279 73 7MB
English Pages [207] Year 2023
The great Web 3.0 Glossary
The great Web 3.0 Glossary by
Nikolas Beutin & Daniel Boran
Fachmedien Recht und Wirtschaft ǀ dfv Mediengruppe ǀ Frankfurt am Main
Bibliographical data of the German National Library (Deutsche Nationalbibliothek) The German National Library lists this publication in the German National Bibliography (Deutsche Nationalbibliografie). Detailed bibliographical information is available online at http://dnb.de.
ISBN 978-3-8005-1855-5
© 2023 Deutscher Fachverlag GmbH, Fachmedien Recht und Wirtschaft, Frankfurt am Main www.ruw.de This work and all its individual parts are protected by copyright law. Any unauthorized use outside the narrow limitations laid down by copyright law (Urheberrechtsgesetz) is unlawful and liable for prosecution. This applies in particular to reproduction, editing, translation, microfilming and storage and processing in electronic systems. Printing and production: WIRmachenDRUCK GmbH, Backnang Printed in Germany
Preface Metaverse, Non-Fungible Tokens (NFTs), Cryptocurrency, Blockchain, and related topics such as Artificial Intelligence (AI) and Service Robots represent a rapidly expanding field with an ever-increasing number of terms and community-specific jargon for many years. A new term is not always accompanied by something truly novel. In addition to verbal “pseudo-innuendos” and “cryptoslang” introduced with the intent of attracting attention quickly, there are a number of significant new developments. Examples include new technologies or authorities, laws, and regulations affecting the Metaverse, NFT, Cryptocurrency, AI, Service Robots, and Blockchain sector. This development illustrates the fascinating diversity of the Metaverse, NFT, Cryptocurrency, and Blockchain landscape. The issue with this development is that the risk of “Babylonian language confusion” is growing exponentially. Our observations indicate that this risk is particularly prevalent in the dialogue between science and practice. In light of this, this DFV encyclopedia hopes to contribute to the clarification of terms. Those who are interested in the discussed fields will find a reference work that provides quick access to all key terms. Obviously, platforms, online encyclopedias, and glossaries such as Bueno, Moonpay, Social-Lady, Coinmarketcap, Binance, Wikipedia, and finder already exist. However, our pre-book analysis has revealed that neither is even close to completion. In addition, we frequently encountered imprecise language and contradictory definitions and explanations among the various sources. The encyclopedia is intended for managers, students, and professors alike. With the aid of this encyclopedia, managers who are faced with Metaverse, NFT, Cryptocurrency, AI, Predictive Modeling, Service Robot, or Blockchain decisions in their daily work should have quick access to technical terms. This encyclopedia is also intended to help students keep track of the subject’s numerous terms as they study it. The encyclopedia can also be used as a guide for a consistent use of Metaverse, NFT, Cryptocurrency, and Blockchain terminology by instructors, teachers, and professors. This DFV encyclopedia is not primarily focused on science. Although the explanations of the individual terms are scientifically based, the focus is on easy understanding of the terms. The authors have made an effort to provide clear and concise definitions, an application-focused perspective, and simple language. The book covers a variety of Metaverse, NFT, Cryptocurrency, and Blockchain-related topics, as well as AI, predictive modeling, service robots, and legal terms. In the acquisition of authors, care was taken to recruit a younger generation of renowned specialists. The objective was not to recruit as many established authors as possible, but rather to recruit qualitatively vetted subject matter exV
Preface
perts. This allowed for the processing of articles “from a single source.” On the following page, you will find the list of experts and their respective subject areas. In the future, we will continue to update and incorporate new keywords and corresponding articles. Without the support of our families and wives in covering our backs, this book would have never been published – we are grateful and thankful for the opportunity you gave us. Second, we would like to express our gratitude to the authors who, despite their many obligations, contributed their subject areas to this dictionary. Their contributions are fundamental to this book. Of course, we would also like to thank the DFV team, specifically Patrick Orth. Without their effortless cooperation, the publication process would have likely dragged on for months rather than the few weeks we needed. Even with the most effective quality management and research, errors may occur. Thus, we welcome all suggestions and recommendations for improvement. And, if any reader discovers new terms, inconsistencies, incorrect or inadequate explanations, or any other error, we would be delighted to be informed. We are looking forward to an updated second edition of our book in 2024 and hope for a favorable reception. Bayreuth, Februar 2023
VI
NIKOLAS BEUTIN and DANIEL BORAN
Editors Prof. Dr. Nikolas Beutin Nikolas has more than 25 years’ experience as CEO, managing director, president, owner, and practice group leader for building up and leading professional service firms as Accenture, PwC, EY, or H&P. He has consulted clients in go-to-market and growth strategy, pricing, sales, service, marketing, supply chain management, logistics, and innovation topics. Nikolas has achieved 75+ bn additional revenue and 30+ bn additional EBITDA for his clients in his more than his 700+ projects working in 32+ countries for DJ, EuroSToxx DAX, and MDAX companies as well as for numerous family-owned businesses. Nikolas has taught and teaches Pricing, Sales & Marketing since more than 20 years at many different leading universities and has 200+ national and international publications and has won two article of the year journal awards. He is also Professor at the Quadriga University where he has designed and built-up the MBA in Leadership & Sales Management program. He studied economics and law at the University of Bonn and completed his Ph. D. program at the University of Mannheim after being a research assistant at the WHU Koblenz and the Colorado State University. Nikolas is also alumni of the Harvard Business School. His specialties are Strategy, Commercial & Sales Excellence, Pricing Excellence & Implementation, Service Excellence, Innovation and Market Research. Nikolas is co-founder of XBANQ.com, a premium NFT marketplace especially for commercial use cases. He is married, has three children and lives in Bayreuth. Daniel Boran Daniel is an experienced German creative and marketing director as well as founder and CEO of the brand communication agency BORAN x PAROT. He has more than 20 years of experience in advertising, internet, brand communication, and marketing for more than 500 national and international companies, celebrities, and institutions. He has been responsible for the concept & design of many marketing mixes, campaigns, photoshoots, ads, websites, briefings, presentations, press releases which were rolled out to 35 countries worldwide. VII
Editors
His work was honored with the well-known HSMA Marketing Award in 2001 for the first website in the hotel industry with 360° views of the hotel and its rooms. Since 2015, Daniel has been deeply involved with blockchain, cryptocurrencies, artificial intelligence, metaverse, non-fungible tokens, and other emerging technologies that will significantly shape our world in the future. Daniel works with special emphasis on aesthetics, creative ideas, and communication goals, and with very high attention to details. He is co-founder of XBANQ.com, a premium NFT marketplace especially for commercial use cases. Daniel is married, has two children and lives in Pegnitz.
VIII
Persons responsible for subject areas The following persons have created the articles for the selected subject areas: PROF. DR. NIKOLAS BEUTIN Quadriga University & XBANQ GmbH Subject Area: Crypto, NFT, Blockchain & Metaverse DANIEL BORAN XBANQ GmbH & Boran X Parot GmbH Subject Area: Crypto, NFT, Blockchain & Metaverse KEVIN KOENIG University of Bayreuth Subject Area: NFT & Crypto Law PROF. DR. WERNER KUNZ University of Massachusetts Subject Area: Service Robots PROF. DR. FRAUKE SCHLEER-VAN GELLECOM University of Giessen & PricewaterhouseCoopers GmbH (PwC) Subject Area: Artificial Intelligence and Predictive Modeling
IX
Glossar instrument for building an exclusive group and establishing previously unimaginable income opportunities. 2FA, → “Two-Factor Authentication” 401(k) Plan, A 401(k) is a retirement program in the US offered by employers. Employees are given tax breaks on the funds they contribute to their accounts. Contributions are automatically taken from the paychecks. These are then invested in funds that the employee picks from a list available to them. However, some 401(k) management companies do not allow employees to choose where funds are invested. In any case, this will be explained to the employee as they sign up for the plan. 401(k) plans have an allowance limit of $20,500 per annum as of 2022 and $27,000 for those aged 50 or more. This plan derives its name from the section of the tax code that established it – subsection 401 (k). With the growing popularity of cryptocurrencies and blockchain technology, many have wondered whether they could invest in Bitcoin via a 401(k). That recently became possible, thanks to Fidelity Investments, the most significant player in the 401(k) industry. The company announced in April this year that it would allow investments in BTC. 51 % Attack, A 51 % assault occurs when a malevolent actor (or group) controls over 50 % of the blockchain network’s mining power and disrupts its integrity. Blockchain transactions require consensus. A bad actor with the majority of hashing or mining power can hypothetically create the majority in this consensus mechanism and disrupt the blockchain by changing transaction order, preventing transactions from being confirmed, or double spending. Blockchains with less hashing power are more vulnerable to 51 % attacks because hostile actors can more easily obtain majority processing power. More miners and resources mine a blockchain, making it safer. Bitcoin has the most hashing power, making it the safest blockchain. Ethereum Classic experienced a 51 % attack in January 2019. 80/20 Rule (Pareto Principle), The 80/20 rule, often known as the Pareto Principle, argues that 20 % of input influences 80 % of outcome. This ratio is a typical distribution, not a
0x Protocol, 0x is an open-source protocol built on the Ethereum blockchain that allows for the frictionless peer-to-peer exchange of cryptocurrencies. The team envisions a future in which the Ethereum network is leveraged to tokenize all sorts of assets. For example, selling a home would not require attorneys or escrow agents as 0x provides a complete solution that can tokenize property and transfer ownership to the buyer via a smart contract. This not only eliminates the need for costly intermediaries, but it also speeds up the entire process, turning real estate into a liquid asset. With the 0x Launch Kit, anybody can create their own decentralized exchange (DEX) on top of 0x and earn fees for their services. The 0x protocol acts as a standard message format for exchanges, like SWIFT, which is the standard messaging system used by banks worldwide to communicate about fiat currency transfers. The 0x API (application programming interface) was also released, which allows for liquidity throughout the network and permits customers to always exchange assets at optimal prices. 1:1 NFT, An important aspect of minting an NFT is its rarity. An extreme case is a 1/1 NFT (or 1×1 NFT), where a single token is issued for a unique asset. Then the owner of this one token is also the owner of the asset. Multiple tokens can also be issued for the same asset. A 1x1 NFT can be used for anything from a physical item to an event ticket. The owner of the token can only transfer it once and receives nothing in return. At the other end of the spectrum is an infinite supply (or infinite stock) NFT, which has no set number of tokens and therefore no limit to how many times it can be transferred or traded. The owner always receives consideration when they sell their token – usually another token – and these tokens can themselves vary in scarcity depending on how much the issuer limits their supply. 10k Project, A 10k project is a collection of non-fungible Tokens containing 10,000 non-fungible Tokens. This sort of NFT was likely pioneered by the CryptoPunks collection in 2017; since then, other others have emerged. BAYC is the premier illustration of the market-dominating potential of 10K NFTs. These collections are in high demand and a fantastic
1
