wallet is a physical device that is used to store cryptographic keys, and generally, sign transactions. Some hardware wallets can be connected physically or through software to internet connectivity; others are ‘air-gapped’, receiving transaction requests and sending transaction approvals through a mechanism such as a QR code. The overall goal of using a hardware wallet to manage keys and signatures is to reduce the likelihood of your keys or Secret Recovery Phrase from being somehow stolen or compromised, due to being connected to the Internet. For more on hardware wallets, see MetaMask’s Hardware Wallet Hub.

hash

In computing, ‘hashing’ is an operation performed on lists or sets of data to create a reliable index for that data. A particular datum, or a reference to it, is fed into an algorithm, which transforms the datum and returns a standardized, and generally unrecognizable, ‘hash’ of it, sometimes referred to as that datum or file’s “digital fingerprint.” Each block in a blockchain contains the hash value that validated the block before it, followed by its own hash value (this is how the continuity of the ‘chain’ is constructed). Hashes can be used to confirm that blockchain transactions are complete and valid. You may see references to the “transaction hash” or “tx hash”; this should be understood as “unique identifier of the transaction”.

HD wallet

Hierarchical Deterministic wallets were first created for Bitcoin, and enable the creation of a very large number of accounts based on an initial seed phrase. This technology was later adopted in Ethereum wallets; when restoring a MetaMask wallet from the Secret Recovery Phrase, for example, if you “create” accounts, they will be the same accounts as previously created from that same phrase; they are derived from it.

hexadecimal

Hexadecimal is a base 16, rather than base 10, counting system. Used all over Ethereum for a variety of things, a hexadecimal string is comprised of the numbers 0 1 2 3 4 5 6 7 8 9 and letters A B C D E F.

HOLDER

In a verifiable credential system, the holder is one of three key participants who owns and stores the credential in a digital wallet. Examples of such credentials include college degrees, professional certificates, identity documents, and course completion certificates, which can be stored in an app on their phone.

The issuer, such as a university, originally provides the credential, while the verifier, like an employer, checks its authenticity. Holders can present these digital credentials to verifiers to prove their identity and qualifications conveniently, without the need for physical documents. This ensures that the credentials are legitimate and have not been altered.

hot wallet / hot storage

A wallet that is directly connected to the internet at all times; for example, one that is held on a centralized exchange. Hot wallets are considered to have lower security than cold storage systems or hardware wallets.

Hyperledger

Hyperledger is an ecosystem of open-system tools, libraries, and products designed to enable and support enterprise-grade blockchain technology. In general, the products focus on creating solutions for permissioned blockchains–that is, non-public blockchains, with alternative consensus mechanisms other than Proof of Work (PoW) or Proof of Stake (PoS).That said, there are use cases where such institutions would want to integrate with public blockchains, and for that reason Hyperledger Besu and Hyperledger Burrow are actively developed projects, the former being a Java-based Ethereum client, the latter being a smart contract platform which supports EVM bytecode.

I

ID Wallet / Digital Identity Wallet
A Digital Identity Wallet (DIW) is an application that allows the secure storage, management, and sharing of personal identification data, credentials and other pieces of information, often called “attributes”, relating to the owner of that virtual wallet. Think of it as a digital version of your physical wallet, but instead of holding tangible items like cash or credit cards, it holds digital attributes. Digital identity wallets can exist in various forms, including mobile apps, browser extensions, or even dedicated hardware devices.immutability

The inability to be altered or changed. This is a key element of blockchain networks: once written onto a blockchain ledger, data cannot be altered. This immutability provides the basis for commerce and trade to take place on blockchain networks.

Infura

Part of Consensys, Infura offers backend access to the Ethereum network over established HTTP and WebSockets technology. Prior to Infura, developers were obligated to run their own nodes of the networks with which they wanted to interact; Infura provides that access through a set of APIs. This enables developers of dapps and websites seeking to interact with the Ethereum blockchain to do so, and at scale.

