Web3 Glossary

Glossary

List of terms and definitions to help you get started in Web3.


0-9

51% attack

A condition in which more than half the computing power of a cryptocurrency network is controlled by a single malicious miner or group of miners. If he controls 51% of the network that makes him the authority on the network, giving him the power to spend the same coins multiple times, issue transactions that conflict with someone else’s or stop someone else’s transaction from being confirmed

A

Abstract

An abstract is defined as a summary of a larger written written document. Abstracts are common in the beginning cryptocurrency technical documents to briefly describe the entire document.

Account

An account is access to a computer, website or software that allows users to use the tools located within. Access is usually gained through a username and password but with cryptocurrencies, it is often done with what is known as a private key.

Addresses (Cryptocurrency addresses)

Used to receive and send transactions on the network. An address is a string of alphanumeric characters, but can also be represented as a scannable QR code.

Agreement ledgers

Distributed ledgers used by two or more parties to negotiate and reach agreement.

Airdrop

An airdrop is the process of freely distributing a new cryptocurrency to people hopefully creating more demand. When a new cryptocurrency is created, it needs to gain users. One way of doing this through an airdrop. The group issuing the airdrop hopes new users will begin researching and sharing the coin creating more demand. To start an airdrop, the crypto group will often find people who already have another cryptocurrency and identify them as being equipped with wallets that can accept these airdropped coins. Their other option is to have people voluntarily complete a form where they will then receive their coins. NOTE: Beware of any website that asks for your private keys. DO NOT share your private keys with anyone unless you trust them with your money!

Algorithm

An algorithm is a series of steps that will solve a problem. In cryptocurrencies, algorithms are used to hide and reveal information.

Altcoin

An abbreviation of “Bitcoin alternative”. Currently, the majority of altcoins are forks of Bitcoin with usually minor changes to the proof of work (POW) algorithm of the Bitcoin blockchain. The most prominent altcoin is Litecoin. Litecoin introduces changes to the original Bitcoin protocol such as decreased block generation time, increased maximum number of coins and different hashing algorithm

Anonymous

Anonymous is something made or done by an unknown person or group. Compare this definition with “pseudonymous” which means acting or done under a false name.

Application-Specific Integrated Circuit (ASIC)

Application-Specific Integrated Circuit is commonly known as ASIC. “Integrated circuit” is just a computer chip. “Application-specific” means it was built for one specific purpose or computer application. An ASIC is used in cryptocurrencies to help record transactions on the digital record or blockchain. This process is known as mining.

Atomic Swap

Atomic Swap is technology that allows two different people to exchange different cryptocurrencies directly. Right now, if you wanted to exchange bitcoin for ethereum, with another, you couldn’t. However, any coin using Atomic Swap can be exchanged for any other coin also using Atomic Swap.

Attestation Ledgers

Distributed ledgers that provide a durable record of agreements, commitments or statements, providing evidence (attestation) that these agreements, commitments or statements were made.

B

Brute Force Attack (BFA)

Brute Force Attack is a method of obtaining secret, unreadable information by guessing at every single possible key that will unlock the security system.

Byzantine Generals’ Problem (BGP)

Byzantine Generals’ Problem describes a situation where spread out units need to coordinate their behavior or action but cannot trust each other to get organized.

Bit

A bit is the smallest unit of digital, computerized information represented as either a 0 or 1. But bit also refers to a very small amount of bitcoin, specifically, one-millionth of a bitcoin or 0.00000100 bitcoin.

Bitcoin

A well known cryptocurrency, based on the proof-of-work blockchain.

Block

A block is simply a recording of information. Blockchain is revolutionary technology for creating permanent, secure digital recordings. It can record any information, but it started with recording transactions. If you imagine the blockchain as a book of records, then each page in that book is what is known as a “block”. Blocks are attached to each other making what is known as the blockchain.

Block ciphers

A method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of data at once as a group rather than to one bit at a time.

Block explorer

A block explorer is a search engine that allows users to easily look up, confirm, and validate transactions that have taken place on a Blockchain. Block explorers can serve as blockchain analysis and provide information such as total network hash rate, coin supply, transaction growth, etc.

Block height

Block height is the number of blocks in the chain between the one you are looking at and the very first block in the blolckchain. Blockchain is revolutionary technology for creating permanent, secure digital recordings. It can record any information, but it started with recording transactions. Imagine the blockchain as a book of records where each page in that book is what is known as a “block”. Blocks are attached to each other making what is known as the blockchain. The first block in a blockchain is known as the genesis block.

Block reward

An amount of crypto-currency a miner receives for processing transactions in a given block. Because creating (or “mining”) blocks is so crucial to the security of the Bitcoin network and yet so hard, the Bitcoin protocol includes a mechanism to encourage people to mine: every time a block is added, the miner who found the block is given 12,5 BTC(this number will change at the next halving in 2020) as a block reward

Blockchain

Blockchain is technology for creating permanent, secure digital recordings that don’t rely on any single person or group. Blockchains can record any information, though the first example was created to record bitcoin transactions.