AAGR rate was below the target rate of 2 %, at 1 %. Nonetheless, the demand for high-tech goods is a positive component of the recent rise of the Japanese economy. Abnormal Return, Abnormal return refers to unusually high or low investment returns. Temporary effects may emerge from irregular fundamentals or fraudulent action on the side of the organization holding funds creating abnormal returns. Abnormal returns differ from Alpha and excess returns, which are attributed to the success of investment managers. Furthermore, Cumulative Abnormal Returns (CAR) is the total of all abnormal returns and is used to track the impact of external risks on stock prices. Calculating a positive or negative anomalous return involves subtracting actual returns from expected returns. It helps investors to analyze the performance of an asset or security over a specific period of time, especially because anomalous returns tend to be skewed over short time periods. In rare circumstances, stock prices fluctuate in reaction to a company’s team’s social media engagement. Absolute Advantage, Absolute advantage is a term in economics that represents a company’s or nation’s ability to create and deliver identical goods with less resources than its competitors. One of the greatest advantages of absolute advantage is that it may be utilized to improve the manufacturing process of any firm. For instance, if one firm has a better degree of production than another, it may create more things for the same price. The manufacturing process will be more efficient the larger the advantage. Adam Smith (1723-1790) advocated that nations should concentrate their production efforts on the categories of goods for which they have a competitive advantage. Comparative advantage is the capacity of a corporation to create an item at a lower opportunity cost. There are two key contrasts between the two: enterprises or countries with an absolute advantage are more likely to prosper than those with a comparative advantage. Absolute Return, Absolute return is a measurement of the whole rise or decrease in value of an asset given as a percentage. It assesses the investment’s total profit or loss and might be positive or negative. To compute an absolute return, just two variables are required: the current value of the asset or portfolio and its original value. The compound annual growth
rule. In general, a few inputs yield many outputs. In 1897, Italian economist Vilfredo Pareto noticed that 20 % of his pea plants generated 80 % of his healthy pea pods. Later, he discovered 20 % of England’s people owned 80 % of the land (and every other country he examined after that). Since then, Pareto’s projected imbalance has affected practically all aspects of modern life. Dr. Joseph Juran, not Pareto, created the phrase Pareto Principle. Juran employed Pareto’s findings in 1940s quality management and consultancy. He helped companies improve output by showing that 20 % of manufacturing methods caused 80 % of product issues. He used Pareto analysis to reduce the 20 % of production concerns to increase quality. Juran popularized the Pareto Principle, which suggests focusing on the few and neglecting the many to maximize achievement. The Pareto Principle helps to prioritize. The 80/20 rule can help choose the most efficient resources. It saves time, money, supplies, energy, and more. IT experts can apply Pareto Principle to identify 80 % of threats generated by 20 % of security controls. This lets them enhance a few important controls while protecting the network from most threats. 20 % of workplace hazards may cause 80 % of accidents. Regulating a few risks can prevent most mishaps. Health and safety costs may decrease with Pareto Principle. Preventative strategies reduce accident costs and increase ROI. The 80/20 rule helps warehouses locate the 20 % of products that generate 80 % of sales. AAGR, → “Average Annual Growth Rate” AAR, → “Average Annual Return” Abenomics, Abenomics refers to the economic policies followed by the Japanese government under the leadership of Prime Minister Shinzo Abe. In an effort to rescue Japan from deflation, integrated economic policies and structural improvements were implemented. Abenomics attempted to achieve an inflation target of 2 % in order to erase deflation and the Japanese economy’s near-stagnation since the 1990s. Shinz Abe’s stint as Japan’s prime minister was accompanied by economic policies designed to combat the country’s deflation. To stimulate the stagnant Japanese economy, he implemented Abenomics. The three essential components are monetary policies, fiscal policies, and structural adjustments or growth plans. As of December 2017, the inflation
2
Account Number vidual account is recorded in a general ledger, where it may be utilized to create the financial statements. In other words, accounts are the records or statements of financial expenditures and revenues pertaining to a certain time or objective. In the crypto community, this is known as a cryptocurrency account. It confers specific advantages and is a prerequisite for using almost every bitcoin exchange. A cryptocurrency account allows access to hot wallets, which enable to buy, sell, and trade cryptocurrencies rapidly, and it provides an identity or a method to store public keys for the aforementioned procedure. One may also get promotions through an account and it is effectively a command center, where one may adjust anything to their liking, from spending limitations to personal preferences. Account Balance, In the banking and finance business, the entire amount of money that may be removed from a bank account or crypto account is referred to as the account balance. Accounts are used by individuals, companies, and businesses alike to facilitate transactions. These accounts provide an alternative to the standard means of handling monetary transactions. There are several types of crypto and bank accounts accessible for storing and transferring assets and sending and receiving payments. The difference between all transactions debited from and credited to a ledger account is known as the account balance in accounting. These accounts may be for the company’s assets, liabilities, or even stock. Account balances are used to evaluate whether a user has adequate money to cover a transaction. The amount of available balance that may be spent is known as the available balance. The available balance of an account is computed using the account’s deposits, withdrawals, and pending transactions. Pre-authorized transfers, point-of-sale transactions, and merchant payments are examples of pending transactions. Account Number, A bank account number is a series of digits (and occasionally letters) used to identify a particular bank account and account holder. In this way, financial institutions allow consumers safe access to their accounts so they can make and receive payments. The first piece of information offered by a bank when an account is opened is a unique account number. In the past, social security numbers were issued to fulfill this function. However,
rate refers to the rate at which returns are compounded over time (CAGR). Although calculating an absolute return is rather simple, it is difficult to convert this number into terms relevant to other sorts of investments. A clearer picture may be acquired by comparing various asset categories that have traded across a variety of time periods. This is only the case if people consistently reinvest their business’s profits. Due to the varied time periods and return rates, it is difficult to identify which investment is the most beneficial. The solution to this issue is an annualized return that expresses the returns using an expression equal to one year. Abstract, An abstract is anything that exists as a concept in the mind, but has no physical or even tangible existence. It is also a summary of topics that are often provided in a skeleton format. An abstract is anything that may summarize or condense the key features of a bigger object or several things. The term abstract is derived from a Latin word that meaning drawn away or separated, implying that something is removed from physical or tangible reality. Accepting Risk (Acceptance), Accepting risks, also known as risk acceptance, is used when taking no action to solve an issue is the most cost-effective course of action. Risk management is the capacity to strike a balance between the costs of risk management and the costs connected with the risk itself. Credit risk, project failures, financial market volatility, accidents, legal obligations, natural disasters, and competitive threats are among the most common types of risks that firms encounter. As it is not always possible to cover all of these risks, a business must choose which risks are most essential to it and then spend funds to cover those risks. Managers may mitigate risk via the creation of rules and processes, the use of technology, and the provision of training. When the risk has already realized or when the chance is exceedingly high, however, it is essential to impose limitations on the consequences. In this instance, hedging is the most effective strategy for achieving this objective. Account, An account is the record in an accounting system that is used to monitor the financial operations of a particular asset, cost, income, equity, or obligation. All of these records may rise or decrease over the accounting period when certain occurrences occur. At the conclusion of the accounting period, each indi-
3
Accountability standing. The accounting method enables financial analysts to provide predictions that are more objective and precise. However, there is a potential that the financial estimates will reflect an erroneous downward trend. Accounting Method, A method of accounting is a collection of rules and principles established by a regulatory authority. It describes how a company would record its commercial activities in its accounting records. The two accounting systems offered to businesses are cash and accrual. Cash-based accounting signifies that a revenue or cost transaction will not be recorded in the books until cash has been collected or paid. The second is the accrual technique, which relates to the accounting rules often used by big firms. Here, businesses use more intricate accounts, such as accounts payable, longterm obligations, current assets, and stock. In accordance with this procedure, income is recorded at the time of the transaction, regardless of whether or not the cash has been received. Companies that are huge or corporations must employ accrual accounting. Accounting Token, Accounting tokens are easiest to comprehend when seen as a distributed ledger. As with any spreadsheet-based accounting system, accounting tokens are basically tokenized credit or debit entries (IOU/ UOM). For accounting reasons alone, they indicate the amount of money due by the token holder. As they are not supported by fiat currency like stablecoins, they cannot be considered a financial product. This technique is effective for a small number of settlement partners. Using the token’s smart contract, the whole procedure may be resolved on the blockchain with a small enough amount. These accounting tokens need not represent simply cash; they may also represent products or services equivalent to the recorded value, like a coupon. In practice, they function just like coupons. Implementing a Know Your Customer/Anti-Money Laundering (KYC/AML) procedure, providing documentation, and making the whole process visible on a public blockchain enables businesses to limit potential token holders. Accredited Investors, An accredited investor is any individual or institution entitled to invest in securities that are not registered with financial regulatory agencies. The root term accredited implies that an investment must meet certain conditions. Accredited investors meet