ICO

An Initial Coin Offering (also called ICO) occurs when a new token project sells advance tokens in exchange for upfront capital. These have been a vehicle for fraud and scams, and as such are subject to ever-evolving regulation and legislation.

internal transaction

An internal transaction on the Ethereum network is one that occurs between smart contracts, rather than between addresses. Notably, they are not included on the blockchain, and therefore do not incur gas fees, but they are often crucial to carrying out the action in question, and can be viewed on Etherscan. For more detail, see MetaMask’s article on the topic.

InterPlanetary File System (IPFS)

A decentralized file storage and referencing system for the Ethereum blockchain, and the internet as a whole. IFPS is an open source protocol that enables storing and sharing hypermedia (text, audio, visual) in a distributed manner without relying on a single point of failure. This distributed file system enables applications to run faster, safer and more transparently.

ISSUER

In a verifiable credential system, an issuer is the party that creates and provides the credential to a holder. A holder can be a person, organization, device, or object. Issuers can be businesses, organizations, or individuals. 

J
JSON-RPC

JSON-RPC is, quite simply, a method used to move data around computer systems, and predates public blockchain technology. It was chosen as a standard for moving data between blockchain networks and Internet browsers and wallets, with the result that these networks have come to be called ‘RPC networks’, despite JSON-RPC not being their defining technical feature.

K

keystore file

A keystore file is a special, encrypted version of a private key in JSON format. See also ‘private key’.

Know Your Customer (KYC)

A process in which a business must verify the identity and background information (address, financial details, etc.) of their customers. For example, current regulations and laws require banks and other financial institutions to keep and report customers’ personal information and transactions.

L

Layer 2

A Layer 2 network, or L2, is a blockchain that is built specifically to scale another network. For a full understanding of how this is achieved, see here. Some popular examples of this in the Ethereum ecosystem are Arbitrum, Optimism, and StarkNet. These chains are specifically built to handle a large number of transactions quickly by relying on Ethereum Mainnet for security functions, while optimizing for speed and scale. These networks are considered “scaling solutions” while not being part of Ethereum’s protocol-level scaling efforts. See also “blockchain trilemma”, “modular blockchain”, “Serenity”. Contrast with “sidechain”.

light client

In computing, a ‘client’ is a software that runs or accesses a program made available by a remote computer. With blockchain networks, then, clients are the programs that sync blockchain data and participate in network consensus.A light client downloads only a small part of the blockchain, allowing users of low-power or low-storage hardware like smartphones and laptops to maintain almost the same guarantee of security as a full node, despite only downloading part of the entire network state.

Liquid Democracy (Delegative Democracy)

A government system where votes can be delegated or proxied to other individuals such as friends, politicians, or subject matter experts. For example, in a liquid democracy, Bernadette could give Ahmad her vote and Ahmad would then vote for both himself and Bernadette. Liquid democracy is used at times as a governance mechanism for Decentralized Autonomous Organizations (DAOs) wherein every participant is able to vote or delegate their vote to another individual.

liquidity

An asset is considered more ‘liquid’ if it can easily be converted into cash, and therefore, ‘liquidity’ refers to the availability of assets to a company or market. Conversely, the harder it is to turn an asset into cash, the more illiquid the asset. For example, stocks are considered relatively liquid assets, as they can be easily converted to cash while real estate is considered an illiquid asset. The liquidity of an asset affects its risk potential and market price.

M

mainnet

The primary network where actual transactions take place on a specific distributed ledger. For example, The Ethereum Mainnet (capitalized in this case) is the public blockchain where network validation and transactions take place.

market cap

Short for ‘market capitalization’, this refers to the total value held in a particular industry, market, company, or asset. For a publicly traded company, the market cap is the total dollar market value of a company’s outstanding shares. For Bitcoin or Ethereum, the total market cap is a reflection of the current existing supply times the market price.

Maximal Extractable Value (MEV)

Originally known as Miner Extractable Value, MEV is a broad complex topic that refers to the inclusion, exclusion, and reordering of transactions within a block in order to extract more value from it, generally in excess of what a validator (or miner, on PoW networks) would earn from producing the block. MEV includes activities such as frontrunning, arbitrage, and what could be considered malicious actions to profit off of other users’ transactions. This is a very active topic of research that is changing rapidly.

memory pool

Often abbreviated as “mempool”. See “transaction pool”.