Blockchain Wallet

A blockchain wallet is a digital wallet that allows users to store and manage their Bitcoin, Ether, and other cryptocurrencies. A blockchain wallet allows transfers in cryptocurrencies and the ability to convert them back into a user’s local currency. By installing, managing, and funding a blockchain wallet you will be able to deploy and manage transactions on the Hyperverse.

Breaking

Breaking is the process of finding a weakness in the system that made information unreadable and secret so the data becomes easier to expose. There are different levels of breaking, where a full break allows you immediate access to the hidden information, partial breaks don’t give you immediate access, instead they make it quicker and easier for you to unlock the information.

Brute Force Attack

Brute Force Attack is a method of obtaining secret, unreadable information by guessing at every single possible key that will unlock the security system.

BTC

Bitcoin was one of the first digital cash, and definitely the one that started the cryptocurrency movement. It was created in 2009 by an unknown person or group who went by the name, Satoshi Nakamoto.

C

Central ledger

A ledger maintained by a central agency.

Centralized

Centralized describes a system or organization that is controlled by one person or group. Companies are centralized organizations.

Cipher

A cipher is any series of steps that will make information unreadable so it can be kept secret and can be used to make the information readable again. Ciphers including those used in cryptocurrencies also use a secret key made up of letters and numbers that must be used to unlock the cipher.

Ciphertext

Ciphertext is text that has been made unreadable so the information it contains can be kept secret.

Circulating Supply

Circulating supply is the number of coins currently available and in the hands of people. Coins that are locked, reserved or not able to be sold and traded are not included in the circulating supply.

Client

A software program a user executes on a desktop, laptop or a mobile device to launch an application

Cloud Mining

Classical cryptocurrency mining requires huge investments in hardware and electricity. Cloud mining companies aim to make mining accessible to everybody. People just can log in to a website and invest money in the company which already has mining datacenters. The money is managed by the company and it is invested in mining equipment. Investors get a share of the revenue. The disadvantage for the user is that cloud mining has low returns compared to traditional mining.

Coin

A coin is a unit of digital value. When describing cryptocurrencies, they are built using the bitcoin technology and have no other value unlike tokens which have the potential of software being built with them.

Cold Storage

Cold storage describes digital data that has been stored with the purpose of keeping it very safe and secure. There are many ways to do this but the common techniques include: putting it in an unplugged computer or specially designed and secure USB known as a “hardware wallet”, or by storing the access codes on a piece of paper. As a side effect of cold storage, the data is rarely ever accessed.

Confirmation

Means that the blockchain transaction has been verified by the network. This happens through a process known as mining, in a proof-of-work system (e.g. Bitcoin). Once a transaction is confirmed, it cannot be reversed or double spent. The more confirmations a transaction has, the harder it becomes to perform a double spend attack.

Consensus

Consensus is defined as agreement from the majority of people about something.

Consortium blockchains

A consortium blockchain is a blockchain where the consensus process is controlled by a pre-selected set of nodes; for example, one might imagine a consortium of 15 financial institutions, each of which operates a node and of which ten must sign every block for the block to be valid. The right to read the blockchain may be public or restricted to the participants. There are also hybrid routes such as the root hashes of the blocks being public together with an API that allows members of the public to make a limited number of queries and get back cryptographic proofs of some parts of the blockchain state. These blockchains may be considered “partially decentralized”

Core Wallet

A core wallet contains the entire blockchain as opposed to a piece of it and allows users to not only receive, store and send digital money but also program on or with it. Bitcoin transactions are kept on a digital record, known as the blockchain, and the blockchain is maintained by thousands of people around the world. This digital record is growing larger every day and in 2016, it exceeded 100 gigabytes. A wallet is software that interacts with the network of recordings (blockchain) and lets users receive, store, and send their digital money.

Crypto

Crypto is short for cryptography or cryptocurrency. Crypto- comes from the Greek word meaning “hidden”.

Cryptocurrency

Cryptocurrency is an electronic money created with technology controlling its creation and protecting transactions, while hiding the identities of its users.

Cryptographic Hash Function

The cryptographic hash function is a mathematical algorithm that takes a particular input which can be any kind of digital data be it a password or jpeg file and produces a single fixed length output. Some examples of different hash function algorithms are MD5, MD4 or SHA256. The last one is used in the Bitcoin protocol. Main properties: (1) easy to compute hash value for any given message (2) infeasible to generate a message from its hash except by trying all possible input combinations(brute force attack) (3) infeasible to modify a message without changing the hash (4) infeasible to find two different messages with the same hash (5) deterministic so the same message always results in the same hash. Cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes (MACs), and other forms of authentication. They can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption

Cryptography

Cryptography is the study of making information unreadable so it can be kept secret. There are many types of cryptography including hiding words in images, using micro dots and computer programs. With cryptocurrencies, we hide money and the people who sent them in a scrambled, unreadable form. The information can be unlocked and made readable using a code also known as a key. The key is made up of a string of letters and numbers.