the widespread usage of this has led to an upsurge in fraud and identity theft. Even though social security numbers are still in use, different account numbers are now needed for banking (and especially crypto) activities. Even though security precautions such as multi-factor authentication have helped reduce the number of fraud and theft cases over time in the modern world, bank account numbers are still at risk of being stolen and used for malicious purposes if account holders do not engage in secure online banking practices. Accountability, Accountability refers to the obligation or willingness to accept responsibility for one’s conduct. When a person takes responsibility, they commit to producing favorable outcomes. This dedication is what some refer to as taking ownership of a circumstance. When an employee assumes responsibility for a certain role within an organization, they are often obliged to meet specific standards. Higher accountability leads directly to increased employee engagement. It empowers individuals to make their own choices and undertake activities that will lead to the consequences they want. Thus, accountability is vital in a corporate context. The practice of accountability also aims to eradicate instances of workplace carelessness and insubordination. Senior management has a stronger duty to be accountable since their actions have a larger impact on the business as a whole. Therefore, top executives’ actions must be examined in a thorough way to prevent misbehavior and unexpected consequences coming from erroneous decisions. Accounting Conservatism, The Generally Accepted Accounting Principles (GAAP) tenet of conservatism does not tell an accountant to be exceedingly conservative. Accountants are supposed to maintain objectivity and impartiality. However, transactions should be documented in a way that reduces profit and/or increases liabilities and costs. This is due to the fact that conservatism prefers fewer desirable outcomes. Companies use this tactic to avoid creating a misleading picture of their fiscal health or integrity. Accountants may use accounting conservatism to a variety of internal accounting procedures. Conservatism considerably reduces the negative effect of volatility, hence enhancing the brand identity. The company may get better access to funds by providing a clear picture of the organization’s conservative financial
4
Accrued Interest accounting concept of accruals, the transaction was recorded for the time when it occurred, not when it was paid. This ensures that the accounts are accurate and fair. When a customer buys something and pays later, accrued revenue is recorded. On the date of delivery, the accountant debits the receivables account. The sales account is credited. The accountant debits cash/ bank and credits sales receivables when payment is received. Accrued expenses occur when a company buys raw materials on credit. The company obtains the product before payment. The business credits trade payables and debits purchases when raw materials are received. When it pays for raw materials, it debits trade payables and credits bank/cash. Accrue, Accruals are previous revenue, interest, or expenses that have accumulated to be paid or received. A firm that sends products or services to a customer in December but receives payment in February has incurred debt. Accruals arise when a firm makes credit sales to clients or purchases raw materials on credit. The accruals accounting principle argues that revenues and costs should be recorded in the accounting period when the transactions occur, not when the money is received or paid. When the payment is received, trade receivables are reduced and cash is increased. Accruals can be assets or liabilities. Accrued Income, Accrued income is accounted for using the accrual method since the firm earned the money but did not receive it right away. It is considered differently than ordinary revenue. This accounting approach argues that money made in a period should be recognized in the same period. This is done to match expenses and revenues. One must report accrued revenue in the same accounting period it is generated in. Once the income is received, the bank or cash account is debited and the income accrued account is credited. Accrued income and accrued revenue are commonly regarded as the same, although they are distinct. Accrued income is the money made by investing, while accrued revenue is the amount created from selling products or services. Accrued Interest, Accrued interest is the interest a corporation has yet to pay or receive but has been recorded. As a lender, a corporation earns interest; as a borrower, it pays interest. These are represented as interest due or receivable on the balance sheet and income
asset, net worth, and income requirements. Different nations define an accredited investor differently. US regulations demand that a person must have earned $200,000 per year over the last two years ($300,000 with spouse’s income) to be an accredited investor and must expect the same or higher income next fiscal year. Accreditation also requires $5 million in assets. An individual or couple must have $1 million in net worth to buy (if married). Net worth does not include a person’s primary home. Congress added investment advisors and brokers to the definition of an accredited investor in 2016. Accredited investors can participate in private placements when a corporation raises money privately rather than on public markets. These typically have higher returns than public markets. Seed-funding platforms connect accredited investors with new businesses with similar ambitions. Accretion (of a Discount), An investor’s gain after buying assets at a bargain is called an accretion (of a discount). The investor gets money on the difference between the discounted buying price and the bond’s face value. In corporate finance, accretion is the value created when merging or acquiring a company. As stockholders’ shares rise in value, earnings per share climb (EPS). The straight-line or constant-yield method can be used to calculate bond accretion. A bond’s value typically rises as it nears maturity utilizing constant yield. This means some financial periods, especially those near the bond’s end, will show bigger gains. The discount accrual formula is: Accretion = Purchase Basis x (YTM/Accrual Periods per Year) – Coupon Interest. With this method, one must first compute yield to maturity (YTM) to calculate discount accretion. YTM is affected by the profit is compounding frequency. At maturity, both bond accretion calculations will profit investors. The constant yield method gives bond issuers more time before raising bond values. Accrual Accounting, Accrual accounting records transactions when they occur, even if the cash has not been received/paid. Assuming the consumer will pay soon, it is recorded as an asset till then. Expenses are also documented in the same way, thus if the business consumes an item or service on an accrual basis, the transaction must be recorded at the date of the purchase, not the date of payment. Due to the
5
Accrued Liabilities distribution and run-down. Spotify’s accumulation phase, or run-up phase, started after a strong downtrend, which took Spotify from $195 to $100 – the level where the market bottomed out. Accumulation/Distribution Indicator, The accumulation/distribution indicator determines the (current & future) trend of an asset. It does this by examining the relationship between the stock’s closing price and its volume flow. Traders constantly decide if the market is bullish (increasing) or bearish (decreasing). They do it by looking for a divergence in the price and the indicator. The accumulation/distribution line (ADL) is a tool that can be used to evaluate price patterns and possibly predict future reversals. When the price of an asset falls while the ADL rises, this indicates that purchasing pressure is there, and the price may reverse to the upside. The ADL demonstrates how supply and demand influences pricing. Trading gaps are not considered by the ADL. Acid Test Ratio, Acid-test ratio contrasts short-term assets and liabilities. Higher ratios indicate stronger liquidity and financial soundness. A ratio over one means a corporation has e. g., $2 in liquid assets for every $1 in current obligations. A high percentage (such as 10) shows idle cash, not productive utilization. A corporation with a ratio below 1 needs additional current assets. Ideal business ratio is 1. Acquisition, An acquisition occurs when one company purchases all or the majority of the shares of another company in order to control it. Buying more than fifty percent of a company’s shares gives the buyer the authority to make all operational decisions. Companies acquire other businesses for many reasons. These may include economies of scale, substantial market share, diversification, cost reduction, or the introduction of new service offerings. Prior to the purchase, a firm must determine if the target company is a suitable candidate for acquisition, and company officers must conduct due diligence on the target company. The objective is to determine whether the recommended pricing is accurate. The precise metrics utilized vary per industry. Acquisition Cost, Acquisition cost is the amount required to acquire another company. In some instances, it is also known as the cost of recruiting new clients. Acquisition expenses represent the base price paid for an organiza-
statement. Only accrual accounting uses this procedure. Accrued interest is used to account for accrued interest in bonds, which accumulates up between the issuer’s interest payment dates. Only the timing of interest payments differentiates accrued from normal interest. Accrued Liabilities, Accrued liabilities occur when a firm purchases products and services on credit without receiving invoices. Credit purchases do not damage a company’s bank or cash balances. The balance is in the balance sheet’s trade payables account. As with cash purchases, the purchase account is deducted. The company must record the expenditure for the time when it was incurred, not when it was paid. These transactions are noted in the balance sheet’s current liabilities column, and the amount is written off whenever the firm pays for the products or services. The transaction is documented when the products or services are received since the firm has benefited from the purchase. This is related to accruals’ matching principle. Accrued liabilities are wiped off once paid. Accrued Revenue, Accrued revenue is when a firm offers products or services to a consumer but expects payment later. When a corporation accrues income, it must mark two dates. The first is the day the client receives the products or services. On this day, the firm can register the sale and allocate the remainder to trade receivables. After receiving payment, the firm credits the cash/bank account and debits the trade receivables account. Many businesses allow credit sales because they may lose prospective revenue if they do not. Several sectors have slow payment periods due to insufficient liquidity. Many businesses like to buy products and services on credit. Hence, many companies provide credit sales to keep consumers. Accumulation Phase, Traders aim to detect stocks in the accumulation phase to be able to buy the asset before it starts its uptrend. They buy these securities in tranches to avoid getting detected by the market participants. At this stage, the security has been under a strong downtrend, triggering a bearish sentiment around it causing the institutions to be able to buy the security at a very attractive price. The traders anticipate great potential in undervalued security and start building up their position. There are four main stages that are part of a regular market cycle: accumulation, run-up,
6
Address in a public company in order to influence its management. Activist investors may pursue a corporation if it has significant cash reserves or if its operating expenses are deemed unnecessary. Activist investing is commonly referred to as value investing because the target company’s stock is frequently perceived as being undervalued. Activist investors hand-select companies they believe have unrealized worth or potential. When activist investors target a corporation, the returns on assets and operating profit margins are typically high. Typically, they have a decrease during the event year, followed by a recovery one year later and significant improvement two years after the event. Adam Back, Adam Back created Hashcash, which is the Bitcoin mining algorithm. He made significant contributions to the development of Bitcoin and the Bitcoin white paper. In 2014, he co-founded Blockstream, a blockchain technology business that provides advanced blockchain solutions. In 2020, Blockstream introduced Liquid.net, a centralized resource for Liquid Network data and statistics. Liquid Network provides its services to a variety of platforms, including BTCPAY and LAVA. Additionally, Blockstream established the Blockstream Scam Database to combat scammers that appropriate the Blockstream brand. Adaptive State Sharding, State, transactions, and network are the three types of sharding. Adaptive state sharding is the name given to Elrond’s method of Blockchain sharding, which combines all three forms. Combining the benefits of all three methods of sharding resulted in the most effective mechanism. The outcome facilitates parallel processing, enhances communication within the shards, and ultimately boosts performance. The present issue with blockchain technology is that it does not scale effectively for some applications, such as banking, supply chain management, and largescale analytics. Elrond’s adaptive state sharding provides blockchain with a mechanism that can improve its throughput and scalability. Address, A crypto address is a string of alphanumeric characters representing a wallet that may transmit and receive cryptocurrency. It is like a physical address, email address, or website. Each address is distinct and represents the location of a wallet on the blockchain. The majority of blockchain addresses are incomprehensible to humans, as they consist of lengthy