Merge, the

Finalized in September 2022, the Merge was the culmination of years of work involved in transitioning Ethereum from a Proof of Work consensus model, to Proof of Stake, all while keeping the network live. This was successful, and reduced the network’s carbon footprint by more than 99.9%.

Merkle Patricia trie

Often referred to simply as a “Merkle trie” (pronounced “tree”), a Merkle Patricia trie is a data structure in which a single hash code function (see ‘hash’) splits into smaller branches. In a similar way to a family tree, where a parent branch splits into child branches, which are then extrapolated into grandchild branches, a Merkle Patricia trie keeps a record of the filiation and history of each element. This type of data structure enables for faster verification on a blockchain network.

Mesh

Consensys Mesh is a network of loosely coupled, tightly aligned teams, products, and investments advancing the Ethereum ecosystem and the arrival of web3.

MetaMask

MetaMask, either in its mobile app form on iOS and Android, or in its browser extension form, is a tool to access and interact with blockchains and the decentralized web. It allows users to manage their digital identity and the permission of others to interact with that identity; its functions include that of a wallet, a dapp permissions manager, and access to token swaps. It is an open-source project that encourages developers from other projects to build on top of it through MetaMask Snaps.

mining

The process by which blocks or transactions are verified and added to a blockchain using a Proof of Work (PoW) consensus mechanism. In order to verify a block, a miner must use a computer to solve a cryptographic problem. Once the computer has solved the problem, the block is considered “mined” or verified. On Bitcoin or other PoW blockchains, the first computer to mine or verify the block receives bitcoin, or the equivalent network token, as a reward.

mnemonic phrase

This is an alternative way of referring to a Secret Recovery Phrase, also known as a ‘seed phrase’: a series of words that correspond to a very long cryptographic key, used to generate and control all the addresses of a crypto wallet.

modular blockchain

Bitcoin is an example of a monolithic blockchain: all of the functions of the network (consensus, execution, data availability, and settlement) are run on one chain. This has significant drawbacks (see “blockchain trilemma” for more). A modular blockchain, on the other hand, separates some or all of these functions into separate chains, each one optimized for its specific function, and relying on the other chains for the other functions.Ethereum is currently moving towards modularization, both on a protocol level beginning with the Merge, which split consensus and execution into two chains, and at the level of “Layer 2” networks which provide optimized execution environments, and then “roll up” their data to Ethereum for its consensus functionality.

multi-signature wallet (multisig)

A crypto-asset wallet which requires multiple keys in order to access and transact. Typically, a specified number of individuals are required to approve or “sign” a transaction before they are able to access the wallet. This is different from most wallets, which only require one signature to approve a transaction.

N

node (full node)

Public blockchains consist of a network of computers which sync the network’s data, coordinate transaction requests, and participate in consensus regarding the validity of those transactions; each one of these computers is called a ‘node’. A full node is a computer that can fully validate transactions and download the entire data of a specific blockchain. In contrast, a “lightweight” or “light” node does not download all pieces of a blockchain’s data, and uses a different validation process.

NFT

When discussing Non-Fungible Tokens (NFTs), “fungibility” refers to an object’s ability to be exchanged for another. For example, an individual dollar is considered fungible, as one dollar is fully interchangeable with another. Artwork is usually deemed non-fungible, as paintings or sculptures are likely to be unequal between them in quality, value, or other attributes. A non-fungible token is a type of token that is a unique digital asset and has no equal token. This is in contrast to cryptocurrencies like ether that are fungible in nature.

NFT aggregator

In the initial wave of interest in buying and selling NFTs, a number of NFT marketplaces–websites where you can buy and sell NFTs–were created. As the market matured, aggregators appeared, which offer the user the ability to view available stock and price, buy, and sell across marketplaces from a single unified application. Similar to familiar web2 shopping portals, these have come to be known as NFT Marketplace Aggregators, or just NFT Aggregators.

nonce

The word ‘nonce’ has a few different meanings, and in different contexts, it ends up getting used a lot of different ways. Originally formed from a contraction of a phrase meaning “not more than once”, on the Ethereum Mainnet, “nonce” refers to a unique transaction identification number that increases in value with each successive transaction in order to ensure various safety features (such as preventing a double-spend). Note that due to its broader use in cryptography, you may encounter ‘nonce’ being used differently on other sidechains or decentralized projects.