Currency

Currency is a system and its units for exchanging value. The value of each unit is agreed to be worth something. Currency is used to pay for things and services as well as debts. The history of the word currency comes from current, meaning in use now. Currency is usually in use now because the government or banks produced it and we all agree it has value.

D

Directed Acyclic Graph (DAG)

A directed acyclic graph or DAG is a structure that is built out in one single direction and in such a way that it never repeats. Here a “graph” is simply a structure of units. “Directed” describes the connection between each unit in the structure, and that they all flow the same way. And “acyclic” means describing something that is not circular or repeating.

Decentralized Autonomous Organization (DAO)

Decentralized Autonomous Organizations also DAO describe leaderless organization supported by a network of computers. To be decentralized, it must have no central location because it is running on a network of computers. And because there is no single leader and has its own rules to follow, it is autonomous, or self-governing.

DDoS

Distributed Denial-of-Service or DDoS is a computerized attack on a website or other online service that causes the service to slow down or shut down, stopping real users from taking advantage of the service. A DDoS is caused by one computer gaining control of many other computers, unknown to the owners, and directing the computers towards an online service. Because there are many thousands of computers trying to connect with one online service, it becomes overwhelmed and cannot provide services to its real customers.

Decentralized

Decentralized is a system or organization that has no single person or executive group controling the system. Compare this definition with “distributed” which means, a computer system or organization that has entire copies of it being run and maintained simultaneously on multiple computers.

Decentralized Application (dApp)

Decentralized application or DApp is a software application that has its technology running publicly on a network of computers. In other words, the technology is being maintained by many individuals instead of by one organization. That network gives the technology security. A hacker cannot incorrectly alter the application’s data unless they were able to get access into nearly all of the network’s computers and adjust it there.

Decryption

Decryption is the process of making secret information that was unreadable into a readable format for you or computers.

Difficulty

In Proof-of-Work mining, is how hard it is to verify blocks in a blockchain network. In the Bitcoin network, the difficulty of mining adjusts verifying blocks every 2016 blocks. This is to keep block verification time at ten minutes.

Digital commodity

A scarce, electronically transferrable, intangible, with a market value.

Digital identity

An online or networked identity adopted or claimed in cyberspace by an individual, organization, or electronic device.

Digital Signature

Private keys are used for signing transactions. Each time a transaction is sent over the blockchain it gets signed by the user’s private key. The signed transaction is broadcasted over the network together with the corresponding public key. Each miner is able to verify the signature by verifying the signature with the public key.

Distributed

Distributed describes a computer system or organization that has entire copies of it being run and maintained simultaneously on multiple computers. Compare this definition with “decentralized” which means, no single person or executive group controls the systems.

Distributed Denial-of-Service Attacks

Distributed Denial-of-Service or DDoS is a computerized attack on a website or other online service that causes the service to slow down or shut down, stopping real users from taking advantage of the service. A DDoS is caused by one computer gaining control of many other computers, unknown to the owners, and directing the computers towards an online service. Because there are many thousands of computers trying to connect with one online service, it becomes overwhelmed and cannot provide services to its real customers.

Distributed Ledger (DLT)

Distributed ledger is a digital record of money being received and spent maintained simultaneously by a network of computers. Because the record is shared by many computers in many locations, it makes changing or altering that record incorrectly very difficult and so the technology becomes very safe. Another word for distributed ledge is, blockchain.

Double Spending

Double spending is the action of spending digital money twice. It is meant to cheat the first person out of their money before they’ve received it.

E

Emission

Emission, also known as Emission Curve, Emission Rate, and Emission Schedule is the speed at which new cryptocurrency coins are created and released.

Encryption

Encryption is the process of locking information in an unreadable form so it can be kept secret. Encryption has existed for thousands of years. With the use of computers, encryption has become much more difficult to break without the code.

Escrow

Escrow is a part of the transaction process where the buyer and seller store money or other valuables with a third-party to minimize risk. The escrow service holds onto the valuables and won’t release it until the agreement has been met.

Ethereum (ETH)

Ethereum is the second largest cryptocurrency. Ethereum is built with publicly available software that developers can use to build their own cryptocurrency and software. Some cryptocurrencies built with it include: OMG, Qtum, EOS, and BAT. Some of the apps built from it include games, social networks, and marketplaces.

Ether

The native token of the Ethereum blockchain which is used to pay for transaction fees, miner rewards and other services on the network.

Ethereum Classic

A split from an existing cryptocurrency, Ethereum after a hard fork. To learn more about this, click here.

EVM code

The programming language in which accounts on the Ethereum blockchain can contain code. The EVM code associated with an account is executed every time a message is sent to that account, and has the ability to read/write storage and itself send messages.