tion’s assets before sales tax. It relates to all costs associated with obtaining a new customer or acquiring another company. Costs involved with making a fixed asset operational are included in the purchasing price. In the crypto world, there are acquisition expenses associated with the introduction of every project. To attract the greatest talent for a blockchain project, a corporation must offer attractive compensation. This falls under talent acquisition expenses. Acquisition Premium, An acquisition premium is the difference between the amount paid by a buyer for a target company and its estimated fair value. It shows the amount paid above the company’s fair worth by the acquiring entity. There are various reasons to pay an acquisition premium, such as if multiple bids are competing for the target firm or if a purchase will provide a company with a distinct competitive edge. In the world of cryptocurrencies, something similar to an acquisition premium can occur. For example, sellers may be unwilling to part with their Bitcoin holdings while purchasing Bitcoin on an exchange. Therefore, one is compelled to purchase Bitcoin using other cryptocurrencies at a premium to the current fair market price. As a result, it could spark a bull run as more individuals attempt to purchase bitcoin above the present price. Active Management, The objective of active management is to generate higher returns than index funds. To actively manage a portfolio, active managers make investment decisions based on projections, analytical study, personal experience, judgment, and fundamental analysis. Actively managed investors are in opposition to efficient market ideals. Active management permits a fund manager to employ diverse hedging tactics, including short selling and the use of derivatives for portfolio protection. Since the crypto sector is still in its infancy, it is sense to participate in active portfolio management. For instance, certain crypto coins valued billions of dollars today could lose a significant portion of their market capitalization if a new project with superior utility joins the market. To make the right decisions at the appropriate moment, it is essential to keep a careful eye on events in the DeFi world and centralized exchanges (CEX) such as Binance and Kraken. Activist Investor, An activist investor is a person or group that purchases a significant stake
7
Administrative Expenses chance of reversal and divergence. The lines indicate the cumulative difference between rising and falling stock market indexes for that day. Major stock price changes may have a disproportionate effect on market indexes. In such cases, A/D lines are utilized to gauge the market. A falling A/D line with increasing indices is bearish divergence. A rising A/D slope and decreasing stock indices are positive. Not just the stock market uses A/D lines. This is also a technical indicator in cryptocurrencies. ADX, → “Average Directional Index” AEA, → “Autonomous Economic Agent” Aeternity Blockchain, Aeternity blockchain is a hybrid PoW/PoS system that provides efficiency, transparency, and scalability. The technology allows users to adopt decentralized systems, including public and private blockchains. Aeternity’s blockchain combines PoW and PoS consensus techniques. Aeternity’s hybrid architecture processes information off-chain for enhanced privacy, quicker transactions, and reduced costs. Aeternity strives to improve blockchain scalability and privacy. It is being constructed by a team lead by Yanislav Malahov, a blockchain pioneer and Ethereum contributor. Aeternity works by combining on-chain and off-chain functionalities using a Decentralized Oracle Machine that connects the blockchain to the outside world. Because of blockchain’s nature, smart contracts cannot access outside data. Oracles extract real-world data for blockchain smart contracts (e. g., information about weather conditions, flight times, sporting event results). Affiliate, Affiliates are formally connected entities. Affiliate status is determined by common ownership, shared management, and a contract. Affiliate thus refers to the link between two corporations. In business, affiliate has two meanings. An affiliate can be a company subservient to another under corporate law and taxes. Online retail affiliates help another brand sell products and services directly or indirectly. A subsidiary is an owned or controlled enterprise with a parent company owning most of subsidiary’s shares. An affiliate has its own management team and board of directors. A subsidiary is generally handled by parent business personnel. It is an independent company. Even if one company may own another, ownership does not necessarily imply control.
random strings of letters and numbers. However, they are all distinct, posing no issue for computer networks. Blockchain addresses are public, and a blockchain explorer can be used to view the transactions entering and leaving an address. The lone exception are blockchains that prioritize privacy (e. g., Monero and Grin). Even though the addresses are public, the majority of them are anonymous (or rather, pseudonymous), as the owner’s true identity is typically not associated with the address. Administrative Expenses, Administrative costs include salary, benefits, rent, and manager pay. These are not sales, marketing, or research charges. They are indirect expenses because they do not contribute to product manufacture. They also include legal, accounting, clerical, and IT. Administrative costs are not directly tied to producing services and goods, hence they are not included in gross margins. Administrative costs help a corporation perform vital operations, boost efficiency, and oversight, and comply with law. They are frequently fixed and incurred as part of business operations. Since administrative costs may be often cut without hurting output, they are frequently cut first. Management is driven to keep these costs low since it improves leverage. Like at other companies, crypto investors analyze administrative costs before investing in blockchain projects. Adoption Curve, Adoption curves show how a market adopts new technology. Adoption is often depicted as a bell curve with innovators being the first to utilize a new product, followed by early adopters. Laggards are the last to adopt a product. Different market sectors accept a new product or technology at different times and for different reasons. Blockchain technology illustrates well the adoption curve. In the early 1990s, cryptographically secured blockchains were created, but Satoshi Nakamoto established the blockchain architecture only in 2008. The first genesis chain mined in 2009. Since then, more than 80 % of Bitcoins have been mined and 5,000 cryptocurrencies have been created on blockchains. ADTV, → “Average Daily Trading Volume” Advance/Decline Line (A/D Line; ADL), A/D line illustrates the difference between rising and falling equities. A/D line shows traders the growth and fall of assets. It is used to validate main index price trends and warn of reversals if divergence develops. It anticipates the trend’s
8
AI not represent themselves. The agent-principal relationship has three aspects: Principal and agent agree to an agency relationship in writing, verbally, or tacitly. The agent has the same capacity as the principal to make legal choices, such as signing contracts with new rights and obligations. The principal controls the agent’s actions to ensure correct and honorable service. Third parties may think this agent can perform management duties. In fraud cases, the principal may be accountable for a sub-act of his agents. Aggregate Demand, The measure of aggregate demand is the overall demand for all completed products and services in an economy. It is the total of everything bought by enterprises, households, the government, and foreign customers through export less the portion of demand supplied by imports from foreign producers. According to Keynesian economists, aggregate demand will grow if companies seek high levels of investment and consumers are ready to spend rather than save. According to monetarists, aggregate demand is governed by the quantity of money in circulation. In 1937, a synthesis known as IS-LM was developed. In IS-LM, both the money supply and the saving-investment balance influence aggregate demand. It includes the interest rate as a factor in determining the velocity of money. If the government boosts expenditure, which is an injection, it raises interest rates, which in turn increases the velocity of money, leading to a rise in nominal GDP. Aggressive Investment Strategy, An aggressive investing approach aims to maximize profits by accepting significant risks. An investor may be aggressive in several ways. Smallcap crypto or stocks may appreciate more than large-cap assets. Prices may double if the company model works and generates more income. Investors may lose money if the firm fails. Emerging markets may swiftly compound as their economies develop. In many nations, poor institutions and governance pose a danger. High regulatory and political risk arise. When investing in crypto, one may select Bitcoin and dino alts that are more stable than memecoins that provide greater risk/reward. Another way to reduce danger is to utilize a trustworthy exchange like Binance, which has appropriate security procedures in place. AI, → “Artificial Intelligence”
Affiliate Marketing, Affiliate marketing is when a business or person is paid to promote another company’s products typically online. Affiliates promote a retailer’s website online to increase traffic and sales. Each click or transaction pays the affiliate. Affiliate marketing is therefore driven by customer purchases. Decisions in Affiliate Marketing are often based on product categories, commission, payment terms, etc. Affiliates may also work with other companies or affiliate networks to promote links on their website, newsletters, and social media. Agency Problem, Conflicts often arise when persons entrusted with defending others’ interests (the agents) use their influence for personal benefit. It is a common problem that impacts companies and governments. Organizations combat it via tight screening methods, prizes for successes, sanctions for bad conduct, and watchdogs. No organization can fully handle the problem since the expenses exceed the benefits. Common agency problem avoidance methods are to include major shareholders, especially mutual funds, life insurance firms, and pension funds in a company. One idea is to compensate managers for serving owners e. g., with stock options. This incentive tends to motivate managers to operate in a manner that maximizes share price by giving them a financial incentive to do so. Agency Theory, Agency theory describes principals and agents in business. This idea explains shareholder (company owner) and firm leader conflicts (agents). Agency theory recommends how to manage company contacts to minimize disagreements. In an organizational environment, agency theory refers to how a corporation may motivate or inspire its agents (including its employees) to behave in the organization’s best interest rather than their own. To avoid the agency dilemma, a company must provide precise contract wording and guidelines for managers, employees, and consultants. It should be clear about the agent’s authority and align interests by linking compensation to certain duties or results. Agent, Agents represent another side and sign contracts for its principal. If the agent fulfills its duty, the principal may be liable. Every employee who represents a business to end a debate or finish a sale is acting as the firm’s agent, as companies are legal entities and can-
9