O

ommer block

Under the Proof of Work (PoW) consensus mechanism, miners received rewards for being the first to mine a new block. However, at times a block would be mined just after, and in competition with, the last block. This block, known as an ommer and previously as an uncle, could get rolled into subsequent blocks and the miner of the original ommer would get a partial block reward. All of this functionality was deprecated as of the launch of the Beacon Chain.

on-ramp, off-ramp

Based on a metaphor from the American highway system, “on-ramp” refers to a tool, or a service provider, or the action, of converting fiat currency into tokens on a blockchain. Conversely, “off-ramp” refers to exchanging on-chain assets for their value in a given fiat currency. There are many providers of such services, and MetaMask users have access to them through the “Buy Crypto” feature.

optimistic rollup

A rollup that assumes the validity and good faith of transactions, and only runs a fraud proof in the case of fraud being alleged. See also ‘rollup’.

Oracle

Typically, an oracle is any entity or person that is relied on to report the outcome of an event. In a blockchain network an oracle (human or machine) helps communicate data to a smart contract, which can then be used to verify an event or specific outcome.

P

P2P (peer-to-peer)

P2P refers to interactions that happen directly between two parties, usually two separate individuals, and have been present in Internet technology in different ways for some time. These interactions are often coordinated through some sort of app or network, which can consist of any number of individuals. Public blockchains can be considered to have a high degree of P2P functionality, as individuals are able to transact or interact with each other without relying on an intermediary or single point of failure.

parity

In a general sense, to say that something ‘has parity’ with another thing means ‘equal in features or other important quality’, and is a phrase often used by software developers and computer scientists.Parity Technologies is the name of a blockchain technology company that is developing a number of significant projects in the blockchain space. One of its first projects was an Ethereum client, known as Parity; its name was changed to Parity Ethereum, and then was spun out as a DAO-owned and operated project called Open Ethereum, which has also been deprecated. See also ‘client’.

permissioned ledger

A blockchain network in which access to ledger or network requires permission from an individual or group of individuals, as opposed to a public blockchain. Permissioned ledgers may have one or many owners. Consensus on a permissioned ledger is conducted by the trusted actors, such as government departments, banks, or other known entities. Permissioned blockchains or ledgers contain highly-verifiable data sets because the consensus process creates a digital signature, which can be seen by all parties. A permissioned ledger is much easier to maintain and considerably faster than a public blockchain. For example, Quorum or Hyperledger Besu are permissioned ledgers that can be more easily set up for large enterprises. In contrast, the public Ethereum blockchain is a permissionless ledger which anyone can access.

Plasma

‘Plasma’ is a term that is used to refer to one of the solutions being built and deployed in order to securely scale the Ethereum network. A Plasma network functions similarly to an optimistic rollup, inasmuch as it relies on Ethereum Mainnet to maintain the record of transactions, and as the source for arbitration or fraud resolution. However, a Plasma network differs in other important technical ways from rollups, and is currently limited to simple operations, such as swaps and token transfers. More technical information is available here.

PoA, PoS, PoW

Acronyms standing for Proof of X consensus mechanisms: Authority, Stake, Work. The “o” is lowercase since you wouldn’t capitalize “of” when writing out the phrase. See also ‘consensus’, ‘Proof of Authority’, ‘Proof of Stake’, ‘Proof of Work’.