Exchange

An exchange is a place where something of value can be traded. One of the purposes of an exchange is to ensure fair trades are conducted. Traditionally, stocks were a common item traded on exchanges. Now with exchanges for cryptocurrencies, many new exchanges are being built in countries around the world.

F

Faucet

A faucet is a website or application that provides small, free amounts of new cryptocurrencies to help increase awareness.

Fiat Currency

Fiat currency is money that has been declared to be valuable by the government. Fiat currency doesn’t have any value by itself and it doesn’t represent anything valuable. Instead, fiat currency maintains its value because it is an idea powered by the people’s confidence and trust in the government and banks that created it. US dollars are a type of fiat currency.

Fork

The creation of an ongoing alternative version of the blockchain, by creating two blocks simultaneously on different parts of the network. This creates two parallel blockchains, where one of the two is the winning blockchain.

Full Node

A full node is a computer running a cryptocurrency program that is part of a network. Specifically, it is running the entire program, ignoring those transactions that are incorrect and adding every transaction that is correct to its record.

Fungible

Fungible is a positive quality where two or more of the same thing have identical value. That is to say, one of a group of things can be a substitute for another and it won’t change the value.

G

Gas

Gas is a small amount of ethereum paid to people who use their computers to record transactions and do other software actions.

Gas Limit

Gas limit is an amount of ethereum and it is multiplied by a very small amount of ethereum to pay people to record transactions and do other software actions. If the amount of gas is insufficent to complete the work, the work will fail. On the other hand, you can pay a bit more gas and expect the computers to complete your task sooner.

Gas Price

Gas price is a very small amount of ethereum and it is multiplied by an amount known as gas limit to pay people to record transactions and do other software actions. If the amount of gas is insufficent to complete the work, the work will fail. On the other hand, you can pay a bit more gas and expect the computers to complete your task sooner.

Genesis Block

A blockchain is a digital book of records where each new page made in that book is what is known as a “block”. Those blocks are connected in one group known as the blockchain. The first block in a blockchain is known as the genesis block.

Graphical Processing Unit (GPU)

A Graphical Processing Unit commonly known as a graphics card or GPU is a computer chip that creates 3D images on computers. Mining is a computer process of recording and verifying information on the digital record known as the blockchain. Because mining requires computer power, people do this work in return for money. Each computer that fulfills this process can earn a reward in digital money. For a long time, a GPU was the part of the computer used for mining.

Gwei

Gwei is a very small amount of ethereum coin used to calculate transaction fees for sending ethereum to another. One ethereum coin is worth 1 billion (1,000,000,000) gwei.

H

Halving

Halving comes from an Old English word meaning “half”. In cryptocurrencies, mining is a computer process of recording and verifying information on the digital record known as the blockchain. In bitcoin and other currencies, mining also requires computers compete with each other to solve a complicated math problem. Once solved, a new block is discovered that can be added to the chain of blocks and a reward of brand new bitcoin is given to the computer that solved the math problem first. Halving is the reduction of the bitcoin mining reward issued by half.

Hardfork

A hardfork is a change to the blockchain protocol that makes previously invalid blocks/transactions valid, and therefore requires all users to upgrade their clients. The most recent example of a hardfork in public blockchains is the Ethereum hardfork which happened on July 21st, 2016. The hardfork changed the Ethereum protocol, therefore a second blockchain emerged (Ethereum Classic, ETC) which supports the old Ethereum protocol. In order to continue existing ETC needs miners, which would validate the transactions on the blockchain

Hardware Wallet

A hardware wallet is a specially designed device to lock away access to your cryptocurrency. The device is extra secure because it is disconnected from the Internet and other computers and is virtually virus-proof. A cryptocurency wallet is software that interacts with the network of recordings (blockchain) and lets users receive, store, and send their digital money.

Hash Function

A hash function is a computer program that takes information and turns it into letters and numbers of a certain length. Hashing is used to make storing and finding information quicker because hashes are usually shorter and easier to find. Hashes also make information unreadable and so they become a secret.

Hashing

A hash is a mathematical computer program that takes any set of information and turns it into letters and numbers of a certain length. Hashing is used to make storing and finding information quicker because hashes are usually shorter and easier to find. Hashes also make information unreadable and so they become a secret.

Hashrate

Hashrate is the speed that a computer can complete a mathematical program that takes any set of information and turns it into letters and numbers of a certain length.