Air Gap ponents of cryptocurrency. Many contend that his policies, which are sometimes referred to as easy-money policies, caused the dot-com boom disaster and the 2008 housing market catastrophe. Greenspan, however, denies these ideas. According to him, the 2008 housing collapse was not the consequence of low short-term interest rates, but rather a worldwide phenomenon that led to a gradual decrease in long-term interest rates. In 2017, Greenspan compared bitcoin to the continental money, a currency produced during the American Revolutionary War in 1775. The 2008 financial market meltdown was the impetus for the invention of Bitcoin, which debuted in 2009 shortly afterwards. Its purpose was to restore economic power to the people. In this respect, blockchain technology has been highly successful. Algorithm, An algorithm, often known as an algo, is a collection of rules designed to solve a problem. In algorithms, the sequencing of instructions is very significant. Every single computing device uses algorithms to solve issues. Algo trading is the process of doing automated trading. A computer program is used in algorithmic trading to purchase and sell assets. Algorithms may assist businesses in achieving substantial cost reductions. Financial institutions use algorithms stock trading, loan pricing, and asset-liability management. Algorithms do many of the arduous activities that humans would otherwise have to perform manually. Algorithms are especially effective for automating the purchase of cryptocurrency if a specific price threshold is reached. A trader may, for instance, establish instructions to purchase X amount of cryptocurrency whenever the moving average hits a given value. Algorithmic Market Operations (AMOs), In contrast to stablecoins, which physically mint or burn to grow or reduce their supply, algorithmic stablecoins depend on algorithmic market operation modules (AMOs) to automatically manage supply. By offering an AMO solution, a stablecoin has a greater chance of achieving the requisite growth and scale for acceptance. AMOs also eliminate the need for a centralized staff since smart contracts will take on this responsibility. This decreases the likelihood of human mistake and manipulation. Each AMO has the following four characteristics: decollateralization, market operations, recollateralization, and FXS1559 (the precise amount of FXS
Air Gap, The idea of idea gap is based on the believe that if data cannot be accessed, it cannot be contaminated or corrupted. In IT, this is often done as a duplicate copy of data on an offline secondary storage system not linked to any production or public networks. This second data copy is safe from assaults and corruption if the air gap is maintained. Companies use air gap data as a last resort. The air gap is used to complement current backup, recovery, and disaster recovery systems. Air gaps might be array-based, backup-based, or object-based. Airdrop, A way of releasing cryptocurrencies to the public based on their ownership of other tokens or wallets on a specific blockchain is known as an airdrop. Typically, this is done for marketing objectives to incentivize the ownership of other tokens or persuade others to join the blockchain network. Airdrops often require users to keep a certain number of tokens in a publicly available wallet at a specified time (snapshot time). Airdrops enable users to diversify their cryptocurrency holdings, promote knowledge of the airdropped token, and receive a dividend in effect (of their previous holdings). The majority of airdrop campaigns include getting cash or tokens in return for basic acts such as spreading news, introducing friends, or installing an application. Airnode, The decentralized web, or Web 3.0, is the next iteration of the internet. Using blockchain, it revolutionizes how the world exchanges assets. Airnode is an open-source Web3-API middleware that facilitates the connection of any web API to a blockchain application. Decentralization, the foundation of Web3 security, has become a concern for API provider as there is no direct connection between smart contracts and APIs that allow access to real-world data and services. Airnode is a Web3 oracle solution for the API economy. a serverless, maintenance-free platform that connects any web API to any blockchain application. Airnode removes the need for a middleman and can immediately connect any company to blockchain applications while retaining 100 percent of income. It is a free and open-source platform that permits users have complete control over their blockchain connection. Alan Greenspan, Alan Greenspan, an American economist, was the thirteenth chairman of the Federal Reserve from 1987 until 2006. Greenspan is one of the most outspoken op-
10
Allotment Allocation, Allocation is a cryptocurrency portfolio term. Crypto asset allocation includes allocating a portion of Bitcoin and altcoins. To ensure long-term profitability, blockchain projects must allocate their tokens and budgets to marketing, software development, and operating costs. Many blockchain projects have treasuries and foundations with their own tokens. Blockchain firms often give early team members tokens they cannot sell for a limited time. Investors can invest in multiple rounds. Private sale rounds may benefit early investors because projects allocate many tokens as a courtesy for their initial investments. Each investor in this case would receive a portion of the total sale amount. As a reward for their efforts, team members working on a currency, protocol, or project may receive tokens before the sale. These allocations could be phased out over time or given all at once at the token generation event (TGE). Allocation Efficiency, Allocation efficiency is assigning capital so that all parties benefit and resources are spent on projects that will lead to growth. This is most easily achieved when all parties have accurate market data to allocate resources. Investors then can make profitable decisions with all relevant data. Overall market efficiency is required for allocative efficiency when all market data is accessible to all participants and reflected in asset prices in efficient markets. The Top 100 cryptocurrencies are currently considered informationally efficient. Decentralized exchanges like Uniswap have been used to make the crypto market efficient. Small market cap altcoins may not have complete price data and zthus are market inefficient. Market manipulation, which causes rug pulls, could be behind the current price. Profitability of crypto arbitrage also indicates inefficiency. Allotment, In business, an allotment is the allocation of company shares to applicants. Companies often issue stock through IPOs. When a company goes public, private shareholders’ shares become worth the public trading price. Before launching an IPO, participants estimate demand. Allotment processes can be complex. Oversubscription is when company stock demand is high. The allotted shares are less than requested. This oversubscription causes the IPO share price to spike. If demand is lower than expected, there was an undersubscription, and share prices fall once the IPO starts. This
that can be burned and still leave profits above the targeted collateral ratio). Because AMOs may be defined as a mechanism-in-a-box, anybody can construct one so long as they adhere to the standards. Algorithmic Stablecoin, By being pegged to a reserve asset such as the US dollar, gold, or any other foreign currency, an algorithmic stablecoin is intended to establish price stability and balance the circulating supply of an asset. In other words, an algorithmic stablecoin employs an underlying algorithm that can issue more coins when its price rises and purchase them off the market when their price falls. These currencies provide traders with many of the advantages of crypto assets such as ETH and BTC without the danger of excessive price volatility. Ampleforth is the longest-running algorithmic stablecoin at now (AMPL). Algorithmic Trading, → “Algo-Trading” Algo-Trading (Algorithmic Trading), Algo- trading places buy and sell orders based on a computer program or algorithm. It may consider price, timing, and volume. Alga-trading software places orders when market conditions match the algorithm. Algo-trading uses complex rules and conditions to build a profitable formula and allows faster and more frequent portfolio trading than manual orders. Instant orders in algo-trading ensure best prices and reduce slippage. Algo-trading is used in many markets, but it offers more benefits in 24/7 cryptocurrency markets, where traders risk losing opportunities while sleeping. Arbitrageurs who use price differences can use algorithms. Algo trading also helps short-term traders and scalpers capture profits from smaller market movements and avoid chasing losses. All Risks Coverage, All-risks insurance covers any contract-excluded risk. Also flood damage is covered by all-risks property insurance if not excluded which is a property insurance is all-risk and named-peril covering basically a certain events vandalism and fire. All-risks coverage requires physical loss or damage. Insurers must always prove coverage exclusion. After e. g., power outages, small businesses can file claims. The insurer could, however, say the lost income was due to a power outage, not a property loss. Of course, a c Comprehensive insurance is expensive. Therefore, costs and claim likelihood must be weighed.
11
All-Time High (ATH) Altcoin Trader, Altcoins are cryptocurrencies other than Bitcoin, thus the name. Altcoins are blockchain-based but use different consensus mechanisms. Altcoin developers often promote their coin as superior to Bitcoin (such as a faster transaction speed, cheaper transaction fees and so forth). Altcoins compete with Bitcoin for market capitalization, hoping to overtake it. Ethereum, XRP, Litecoin, Cardano, and Dogecoin are well-known altcoins. Altcoin traders normally trade daily to make short-term profits. Altcoin traders also aim to strategize based on real-time news and anticipate optimal timing to realize greatest potential gains, but can also incur big losses instead from the price volatility. Altcoins, Altcoin is a term used to describe any digital currency that is not Bitcoin. As Bitcoin was the first cryptocurrency, all subsequent cryptocurrencies are considered alternatives or Altcoins. Alternative Investments, Alternative investments encompass all asset classes besides stocks, bonds, and real estate. Private equity, venture capital, hedge funds, collateralized loan obligations (CLOs), real estate, and other non-traditional investment vehicles are examples. Private equity investments are those made in privately held companies, as opposed to those traded on public markets. Hedge funds are investment vehicles that employ a variety of investment strategies, such as short selling, derivatives, arbitrage, and credit arbitrage, in addition to other esoteric investment strategies that are frequently unique to the fund. A CLO is a securitization of a debt pool, in this case a portfolio of loans that finances the real estate purchase. A real estate investment trust (REIT) is a publicly traded company that owns commercial real estate properties such as office buildings, shopping centers, hotels, hospitals, and apartments. Amalgamation, A merger combines two or more organizations. An organization can be a business, nonprofit, society, trust, or other legal entity in that jurisdiction. Two or more legal entities merge into one company through amalgamation. Mergers can benefit both companies. Combining two companies’ specialties expands their service range. Through this method, two companies with different target markets may combine their customer bases, expanding both groups’ clientele. An amalgamation makes it easier for a company to obtain bank financing.
means investors do not get their desired allotment and must pay a lower price. In crypto, a share allotment occurs via an ICO or the popular initial DEX offering (IDO). Investors buy tokens instead of shares during an ICO. ICOs rely on investor trust, while IPOs have legal backing. Unregulated ICOs have shaky legal grounding in case something goes wrong. All-Time High (ATH), The highest point (in price, in market capitalization) that a cryptocurrency has been in history. All-Time Low (ATL), The lowest point (in price, in market capitalization) that a cryptocurrency has been in history. Alpha NFT, When someone shares non-public information about an NFT project with another person and it leads to a rapid increase in investment return. Alpha Version, Scientists use the first letter of the Greek alphabet to indicate which experiments and projects need further study with Alpha being a pre-release version. Alpha versions of software are normally released to test usability and interface. Alpha testing is often done with a small group outside the product’s developer unit (often under strict confidentiality agreements). Alpha testing typically continues until all bugs are fixed. Due to the early release, testers will have fewer expectations about how the product should work or be used. They are more willing to provide feedback on buggy, confusing, or hard-to-use product parts than long-time users. In contrast, Beta versions are released to many users outside the company to get feedback on how well the program works and what features need improvement. The time between alpha and beta releases varies by product, but it is usually months. Alphanumeric, Alphanumeric means containing both letters and numbers, or a character with both. In the world of cryptocurrencies, this refers to setting a password for a wallet or exchange, where both letters and numbers should be used for maximum account security. The more one mixes and matches, the less likely their account will be compromised. A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, and Z are alphanumeric, as are 1,2,3,4,5,6,7,8 and 9. Almost every cryptocurrency exchange requires the users to create a strong password to use the exchange to protect the users.