PoS/PoW Hybrid

A hybrid consensus model that utilizes a combination of Proof of Stake (PoS) and Proof of Work (PoW) consensus. Using this Hybrid consensus mechanism, blocks are validated from not only miners, but also voters (stakeholders) to form a balanced network governance.

private blockchain

A blockchain or distributed ledger that has a closed network wherein participants are controlled by a single entity. A private blockchain requires a verification process for new participants. A private blockchain may also limit which individuals are able to participate in consensus of the blockchain network. See also ‘permissioned ledger’.

private currency

A currency or token issued by a private individual or firm. Typically, the token or currency is limited to use within the network of that particular firm or individual. This is not to be confused with a “privacy cryptocurrency”, which are cryptocurrencies with specific privacy features, such as hidden user identities.

private key

A private key is an alphanumeric string of data that, in MetaMask, corresponds to a single specific account in a wallet. Private keys can be thought of as a password that enables an individual to control a specific crypto account. Never reveal your private key to anyone, as whoever controls the private key controls the account funds. If you lose your private key, then you lose access to, and control over, that account.

Proof of Authority (PoA)

A consensus mechanism used in private blockchains, granting a single private key the authority to generate all of the blocks or validate transactions.

Proof of Stake (PoS)

A consensus mechanism in which an individual node, or “validator”, validates transactions or blocks. Validators lock up a certain amount of cryptocurrency, such as ether, into a ‘stake’, in order to be able to participate in consensus. If the node validates a block (group of transactions) correctly, then the validator receives a reward. Conversely, if the validator behaves poorly by validating incorrect transactions or by not maintaining sufficient network connectivity, the cryptocurrency they staked can be ‘slashed’, or taken from them and put out of circulation (‘burned’). PoS requires a negligible amount of computing power compared to Proof of Work consensus.

Proof of Work (PoW)

A consensus mechanism in which each block is ‘mined’ by one of the nodes, or a group of nodes, on the network. The computational process involved in committing a series of transactions into a block on the network, known as ‘hashing a block’, is technically quite simple, and therefore subject to attack. Under PoW, each miner must solve a math problem to find a set, difficult variable in order to be able to propose their block to the network as the next to be ‘mined’. In effect, the process of hashing each block becomes a competition. This addition of solving for a target increases the difficulty of successfully hashing each block, and consequently the security of the network.For each hashed block, the overall process of hashing will have taken some time and computational effort. Thus, a hashed block is considered Proof of Work, and the miner that successfully hashes the block first receives a reward, in the form of cryptocurrency. PoW is singificantly more energy-intensive than other consensus mechanisms, such as Proof of Stake.

protocol

Formally speaking, a ‘protocol’ is a set of rules governing how a process is carried out. This concept is used throughout public blockchain networks and web3 to refer to the way smart contracts execute their functionality in the same way regardless of the user. The products or services built on top of smart contracts are often referred to as ‘protocols’ by extension.

public blockchain

A globally open network wherein anyone can participate in transactions, participate in the consensus protocol to help determine which blocks get added to the chain, maintain and examine the contents of the chain.

public key

Public blockchain networks are just that: public. Their data is accessible and readable by anyone. In order to have any degree of usability when it comes to allowing users to do some things, like send transactions, but not others, like steal other peoples’ tokens, cryptographic technology is used. In particular, a design paradigm known as ‘public/private key pairs’ is employed to ensure users can interact with others on the network as they wish, while keeping their own account secure.These key pairs consist of two long strings of alphanumeric characters. A public key can be derived mathematically from its corresponding private key, but the inverse is not true: it is mathematically impossible to derive a private key from its corresponding public key. This allows, for example, users to have a public wallet address that anyone can use to send them tokens, with the peace of mind that as long as they properly keep the corresponding private key safe, those tokens cannot be stolen. See also ‘private key’.

R

relayer

In the field of Decentralized Finance (DeFi), a relayer is any party or entity which hosts an off-chain orderbook. Relayers help traders discover counter-parties and cryptographically move orders between them. 0x is an example of a popular Ethereum relayer protocol.

Reusable ID / Reusable Identity

In the field of Decentralized Finance (DeFi), a relayer is any party or entity which hosts an off-chain orderbook. Relayers help traders discover counter-parties and cryptographically move orders between them. 0x is an example of a popular Ethereum relayer protocol.

rollups

Rollups (pronounced “roll ups”) are one element in the set of tools and infrastructure being built as scaling solutions for the Ethereum network. They consist, in general, of networks which prioritize their ability to compute transactions and smart contract functionality, and then ‘roll up’ those transactions to Ethereum Mainnet for secure verification of their validity. There are different ways of approaching this problem from a technical point of view, namely Zero Knowledge, or ZK, rollups, and Optimistic rollups. Arbitrum and Optimism are prominent examples. See the entries on both of these types of rollup for more, and more in-depth discussion here.