I

IPFS

The InterPlanetary File System (IPFS) is a hypermedia distribution protocol, addressed by content and identities. IPFS enables the creation of completely distributed applications. It aims to make the web faster, safer, and more open. IPFS is an open source project developed by the team at Interplanetary Networks and many contributors from the open source community. It is a peer-to-peer distributed file system that seeks to connect all computing devices with the same system of files. In some ways, IPFS is similar to the Web, but IPFS could be seen as a single BitTorrent swarm, exchanging objects within one Git repository. In other words, IPFS provides a high throughput content-addressed block storage model, with content-addressed hyperlinks. This forms a generalized Merkle DAG, a data structure upon which one can build versioned file systems, blockchains, and even a Permanent Web. IPFS combines a distributed hash table, an incentivized block exchange, and a self-certifying namespace. IPFS has no single point of failure, and nodes do not need to trust each other

J

K

Key

A key is a secret string of letters and numbers that must be used to make hidden, unreadable information readable.

Know Your Customer (KYC)

Know Your Customer or KYC is a set of laws where financial organizations must request government issued identification from their customers before allowing them to use their services. KYC was established to prevent criminals from converting their illegally earned money into digital money to hide it from the police.

L

Ledger

A ledger is a book or other collection of records in which a person, business, or other group records how much money it receives and spends.

Light Node

A computer on a blockchain network that only verifies a limited number of transactions relevant to its dealings, making use of the simplified payment verification (SPV) mode

Lightning Network

The Lightning Network is technology that allows near-instant and low fee transactions of cryptocurrencies using bitcoin’s technology. With cryptocurrencies like bitcoin, it can take an average of 10 minutes for your transaction to be registered in the digital recording known as the blockchain. The Lightning Network will make those transactions instant.

M

Market Capitalization

Market Capitalization is a way to rank and judge the size of a cryptocurrency or stock in a company. The total dollar value is calculated by taking the total supply and multiplying it by the price. For example, if bitcoin is worth $4,000 and there are 16,500,000 coins in existence, that means its market cap is $66,000,000,000 or $66 billion.

Max Supply

Max supply is the maximum number of coins that will ever exist for a cryptocurrency. With bitcoin, the maximum supply is 21 million. With other cryptocurrencies like EOS, there is no maximum supply, so the number of coins will continue growing.

Megahashes per Second

A hash is a mathematical computer program that takes any set of information and turns it into letters and numbers of a certain length. Hashing is used to make storing and finding information quicker because hashes are usually shorter and easier to find. Commonly known as the abbreviation, MH/S it is one million (1,000,000) hashes. And so MH/s is a measurement of the number of hashes per second measured in millions.

Merkle Tree

A Merkle tree is defined as a way to organize data so it is more efficient and secure.

Microtransaction

A microtransaction is an online purchase or exchange that worth very little money.

Mining

Mining is the computer process of recording and verifying information on the digital record known as the blockchain.

Mining (Bitcoin)

Mining is the process of adding transaction records to Bitcoin’s public ledger of past transactions or blockchain. This ledger of past transactions is called the blockchain as it is a chain of blocks. The blockchain serves to confirm transactions to the rest of the network as having taken place. Bitcoin nodes use the blockchain to distinguish legitimate Bitcoin transactions from attempts to re-spend coins that have already been spent elsewhere. Mining is intentionally designed to be resource-intensive and challenging so that the number of blocks found each day by miners remains steady. Individual blocks must contain a proof of work to be considered valid. This proof of work is verified by other Bitcoin nodes each time they receive a block. Bitcoin uses the hashcash proof-of-work function. The primary purpose of mining is to allow Bitcoin nodes to reach a secure, tamper-resistant consensus. Mining is also the mechanism used to introduce Bitcoins into the system: Miners are paid any transaction fees as well as a “subsidy” of newly created coins. This both serves the purpose of disseminating new coins in a decentralized manner as well as motivating people to provide security for the system

Mining Difficulty

Mining difficulty is a measure of how hard it is to record information onto the digital record known as the blockchain. With bitcoin, mining also also requires you solve a complicated math problem. Each computer that fulfills this process discovers a new block to add to the blockchain and earns a reward in cryptocurrency. The more computers there are competing to solve the math problem, the quicker blocks will be discovered… So every 2,016 blocks, or every 2 weeks, mining difficulty is recalculated to keep the speed of discovery consistent. As the difficulty increases, the amount of work required for the reward increases while the reward stays the same.

Mining Pool

In a mining pool, different users organize together in order to provide computing power for the bitcoin network. If a Bitcoin block is newly created, each of the users in the mining pool receives its fair share proportionately to his mining power. To become a member of a mining pool, the user needs to run software provided by the mining pool. The advantage of the mining pools is that block rewards get distributed across the pool providing more stable income.

Mining Rig

Mining rigs are computers used to record information on the digital record known as the blockchain. People get their computers to do this work in return for money. Because mining often requires a lot of computer power, special computers have been designed just for mining

Mnemonic Phrase

A mnemonic phrase (also mnemonic seed or seed phrase) is a secret list of words used in sequence to gain access to your cryptocurrencies…

Multisignature

Multisignature means more than one signature or approval is required before a transaction can take place. Multisignature increases the security for cryptocurrencies so that one person cannot take all of the money for himself without approval from the others.