12
Anchoring and Adjustment must implement. Directives are not legally binding, but violators may face fines. Despite the deadline, some member states have not met AMLD5’s requirements due to regulatory challenges. AMLD5 has introduced new requirements for cryptocurrencies, Ultimate Beneficial Owner (UBO) registers, and prepaid card transaction limits. It is expected to improve the EU’s anti-money laundering (AML) and combating the financing of terrorism (CFT) policies by closing loopholes exploited by financial criminals and aligning its efforts with new FATF Standards, which were updated in June 2019 to include virtual asset and virtual asset service provider guidance. AMLD5 provides updates on fiat-to-crypto companies, custodian wallet service providers, customer due diligence for funds from high-risk third countries, UBO registration, and Politically Exposed Persons (PEP) screening. AMMs, → “Automated Market Makers” AMOs, → “Algorithmic Market Operations” Anarcho-Capitalism, Anarcho-capitalism advocates for the abolition of centralized states and private property and contractual agreements. Anarcho-capitalists believe the state as it is conceived is an impediment to a free society and that states in capitalist societies result in coercion. The free market is the cornerstone of a truly free society, and people should be free to engage in contractual agreements without state oversight. Instead of the state, free-market private agencies would enforce contracts and resolve grievances. Anarcho-capitalists believe production means should be privately owned and organized through wage labor. Many anarcho-capitalists believe blockchain-based decentralized technologies can solve practical problems with d centralized services providing immutable and publicly available records of identity and contractual obligations. Smallscale experiments (e. g., the Norwegian city Liberstad) have created anarcho-capitalist communities. Anchoring and Adjustment, Anchoring is basing decisions on a belief e. g., in negotiations. Anchoring means beginning a negotiation with a high or low number, since people tend to stick to their initial valuations. Anchoring and adjustment thus means starting from a (too) high or (too) low position and adjusting down or up. If the buyer starts low and the seller starts high, it is always possible to meet in
Investors may be more confident in a merged company with a diverse and stable funding source than in a smaller company with fewer investors. An amalgamation can be beneficial but also challenging. However, it may be harder for the merged company to be as efficient as before. This is true if the companies use different business models or if one is more efficient. In a reverse take-over, a smaller company buys a larger one using the larger company’s shares as payment. Amazon S3, Amazon Web Services (AWS) offers S3 as cloud storage. It was first released in 2006 to provide cloud storage through a web interface. Amazon S3 uses the same storage architecture as its global e-commerce business and can store web applications, data archives, data recovery, recovery plans, analytics, hybrid cloud storage, and more. Amazon Managed Blockchain and Amazon S3 secure and store blockchain data. Amazon S3 users can protect their data with encryption and access management tools. S3 Block Public Access is a simple storage solution that restricts public access to bucket or account-level objects. S3 complies with PCI-DSS, HIPAA/HITECH, FedRAMP, EU Data Protection Directive, and FISMA. The platform offers auditing options for tracking S3 access requests. AWS Identity and Access Management (IAM) establishes users’ databases and manages their access. Access Control Lists (ACLs) make specific items available to authorized users. Bucket policies set permissions for all S3 objects. Amazon S3 offers server-side and client-side encryption for uploads. Amazon VPC endpoints can connect to S3 resources. Amended Return, An amended tax return revises the original to correct e. g., errors, claim new deductions or credits, or add new information. Depending on the situation, one can file an amended tax return online, by mail, or hybrid-style. Typically, tax authorities provide a deadline. The IRS may audit both original and amended tax returns, which could mean a thorough audit. The IRS may take 16 weeks to process amended returns. AML, → “Anti-Money Laundering” AMLD5, AMDL5 is an update to the EU’s Anti-Money-Laundering framework. It took effect on July 9, 2018, and required EU member countries to update their laws by January 10, 2020. An EU directive is a legal framework with a common goal that each member state
13
aNFT (Autonomous NFT) al percentage yield (APY) measures a money market account’s yearly earnings. This method tracks interest accumulation over time. Compounding creates money over time, making it a powerful investment tool. There are several crypto yield programs to choose from. Fees, entry barriers, interest-earning procedures, and crypto asset types vary by platform. There are also introductory APYs that crypto exchanges offer and one need to be careful before investing in them. Some of these programs utilize the strategy of offering higher APYs to attract customers in the beginning and drop the rates after trapping a big pool of customers. Annual Report, A company’s annual report is an essential document because it provides a comprehensive understanding of the company’s financial performance and future prospects. However, it is much more than a tedious document filled with graphs and numbers that nobody will ever read. As a potential investor, understanding the information contained in a company’s annual report can be crucial to the decision-making process regarding the purchase of its stock. An annual report is a document issued by a company at the end of each fiscal year (the 12-month period that typically ends on December 31) that summarizes the company’s financial performance over the course of the year and its future prospects. The majority of nations require companies to issue annual reports to their shareholders, although the specifics of the report’s conclusion vary from country to country. Annualized Rate of Return (ARR), Annualized rate of return is a method of measuring and monitoring the performance of an investment over time. It is a measurement that enables investors to compare one asset against another. There are various ways to calculate and utilize this rate. The basic method for calculating an annualized rate of return is the simple annualized return. It is computed by multiplying the annual percentage gain by the number of years required to attain that gain. The effective annualized return accounts for the effect of compounding. It functions similarly to the simple annualized return; however, the key difference is to consider the increase in capital each period in order to calculate the future amount. Depending on the circumstances, both approaches to calculating an annualized return have restrictions. If investment returns do not
the middle. Anchoring and adjustment are used in relative worth theory to achieve higher prices. aNFT (Autonomous NFT), aNFTs can interact proactively with Web3 users and network protocols. They enable a near-limitless array of complex, open-ended Web3 interactions. After one initial transaction, an aNFT is self-contained and does not need humans. It uses incentivized networks (bots) like Autonomy Network to trigger actions when conditions are met. aNFTs can be programmed to transfer assets (including themselves), be NPCs in crypto games, trade/make purchases, lend/borrow, vote, and send messages, play with or against each other in a game, perform off-chain actions based on off-chain events, and upgrade their own logic. aNFTs improve NPC gameplay. NPCs can be friendly merchants or enemies in a game so a player might be fighting a smart contract when playing against an NPC. In Web3, the environment is the blockchain, making gaming player-vs.-blockchain (PvB). Angel Investor, An angel investor provides funding to a company in its infancy stages of development. Angel investors, in contrast to venture capitalists, who are typically tied to a professional venture capital firm and invest a pooled sum, are solitary individuals who assume their own risks and finance a vision they support. Angel investors are frequently rewarded with equity in a company for their support of a new venture. If the venture is successful, angel investors will receive a return on their investment plus a profit. Numerous new blockchain companies in the cryptocurrency industry are funded by angel investors, who are frequently identified through investment and entrepreneurial networks. Annual Percentage Rate (APR), Annual percentage rate (APR) is the monetary value or reward that investors can earn by making their crypto tokens available for loans, considering the interest rates and any other fees that borrowers must pay (APR). Multiple platforms encourage customers to stake their crypto assets by offering a high annual percentage yield (APR). APR does not include compounding interest. Annual Percentage Yield (APY), APY is a cryptocurrency savings account like APR. One can deposit bitcoin (or another cryptocurrency) and receive a fixed return over time. The annu-
14
Antitrust Law run on thousands of computers at once, making it impossible to take offline. Anti-Malware, Coincident with the rise in popularity of cryptocurrencies has been an increase in malware infections that infect computers. Malware designed to mine cryptocurrency is designed to infect botnets of computers. Malware refers to any type of malicious software that is designed to cause damage to computers and computer systems. It can be utilized for profit, extortion, surveillance, activity restriction, remote control, deletion, and dissemination of false or illegal information. Malware that mines cryptocurrencies depletes the resources of infected computers, reducing their productivity and causing operating system failure. These viruses can compromise the dependability, security, and privacy of a network or system. Before becoming a victim, it is preferable to take preventative measures and install antivirus software. Anti-malware and antivirus tools that adhere to industry standards can identify risks across the board and protect against cryptojacking malware. Anti-Money Laundering (AML), Anti-Money Laundering (AML) is a set of laws and regulations enacted to prevent the illegal movement of funds around the world. Money laundering is the practice of concealing the origins of (illegally obtained) cash by passing it through a series of typically intricate transfers or transactions. These transactions are generally legitimate and would therefore not be flagged, allowing the original owner of the illicit funds to use them for legitimate purposes. AML targets criminal activities such as illegal goods trading (drugs, contraband, etc.), public office corruption, and tax evasion, among others. It focuses specifically on methods for concealing these crimes and the money gained from them. If criminals cannot successfully transfer the proceeds of these illegal acts, they would be dissuaded from committing them. Therefore, financial institutions are required to monitor the transactions and deposit records of their customers, particularly when they appear to be unusually large. Antitrust Law, Antitrust is a set of laws prohibiting unfair competition and monopolistic business practices. Although antitrust laws aim to protect consumers, they also provide certain protections for businesses. Price fixing, tying, market allocation, and predatory pricing are