RPC

The Remote Procedure Call is a technology that is used to transfer data between endpoints. You may often see it referred to as JSON-RPC, which is its full name; see ‘JSON-RPC’ for further details.

rug pull

Similar to the traditional financial scam of a pyramid scheme, a ‘rug pull’ is a cryptocurrency or crypto-token based scam in which the creators of the token create hype, through injecting liquidity into their token, airdropping, and other schemes, and once investors pile in and boost the price of the token up to a certain point, the creators liquidate their (generally majority) share of the tokens, leaving their investors with next to nothing.

S

Satoshi Nakamoto

A pseudonymous individual or entity who created the Bitcoin protocol, solving the digital currency issue of the “double spend.” Nakamoto first published their white paper describing the project in 2008, and the first Bitcoin software was released one year later.

scalability

A change in size or scale to handle a network’s demands. This word is used to refer to a blockchain project’s ability to handle network traffic, future growth, and capacity in its intended application.

Seed (phrase) / Secret Recovery Phrase

The seed phrase, mnemonic, or Secret Recovery Phrase is a crucial part of public blockchain technology, originally created for Bitcoin, and goes by many names. However, they all refer to a set of ordered words which correspond to determined values. These values never change, and therefore the same string of words in the same order will always produce the same number–this is the underlying functionality that allows seed phrases to back up wallets. This is also where the name ‘hierarchical deterministic wallets’ comes from, as all the accounts in a given wallet are deterministically created from the seed phrase, and they are hierarchically controlled by it.A Secret Recovery Phrase is exactly what it sounds like: something that is secret, and should be known only to the owner of the account. If the seed phrase is given to someone else, that person has complete control over the account; they can drain it of tokens and funds, execute transactions with it, etc.

self-executing

Functioning by itself, not controlled by any other party other than itself. Self-executing smart contracts cut costs and overhead by removing the need for an arbitrator and trust toward a third party. See also ‘protocol’.

Serenity

The Ethereum network is working on a series of technical upgrades that will allow massive increases in transaction throughput, amongst other things. The plan that outlined these changes was originally referred to as ‘Serenity’, although that name has become less popular, in favor of specific descriptions of the upgrades themselves.

serialization

The process of converting a data structure into a sequence of bytes. Ethereum internally uses an encoding format called recursive-length prefix encoding (RLP).

sharding

Sharding, in public blockchains, refers to splitting an entire network into multiple portions, called “shards.” Each shard would contain its own independent state, meaning a unique set of account balances and smart contracts. Sharding is currently being investigated and developed as one of the set of tools and solutions for scaling Ethereum.

sidechains

A ‘sidechain’ refers to a chain that is connected to another (most often, to Ethereum) through a bridge, allowing assets to be transferred between them. In contrast to a Layer 2 network or a rollup, a sidechain is a full blockchain network in and of itself, and does not rely on Ethereum for consensus. It therefore must be evaluated independently in terms of its security, stability, and other features. See also “blockchain trilemma”, “modular blockchain”.Note: Bridges exist for good reason; sending tokens from a sidechain to Ethereum mainnet or vice versa would result in token loss.

slashing condition

Under a Proof of Stake (PoS) consensus mechanism, a slashing condition is one that causes the validator’s deposit to be destroyed when they trigger it. See also ‘Proof of Stake’.

slot

A slot, under Ethereum Proof of Stake consensus, is a 12-second period of time during which a new block may (or may not) be proposed. Every 32 slots comprise an epoch. See also ‘epoch’.

smart contracts

Smart contracts are programs that have been published on a public blockchain, and can be used by anyone. While they often contain agreements or sets of actions between parties that emulate a traditional legal contract, they are not, in and of themselves, legal documents. Smart contracts are automated actions that can be coded and executed once a set of conditions is met, and are the dominant form of programming on the Ethereum Virtual Machine.

soft fork

A change to the blockchain protocol resulting in only previously valid blocks and transactions being made invalid. Since old nodes will recognize the new blocks as valid, a soft fork is backward-compatible. However, this can result in a potential divide in the blockchain, as the old software generates blocks that read as invalid according to the new rules. Contrast with ‘hard fork’; for more basic information regarding forks, see ‘fork’.