N

Node

A node is any device (computer, phone, etc) that is part of a digital network. Cryptocurrencies are supported by a network of computers each keeping a digital record of the data known as a blockchain. So, a computer is a node in the network, so is a phone or any other device that may receive, transmit, and/or contribute to the blockchain.

Node (Full Node)

Any computer that connects to the blockchain network is called a node. Nodes that fully enforce all of the rules of the blockchain (i.e., Bitcoin) are called full nodes. Most nodes on the network are lightweight nodes instead of full nodes, but full nodes form the backbone of the network

Nonce

Nonce comes from an old phrase which meant “only once”. A nonce is a number used once while mining cryptocurrency with the hope that it will solve a math problem and earn money.

O

Open Source

Open source describes any type of technology that is made public and can be seen, changed, and shared. The term is usually used for computer technology that has been made available to anyone and is not protected.

Oracles

Smart contracts on the blockchain cannot access the outside network on their own. Therefore oracles sit between a smart contract and the external world, providing the data needed by the smart contract to prove performance while sending its commands to external systems

Orphan

Orphan describes a block that has been abandoned and will not be built upon. Blockchain is technology for creating permanent, secure digital recordings. If you imagine the blockchain as a book of records, then each page in that book is what is known as a “block”. A block is simply a recording of information. Blocks are attached to each other making what is known as the blockchain. Because many computers are maintaining the blockchain, occasionally two blocks are created at the same time. Since only one block can be created at a time, only one will be continued and built upon, the other block will be abandoned and is known as an orphan.

Output

Output describes digital money going out of your digital wallet. Digital money coming into your digital wallet is known as an “input”. When you want to spend your money, your inputs are later used as proof to show that you have X amount of money. That is known as an “output”.

P

Peer to Peer (P2P)

Peer to peer or P2p is a connection between two or more computers that allow them to share information, files or other data directly.

Paper Wallet

A paper wallet is simply a piece of paper containing the information needed to access and spend your cryptocurrency. A wallet is software that interacts with the network of recordings (blockchain) and lets users receive, store, and send their digital money. Paper wallets are often used to backup the information to access your money or as the only recording to prevent someone like hackers from stealing it from your computer.

Permissioned blockchains

Provide highly-verifiable data sets because the consensus process creates a digital signature, which can be seen by all parties.

Permissioned ledger

A ledger where actors must have permission to access the ledger. Permissioned ledgers may have one or many owners. When a new record is added, the ledger’s integrity is checked by a limited consensus process. This is carried out by trusted actors — government departments or banks, for example — which makes maintaining a shared record much simpler that the consensus process used by unpermissioned ledgers.

Permissionless

Permisionless is a positive quality, where anyone is permitted to join and participate in an activity. Permissionless is oftne used when describing blockchain technologies because anyone can download the digital record known as the blockchain and participate in recording and verifying information.

Proof of Stake (PoS)

Proof of stake or PoS, is a form of mining which is the computer process of recording and verifying information on the digital record known as the blockchain.

Proof of Work (PoW)

Proof of work or PoW, is a form of mining which is the computer process of recording and verifying information on the digital record known as the blockchain.

Premine

Premine is a condition of some new cryptocurrencies, where the max supply has already been created before being made publicly available. This means, no new coins will be creating during the mining process. Mining is a computer process of recording and verifying information on the digital record known as the blockchain. Each computer that fulfills this process can earn a reward in digital money and with cryptocurrencyes that have not been premined, a reward of brand new coins.

Private Blockchains

a fully private blockchain is a blockchain where write permissions are kept centralized to one organization. Read permissions may be public or restricted to an arbitrary extent. Likely applications include database management, auditing, etc. internal to a single company, and so public readability may not be necessary in many cases at all, though in other cases public auditability is desired

Private Key

The private key is a string of letters and numbers known only by you that allows you to spend cryptocurrency. NEVER SHARE your private key unless you want someone else to be able to take all of your money! Compare this with public key and address. While your public key lets you receive cryptocurrency, it is less secure than your address which is what you should use to receive money.

Protocols

Sets of formal rules describing how to transmit or exchange data, especially across a network.

Pseudonymous

Pseudonymous means acting or done under a false name. Pseudo comes from the Greek word meaning “false”. Bitcoin is pseudonymous because you and your account are recognized by a string of letters and numbers known as your address. Under some circumstances your address can be linked with your identity making bitcoin not 100% anonymous.

Public Blockchains

A public blockchain is a blockchain that anyone in the world can read, anyone in the world can send transactions to and expect to see them included if they are valid, and anyone in the world can participate in the consensus process – the process for determining what blocks get added to the chain and what the current state is. As a substitute for centralized or quasi-centralized trust, public blockchains are secured by crypto economics – the combination of economic incentives and cryptographic verification using mechanisms such as proof of work or proof of stake, following a general principle that the degree to which someone can have an influence in the consensus process is proportional to the quantity of economic resources that they can bring to bear. These blockchains are generally considered to be “fully decentralized”

Public Key

The public key is a string of letters and numbers that allows cryptocurrency to be received. Though it’s called a “public key”, it isn’t publicly visible until you’ve shared it or sent money out. And while it can be used to receive money, it usually isn’t able to spend money. To make sure your money can never be spent without your authorization, a safer and more secure way to receive money is to use your public address. Compare this with a private key which is known only by you and is used to spend your cryptocurrency.