occur uniformly throughout the year, the simple annualized return method can be deceiving. Anonymous, Anonymous is when something is of unknown authorship or origin: someone who is not named, identified, or known. Their anonymity can be because they want to remain anonymous. They lack individuality, distinction, or recognizability. Anonymity has been one of the primary appeals of cryptocurrencies throughout their history. One such anonymity-oriented technology is found in Zcash, which has implemented a cryptographic tool known as zero-knowledge proof and can grant any participant an option to shield their transactions, which allows them to transact without the need to reveal their addresses. It also obfuscates the transaction amount — this is a good example of anonymity in cryptocurrency. Anti-Dump/Anti-Dumping Policy, An anti-dumping policy is a set of rules that prevents investors from falling victim to pump and dump schemes. Dumping is a term that refers to an occurrence when a big investor, also known as a whale, buys a huge number of tokens with the intention of substantially increasing the price before selling all of it for a large profit. Coins such as Squid, Thundercake and DrunkDoge have policies in place to keep whales out of their ecosystem. Companies also sometimes use a buyback policy for many reasons—to lower the number of tokens in circulation with time. The aim is to significantly raise token values, generate speculation, and build hype. Several projects have conducted buybacks including Binance, Nexo, and others. Anti-Fragile, When an asset is anti-fragile, it tends to perform better during risk and uncertainty. This fits the narrative that some cryptoassets, BTC included, experience price gains when stock market uncertainty hits, cementing the narrative that it is a safe haven asset like gold. When an asset is antifragile, it gets stronger after a setback. In this regard, analysts point to how BTC thrived despite the 2018 crash, when prices fell 80 % in a year. The idea that Bitcoin only exists because some people believe in it makes it weak. It allows outsiders to believe the issue can vanish like a fashion trend. The anti-fragility hypothesis says Bitcoin gets stronger with every hit. Another anti-fragility factor is that Bitcoin cannot be shut down by a single party. Decentralized blockchains
15
Antivirus Application Layer, The application layer is the ultimate OSI model layer. It specifies how a communication partner, such as a process or software application, interacts with other applications. The application layer is accountable for providing the user with interfaces and services. It also provides support for services like as message handling systems, shared database management systems, and transaction processing systems, among others. An application is closer to the end-user, allowing for direct user-software contact. It enables database access, remote login, file transfer, electronic mail, multimedia conferencing, and file transfer. The application layer also offers an interface for resource sharing between the network and the application software. This enables users to share network resources such as files, printers, and databases. Application Programming Interface, API is the abbreviation for Application Programming Interface. It is a collection of protocols, tools, and procedures for developing software applications. APIs define how software components should communicate, including which data and actions to utilize. Application-Specific Integrated Circuit (ASIC), An ASIC (/esk/) is a custom-made IC chip for a specific function. ASICs include chips for digital voice recorders and high-efficiency video codecs (like AMD VCE). Application-specific standard products (ASSP) are between ASICs and ordinary ICs like the 7400 or 4000 series. MOS integrated circuits are used to make ASIC chips. The maximal complexity (and hence usefulness) of an ASIC has expanded from 5,000 logic gates to over 100 million. Modern ASICs include microprocessors, ROM, RAM, EEPROM, flash memory, and other big blocks. ASICs are frequently called SoCs (system-on-chip). Digital ASIC designers commonly utilize Verilog or VHDL to explain ASIC functionality. APR, → “Annual Percentage Rate” APT, → “Arbitrage Pricing Theory” APY, → “Annual Percentage Yield” AR Token (Arweave), Arweave is a new sort of decentralized storage that enables users to retain data indefinitely by using cutting-edge technology. The maximum quantity of AR tokens is 66 million, of which 55 million were issued when the mainnet launched and the
the four principal antitrust violations. Initially, antitrust laws were enacted to prevent the formation of monopolies. The purpose of antitrust laws is to protect consumers by fostering competition. If businesses are found to be in violation of the law, they face fines or even closure. There are two primary types of antitrust cases: cases initiated by the government and private lawsuits. The government can also issue orders prohibiting specific activities and mandating the sale of assets by businesses. Antivirus, Computer viruses are as old as computers. These self-replicating codes were originally harmless. Their goal changes quickly. A virus is a malicious executable file or piece of code. First antiviruses appeared with first viruses. Today’s anti-virus software protects computers from viruses, adware, spyware, ransomware, keyloggers, backdoors, rootkits, trojans, worms, dialers, fraud tools, etc., but it also often functions as a network firewall, protecting from DDoS attacks, spam, scam, and phishing attacks. Antivirus software works by scanning for known virus signatures, using heuristic analysis to look for code that resembles known viruses, and monitoring for suspicious behavior, such as accessing certain files and registries, changing permissions, and copying without user consent. Antivirus software must be regularly updated to keep up with new viruses. Every day, new malware is developed to attack crypto wallets and user private keys. Apeing/Ape In, Apeing is when a cryptocurrency trader buys a token immediately after the token project launch without completing full research, generally because they are frightened of losing out on possible profits that might be lost if they pause in order to complete due diligence. The word apeing gained popularity during the DeFi Summer of 2020, when abrupt and unannounced token project releases resulted in a tiny percentage of traders realizing huge gains from the purchase of project tokens within a very little period following the original launch. As news of these enormous profits spread over social media, other traders attempted to imitate them by purchasing tokens of every newly released project without completing much investigation. This low IQ method of picking tokens to purchase is what gives apeing its moniker. API, → “Application Programming Interface”
16
Aroon Indicator Arbitrageur, Arbitrageurs exploit price inefficiencies between marketplaces. Arbitrageurs will invest in a market if it delivers risk-neutral profit. They are risk-taking and financially savvy. Arbitrageurs benefit by buying something below its genuine worth at a discount and selling it at its true value with a profit. Arbitrageurs earn money many ways. All rely on speedy transactions. Arbitrageurs profit from longterm pricing inefficiencies. Currency arbitrage involves simultaneously purchasing and selling two currencies. This method usually involves a future, forward, or options contract between two parties. Crypto arbitrage happens when an arbitrageur buys a coin pair at a cheaper price from one platform and sells it at a higher price from another. ARIMA, → “Auto-Regressive-Integrated-Moving-Average” ARIMAX, Extension of the ARIMA model with an exogenous variable, which means the forecast is dependent on an extra outside variable. This could be anything of interest, such as inflation rate or price of a different index, provided the data is at hand. Arm Virtual Machine (Qtum), Qtum (QTUM) is a cryptocurrency and smart-contract-enabled platform that allows users to run decentralized applications on its blockchain. It is one of several platforms that support decentralized applications, along with Ethereum (ETH), EOS (EOS), Neo (NEO), and others (dApps). dApp-enabled platforms use smart contracts (self-executing programs run by blockchain nodes) to operate business and customer-oriented apps without middlemen and their inefficiencies. Qtum’s arm virtual machine environment runs these apps. A virtual machine simulates an operating system on another physical machine. By running multiple operating systems on a single server, virtual machines save IT space, time, and management costs. Qtum ran on the x86 architecture until 2021. Arm and x86 are RISC and CISC architectures, respectively. Aroon Indicator, The word Aroon in the Sanskrit language means the earliest light of dawn. Like the Average Directional Index, Tushar Chande developed the Aroon Indicator in 1995, which determines whether the value of an asset/stock/cryptocurrency is increasing and how strong the trend is (ADX). The indicators track the number of periods that have passed since a price reached an x-day high or low. Aroon
genesis block was formed. Once all 66 million AR tokens have been created, this cryptocurrency will experience deflation. Proof of Access (PoA) is an alternative to the traditional consensus process of blockchains. Miners on Arweave are not required to store all blocks, which reduces their power use. The immutability of the network’s stored data is an additional important characteristic. Its front-end is what makes it an easy-to-use platform, since it was created with the user in mind. Arbitrage, Stock and cryptocurrency exchanges are inefficient by nature owing to variables such as information availability, trading tools and strategies, transaction costs, and human psychology. These inefficiencies cause price differences in multiple marketplaces for the same item, such as a cryptocurrency. Arbitrage traders exploit price disparities by purchasing an asset in one market and selling it in another. Because arbitrage involves purchasing and selling the same amount on several markets, the arbitrageur takes little to no price risk. Arbitrage is only risky since it must be executed quickly and trading costs are high (commissions). Arbitrage trading may include many marketplaces and assets. Triangular arbitrage includes purchasing and selling three assets in three marketplaces. Automated trading tends to remove arbitrage trading possibilities fast, making the activity harder for traders. Arbitrage Pricing Theory (APT), The Arbitrage Pricing Theory (APT) is an expansion of the Capital Asset Pricing Model (CAPM). It was created in the 1980s and offers a framework for assessing market efficiency and discovering arbitrage possibilities in financial markets. The idea is founded on three fundamental concepts: risk, opportunity cost, and equilibrium. Arbitrage is a trading strategy that entails earning risk-free profits by concurrently trading on two or more marketplaces. Arbitrage possibilities are uncommon in many markets because marketplaces are seldom comparable, making it hard to have the same opportunity in all markets (unless one uses some type of black box computer trading system). The arbitrage pricing theory (APT) is an economic theory that investigates the connection between asset prices and risk. It emphasizes the concept that if two assets are priced differently, an investor may earn a risk-free profit by purchasing one and selling the other.