Solidity

The programming language developers use to write smart contracts on the Ethereum network. Try it out on Remix. See also ‘smart contract’.

stablecoin

A cryptocurrency whose value has been ‘pegged’ to that of something considered a ‘stable’ asset, like fiat currency or gold. It theoretically remains stable in price, as it is measured against a known amount of an asset which should be less subject to fluctuation. Always spelled as one word.

staking

On the Ethereum Proof of Stake network, those wishing to participate in consensus must first lock up, or ‘stake’, 32 ETH into a smart contract; this ETH may be ‘slashed’ (taken from them and ‘burned’, put out of circulation) in the event that their validator behaves maliciously or does not meet performance requirements. Similar Proof of Stake mechanisms are in operation on other networks, as well.Although this is the canonical meaning of the word, similar actions taken at the level of a decentralized exchange (DEX) or another dapp are often called ‘staking’, though it would probably be more accurate and descriptive to just call this ‘locking up tokens’.

state

The set of data that a blockchain network strictly needs to keep track of, and that represents data currently relevant to applications on the chain.

state channels

State channels are part of the set of tools and platforms involved in scaling Ethereum. While a complex topic, state channels are essentially methods through which the current ‘state’ of the blockchain can be exported, and then based on that, any given number of transactions can take place off-chain, and then be moved back onto the main Ethereum chain.

swap

As the number of different blockchain projects and tokens has proliferated, the system by which users exchange one token for another has come to be known as swapping, and the individual action, a swap. Within MetaMask, users have access to a powerful aggregator showing them information about swaps across the ecosystem, this is MetaMask Swaps.

szabo

A denomination of ETH. See also ‘ether (denominations)’.

T

testnet

A testnet is a blockchain network that mirrors, as closely as possible, the current conditions of a corresponding ‘main’ network. Testnets are used by developers to verify that their smart contracts and other functionality work as intended, before permanently recording their code to a live blockchain network (and often spending significant gas fees in the process!).Tokens minted on testnets are not transferrable for their equivalent value on mainnets.

Testnet Kovan

An Ethereum testnet that uses Proof of Authority consensus, available through MetaMask; website here.

Testnet Rinkeby

An Ethereum testnet that uses Proof of Authority consensus, available through MetaMask; faucet here. Following the transition to Proof of Stake, Rinkeby scheduled its deprecation for the end of 2023.

Testnet Ropsten

An Ethereum testnet that used Proof of Work, and, following the transition to Proof of Stake, was deprecated.

token

A token represents an asset issued on an existing blockchain; the transfer of tokens and the addresses that currently hold them are the subject of the network’s consensus activities. There are many types of tokens; see also ‘ERC-20’ and ‘ERC-721’ entries.

Total Value Locked (TVL)

Total Value Locked, or TVL, is a common expression used in many contexts across the crypto ecosystem, so it’s important to pay attention to the specifics. In general, it refers to how much value, in tokens, has been deposited into something.Most often, it refers to a protocol, which is an application on the blockchain, or a set of protocols. For example, a decentralized token trading platform might have a series of liquidity pools, which are protocols enabling swaps between tokens, and the platform may quote the “TVL” for all the pools combined. Alternatively, if a network uses proof of stake for their consensus mechanism, they may represent the TVL of all the tokens staked into that consensus protocol.

transaction block

A collection of transactions on a blockchain network, gathered into a set or a block that can then be hashed and added to the blockchain. See ‘hash’.

transaction fee

A small fee imposed on transactions sent across a blockchain network. These fees are used to pay network validators or miners for their participation in consensus, and thus ensure that a blockchain network is self-sustaining.

transaction pool

When a user submits a transaction to the Ethereum network–or many other networks based on Ethereum–the transaction goes into what’s known as a “transaction pool”, or “txpool” for short. This is essentially a queue of transactions that are waiting to be added to a block and recorded to the blockchain. There are mechanisms that determine which transactions are “picked up” and included in the next block, and there is currently a lot of research surrounding how this decision gets made (see “MEV”). In Bitcoin, the transaction pool is referred to as the “memory pool”, or “mempool”, and often these terms are used interchangeably.