Q

R

Return on Investment (ROI)

Return on Investment or ROI is a percentage used to measure how profitable an investment is. ROI measures the profit on an investment in relation to the amount put in.

Ring Signature

Ring signature is a cryptographic technology that could provide a decent level of anonymisation on a blockchain. Ring signatures make sure individual transaction outputs on the blockchain can’t be traced. A message signed with a ring signature is endorsed by someone in a particular group of people. One of the security properties of a ring signature is that it should be computationally infeasible to determine which of the group members’ keys was used to produce the signature

S

Satoshi

A Satoshi is the smallest amount of bitcoin at one-billionth of a bitcoin or 0.000000001 bitcoin. That’s 8 zeros before the number 1! This tiny amount of bitcoin is named after the creator of bitcoin, Satoshi Nakamoto. Satoshi Nakamoto is an unknown person or group of people who created bitcoin in 2009.

Secret Key

See private key.

Secure Hash Algorithm 256

The Secure Hash Algorithm 256 or SHA 256, is one of the most secure ways to protect digital information. A hash is a mathematical computer program that takes any set of information and turns it into letters and numbers of a certain length. Hashing is used to make storing and finding information quicker because hashes are usually shorter and easier to find. Hashes also make information unreadable and so they become a secret. The number of possible combinations of letters and numbers produced by SHA 256 exceeds the number grains of sand on Earth! That makes guessing the data hidden within the hash virtually impossible.

Segregated Witness

Segregated witness is a technology that moves some information recorded into the bitcoin system known as the blockchain into a separate recording. When someone sends bitcoin to another, the technology must verify that the sender has enough in his account. Once the technology verifies this, it “signs” the recording (block) as a witness. Each bitcoin recording is limited to 1 megabyte (MB) in size and new recordings are made every 10 minutes. Because the signature takes up a lot of space in the recording, relocating it to a different recording, also known as segregating, will allow many more transactions to be recorded every 10 minutes.

SHA 256

The Secure Hash Algorithm 256 or SHA 256, is one of the most secure ways to protect digital information. A hash is a mathematical computer program that takes any set of information and turns it into letters and numbers of a certain length. Hashing is used to make storing and finding information quicker because hashes are usually shorter and easier to find. Hashes also make information unreadable and so they become a secret. The number of possible combinations of letters and numbers produced by SHA 256 exceeds the number grains of sand on Earth! That makes guessing the data hidden within the hash virtually impossible.

Sharding

Shard comes from an Old English word that meant, “to cut” and in present time, a shard is a small piece of a bigger whole. In terms of technology, sharding is the process of breaking down a big chunk of digital information into smaller pieces so it runs quicker and is more manageable. By sharding a massive digital book of records known as the blockchain, every computer won’t have to store a complete copy of the blockchain. Instead, they will store and manage a shard.

Sidechains

Blockchains that are interoperable with each other and with Bitcoin, avoiding liquidity shortages, market fluctuations, fragmentation, security breaches and outright fraud associated with alternative crypto-currencies. “Sidechains are new blockchains which are backed by Bitcoins, via Bitcoin contracts, just as dollars and pounds used to be backed by cold hard gold. You could in principle have thousands of sidechains “pegged” to Bitcoin, all with different characteristics and purposes … and all of them taking advantage of the scarcity and resilience guaranteed by the main Bitcoin blockchain, which in turn could iterate to implement experimental sidechain features once they have been tried and tested…” more

Simplified Payment Verification (SPV)

Simplified Payment Verification or SPV, describes software that allows you to confirm your own cryptocurrency transaction has been recorded and is official without having to download and manage the entire digital recording that is the blockchain.

Smart contracts

Computer protocols that facilitate, verify, or enforce the negotiation or performance of a contract, or that obviate the need for a contractual clause. Smart contracts usually also have a user interface and often emulate the logic of contractual clauses. Proponents of smart contracts claim that many kinds of contractual clauses may thus be made partially or fully self-executing, self-enforcing, or both. Smart contracts aim to provide security superior to traditional contract law and to reduce other transaction costs associated with contracting

Softfork

A softfork is a change to the bitcoin protocol wherein only previously valid blocks/transactions are made invalid. Since old nodes will recognize the new blocks as valid, a softfork is backward-compatible. This kind of fork requires only a majority of the miners upgrading to enforce the new rules

Software Wallet

A software wallet is a computer program designed device to secure your cryptocurrency while allowing only you to access it. A wallet is software that interacts with the network of recordings (blockchain) and lets users receive, store, and send their digital money.

Solidity

Solidity is a computer programming language used for creating smart contracts. There is technology known as blockchain that is made up of publicly available digital recordings managed simultaneously by a network of computers. When you use that technology with contracts and program them to take action on a date, you have a smart contract.

Stale Block

A stale block is a digital recording that is complete with information and no longer needs to be recorded or worked on. Because a blockchain is a digital recording and each block is like a page in that recording, new pages are added any time more information needs recorded. If everyone were to record new info at the same time, the blockchain wouldn’t work. So the system lets one person record info at a time. A stale block is a block that has already had info recorded onto it. There is no need for people maintaining the blockchain to try to record more information on it.

State Channel

State channels are interactions which get conducted off the blockchain without significantly increasing the risk of any participant. Moving these interactions off of the chain without requiring any additional trust can lead to significant improvements in cost and speed. State channels work by locking part of the blockchain state so that a specific set of participants must completely agree with each other to update it

Swarm

Swarm is a distributed storage platform and content distribution service, a native base layer service of the Ethereum web three stack. The primary objective of Swarm is to provide a decentralized and redundant store of Ethereum’s public record, in particular, to store and distribute dApp code and data as well as blockchain data

T

Test Network (TestNet)

Test Network also known as “testnet” is software that is identical to the software used by a cryptocurrency. Because testnets are built to experiment with new ideas without disturbing or breaking the main cryptocurrency software, its digital currency is worthless. Bitcoin’s testnet has been reset several times to stop people who began trading its coins as digital money.

Token

A token is a unit of digital value and in cryptocurrencies, it is money with programmable potential built into it. Unlike coins, tokens have value beyond money, because software can be built using it. OMG and EOS are cryptocurrencies built on the token, ethereum. There are games and productivity apps also built using ethereum’s token.

Tokenize

Tokenize is the process of converting valuables in the real world into something of digital value called a token. By tokenizing a house worth $500K, the homeowner can sell half the value of his house ($250K) to two hundred and fifty people for $1,000 each. Without tokenization, that deal would not be possible. Because these tokens are exchanged on the blockchain, the data is publicly available and virtually impossible to cheat on.

Tokenless ledger

A distributed ledger that doesn’t require a native currency to operate.

Total Supply

Total supply is the complete amount of coins currently available for a cryptocurrency not including any coins that were burnt. Burning coins is the action of sending cryptocurrency to an address which is unspendable.

Transaction (TX)

Transaction or TX, is the transfer of money from one person to another for a business deal.

Transaction block

A collection of transactions on the bitcoin network, gathered into a block that can then be hashed and added to the blockchain.

Transaction fees (TX Fee)

Small fees imposed on some transactions sent across the bitcoin network. The transaction fee is awarded to the miner that successfully hashes the block containing the relevant transaction.

Trustless

Trustless is a positive quality where you are not required to trust the person you’re doing the transaction with. A trustless system or technology is so secure and smooth in handling your transactions, that both people in a transaction can safely hand over money and other valuables without the risk of being cheated.

Turing completeness

A machine is Turing complete if it can perform any calculation that any other programmable computer is capable of. All modern computers are Turing-complete in this sense. The Ethereum Virtual Machine (EVM) which runs on the Ethereum blockchain is Turing complete. Thus it can process any “computable function”. It is, in short, able to do what you could do with any conventional computer and programming language

U

Unpermissioned ledgers

Have no single owner (Ex. Bitcoin) — indeed, they cannot be owned. The purpose of an unpermissioned ledger is to allow anyone to contribute data to the ledger and for everyone in possession of the ledger to have identical copies.

Unspent Transaction Output (UTXO)

Unspent Transaction Output or UTXO, is a list of money received that has not yet been spent. In other words, if you were to total up the UTXO, you would get the user’s available balance. Bitcoin and other cryptocurrencies based on its technology use UTXO in their blockchain technology to verify that a person has unspent crypto available for spending.

V

W

Wallet

A wallet is software that interacts with the network of recordings (blockchain) and lets users receive, store, and send their digital money. The wallet doesn’t actually store the money, instead it locks away access to the money. The only way to get access to it is by providing a key, a string of letters and numbers like a password.

Wei

Wei is the smallest amount of ethereum coin. One ethereum coin is worth 1 quintillion (1,000,000,000,000,000,000) wei.

White Paper

A white paper is a document that explains the purpose and technology used in a cryptocurrency. Usually a white paper is used when a cryptocurrency is just starting to help people understand what it has to offer. A clear, simple white paper is a good sign for a new cryptocurrency.

X

Y

Z

Zero Confirmation Transaction

A zero confirmation transaction, means a seller who is receiving cryptocurrency as part of a deal doesn’t wait for verification that the money was sent and instead immediately delivers what was sold.

3 Likes