 

Trust Triangle
The relationship between the issuers, holders, and verifiers is called the trust triangle simply because you need an element of trust among these entities for them to work together. Also, this term is typically used to convey human relationships in the digital world. The party verifying these credentials can check authenticity and validity without informing or consulting the issuer of the credentials, hence safeguarding the sovereignty of the holder.
trustless

‘Trustless’ is a term that gets used a lot in the decentralized web, and it deserves some explanation.Traditionally, to call something ‘trustless’ would sound like a negative thing. In the context of decentralized technology, it has a more technical meaning: since everyone has a copy of the ledger of all transactions ever executed, there is no need for a centralized entity that ‘must be trusted’ as the source of truth. With public blockchain networks, data isn’t kept on some centralized server somewhere that could be hacked or changed arbitrarily; anyone can verify the transactions themselves. This is why the term ‘trustless’ was coined: there is no need for trust, although, in a way, the rules and assurances built into the blockchain provide the basis for greater trust between people, because the system is guaranteed to work the same for everyone.

Turing-complete

Any machine that can calculate on a level equal to a programmable computer is Turing-complete, or computationally universal. The Ethereum Virtual Machine, which processes smart contracts and transactions, is Turing-complete, despite not existing on a single physical computer.

V

validator

A participant in Proof of Stake (PoS) consensus. On Ethereum’s Proof of Stake network, validators need to stake 32 ETH in order to get included in the validator set. See also ‘staking’.

validity proof

The proof submitted along with certain types of rollups to prove that the transactions are valid. See also ‘rollups’.

Validium

One of the technologies developed for scaling of the Ethereum network; see more here.

W

Wallet

In Ethereum-based blockchain technology, a ‘wallet’ is a something that allows you to manage private keys, your Secret Recovery Phrase, and the accounts generated from it. This could be an internet-connected ‘hot wallet’, like MetaMask, or an ‘airgapped’ hardware wallet. In more technical speak, you could say “the wallet is the client, not the keys.”It is very common for people to use the word ‘wallet’ to refer to their SRP itself, or the accounts generated from it, or even to one account.

web3 / Web 3.0

Web3, or Web 3.0, are terms used synonymously with “the decentralized web” and are often used to refer, broadly, to the blockchain and decentralized technology ecosystems and communities as a whole.

Z

zk-SNARKs

Zero-Knowledge Succinct Non-interactive ARguments of Knowledge are an incredible technology, and vital to the scaling of blockchain technology and the decentralized web. They are mathematically complex and can be daunting; this explanation from the Ethereum Foundation is a good primer.

zero address

The Zero Address is an address on the Ethereum network that is the recipient of a special transaction used to register the creation of a new smart contract on the network.

#

51% Attack

If more than half the computer power or mining hash rate on a network is run by a single person or a single group of people, then a 51% attack is in operation. This means that this entity has full control of the network and can negatively affect a cryptocurrency by taking over mining operations, stopping or changing transactions, and double-spending coins.

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

DAO

A Digital Decentralized Autonomous Organization (DAO, pronounced like the Chinese concept) is a powerful and very flexible organizational structure built on a blockchain.Alternatively, the first known example of a DAO is referred to as The DAO. The DAO served as a form of investor-directed venture capital fund, which sought to provide enterprises with new decentralized business models. Ethereum-based, The DAO’s code was open source. The organization set the record for the most crowdfunded project in 2016. Those funds were partially stolen by hackers. The hack caused an Ethereum hard-fork which lead to the creation of Ethereum Classic.

DApp or Decentralized Application (noun)

A software application that runs on a distributed network. It’s not hosted on a centralized server, but instead on a peer-to-peer decentralized network.