17
ARR trendlines serve as resistance and support as the price of the asset or cryptocurrency advances. A trader will initiate a long position for a bullish ascending channel when the stock breaks through resistance and closes above it. Channels that are ascending suggest that a stock has been growing steadily in a particular direction over time. Before entering a short position, traders should look for signs of pattern weakness. A red flag is a price that fails to cross the upper trend line on multiple occasions. In some ways, the ascending channel pattern resembles the envelope channel pattern. It is also easier to identify on a price chart because parallel trendlines clearly mark it. Ashdraked, The term ashdraking was coined in response to the activities of Lord Ashdrake, a prominent Romanian Bitcoin trader with an alias in the middle of the 2010s. Ashdrake was a prominent skeptic of cryptography. He was committed to shorting BTC, or betting that the value of the digital asset would decrease. Between 2014 and 2015, Bitcoin’s value plummeted by nearly half, and he became a prominent voice urging traders to adopt short positions, during which time he achieved considerable success. When Bitcoin surpassed $300, Lord Ashdrake shorted the currency once more, but this time the market was against him. Just a few weeks after the $300 mark was reached, prices soared, surpassing $500 and nearly reaching $600. Ashdrake maintained an exclusive aggressively short position, which ultimately resulted in the loss of his entire capital investment. ASIC, → “Application-specific integrated circuit” ASIC-Resistant, ASIC refers to an application-specific integrated circuit, which serves as the foundation for popular cryptocurrencies like Bitcoin. ASIC miners have a million times greater performance than a desktop PC, rendering the latter obsolete for mining in the present day. PC mining became obsolete as the majority of hashpower migrated to enormous mining pools located in regions with access to cheap electricity and favorable legal conditions. Early in 2021, a power outage in Northern China caused the Bitcoin network hashrate to drop by half for several days. This circumstance undermines and jeopardizes the central tenet of crypto philosophy: decentralization. Theoretically, a cryptocurrency resistant to ASICs is more
crossovers can be utilized as trading indicators. Typically, overlaps between the two Aroon indicators are interpreted as trend shift or market reversal signals. The Aroon Up is lower when the uptrend is weaker and the decline is larger, and vice versa. Because the buy or sell signal is not predictive and uses historical data, it may arrive after a significant price movement has already occurred. ARR, → “Annualized Rate of Return” Artificial General Intelligence, A computer system that is as smart or smarter than a human. An Artificial General Intelligence (AGI) system could successfully perform any intellectual task that a human being can do. Here, the focus is on generality, i. e., that the system has not been tailored to one single task. We are still a long way off from creating AGIs. Artificial Intelligence (AI), As opposed to animal and human intelligence, artificial intelligence (AI) refers to the intelligence exhibited by machines. Previously, the term artificial intelligence referred to machines that mimic and demonstrate human cognitive skills that are associated with the human mind, such as learning and problem-solving. This definition has since been rejected by leading AI researchers, who now describe AI in terms of rationality and acting rationally, which does not limit the ways in which intelligence can be expressed. AI applications include sophisticated web search engines (such as Google), recommendation systems (used by YouTube, Amazon, and Netflix), understanding human speech (such as Siri and Alexa), self-driving cars (Tesla), automated decision-making, and competing at the highest level in strategic game systems (such as chess and Go). As machines become increasingly capable, tasks considered to require intelligence are often removed from the definition of AI, a phenomenon known as the AI effect. Artificial Narrow Intelligence, Artificial Intelligence (AI) systems that are good at one specific task, which they are trained and developed on. Examples of this could be predicting house prices based on historical data or recommendations of YouTube videos. Most progress in recent years happened in ANI. Arweave, → “AR Token” Ascending Channel, An ascending channel is a set of price highs and lows contained between parallel lines that slope upwards. These
18
Atomic Swap and wallets, crypto asset management platforms consolidate their holdings. AUM is an important KPI for funds and their management. Astroturfing, This is a controversial method making marketing and PR messages appear natural in a grassroots community. Political groups and businesses have long used astroturfing. The tobacco industry created the fake National Smokers Alliance lobby group. Microsoft sponsored a pressure group to create the illusion of support during an antitrust lawsuit. The Kremlin allegedly built a vast army of fake online profiles and bots to sow disinformation globally. Internet use boosted astroturfing’s popularity. Now, almost any organization can easily create a network of fake online identities that post whatever it wants. Advanced persona management software can give each a fake IP address and online history. Astroturfing persists in the crypto community. Telegram and Discord are popular channels for generating ICO interest. There are now dozens of marketing companies running crypto-specific astroturfing campaigns. Rapid growth in Telegram and Discord membership can indicate astroturfing. Asynchronous, Asynchrony in computer science refers to independent events. An asynchronous system synchronizes activities through events, not a universal clock signal (changes in the system). Asynchronous systems do not rely on external signals or messages and are modular. A network’s modules can operate autonomously while interacting forming a solution/ system. Asynchronous communication uses sequential data instead of a continuous stream as e. g., people send messages at different times on online forums and email. Cryptocurrency uses asynchronous or semi-synchronous blockchain networks. Nodes may have different opinions on network influence. Nodes can process more transactions because they do not have to wait in line. Semi-synchronous networks prevent network splits. ATH, → “All-time high” ATL, → “All-time low” Atomic Swap, Users must use centralized exchanges to buy or sell cryptocurrencies. An atomic swap allows peer-to-peer wallet-to-wallet trading using a smart contract for decentralized exchanges. Atomic swaps offer a decentralized alternative to AMM DEXs like Uniswap, which use centralized liquidity pools.
evenly distributed because it can be mined on standard consumer PCs. This network will likely be geographically distributed and decentralized. Ask Price, The ask price is one of the most fundamental aspects of any exchange’s operation. The buyer determines the bid price, which is the maximum amount they are willing to pay in the base currency for the asset in question. A buy order is matched with the lowest ask price and a sell order is matched with the highest bid price when executing a market order on an exchange. The ask price is the maximum amount in base currency that a buyer is willing to pay for an asset. Spread refers to the difference between the ask price and the bid price. Spreads are strongly correlated with market liquidity, or the ease with which an asset can be bought or sold. Asset-Backed Tokens, Tokenized assets are intended for value storage and peer-to-peer trading without the need for a financial institution. Asset-backed tokens are digital claims backed by a physical asset. Almost any real, physical asset can be tokenized and turned into an asset-backed token, including gold, crude oil, real estate, equity, soybeans, etc. Possession of the token typically entails the right of ownership over the underlying asset and the expectation of future returns. Asset-backed tokens allow for faster and more efficient transactions without physically storing or exchanging goods. Governments, for instance, are nowadays tying the price of crude oil to the value of official digital tokens, and the real estate market is moving toward tokenized fractional ownership. This is having a significant impact on the future of business, ownership, and wealth creation. Assets Under Management (AUM), Assets under management (AUM), also known as funds under management, refers to the total market value of investments or assets managed on behalf of clients by a hedge fund, mutual fund, or wealth management company. AUM fluctuates based on the performance of the funds and the amount of money investors deposit or withdraw. It is a prevalent concept in the crypto and DeFi industries. Beginner crypto traders must find a trustworthy wallet and exchange that supports their desired cryptocurrencies, which can be a daunting task. Rather than helping customers manage multiple accounts
19
AtomicDEX efficiency. Each auction’s data is stored on the blockchain, and any changes are authenticated using a digital signature published to a public blockchain. Audit, An audit allows engineers to discover possible defects or failure areas in systems and apps before launch. Third-party auditors provide neutral and effective audits. Numerous blockchain projects depend on auditing to maintain the integrity of their decentralized protocols’ smart contracts and provide users or token holders piece of mind. Manual analysis is best for finding code flaws. It demands a mid-size development team and extra time. Automatic code analysis speeds up code evaluation. Manual code inspection is critical for crypto projects since releasing with undisclosed flaws might cost millions, especially for DeFi. A smart contract audit usually involves five phases. A specification, tests, symbolic execution tools, manual code analysis, and a report. Augmented Reality (AR), AR allows real-time interaction and 3D registration of virtual and actual things. It differs from virtual reality (VR) as it enhances rather than replaces the real environment. Standard NFTs depict art or moments in time, but AR NFTs allows to see digital items in the surroundings or on a face/body (like photos or movies). Augmented reality can show 3D NFTs. AR NFTs and 3D NFTs transmit VR through AR-enabled websites or applications. Developing an AR or 3D NFT entails combining visual signals that locate the digital object in the actual environment. Creating AR NFTs can be profitable as immersive, shareable NFTs stand out in a competitive market. AUM, → “Assets Under Management” Authentication, Authentication confirms a user’s account, platform, or private area access. It occurs when a user presents a credential, such as a password, that matches their user ID. A user must choose a username and password to access e. g., a crypto wallet. In most situations, adding more authentication features increases security. Two-factor authentication (2FA) protects cryptocurrency wallets and applications’ account data. Unlike bank accounts, crypto accounts cannot recoup stolen assets. The blockchain uses public key cryptography (PKC) to safeguard wallets and sensitive data. Future digital currency wallets and blockchain applications may include a password-less interface.
Hash timelock contracts underpin atomic swaps (HTLC) include a hashlock, which can be used to lock and unlock deposited currency with a depositor-only key, and a timelock, which returns funds to the depositor if the transaction is not completed within a set timeframe, so both parties keep the funds they started with (minus a small transaction fee for the order-taker). Atomic swaps allow on-chain trading across blockchains and native coins and is protocol agnostic. Off-chain atomic swaps offer faster transactions but are not fully developed. AtomicDEX, AtomicDEX is a desktop, mobile, and web-based program that combines a cryptocurrency wallet with a decentralized exchange. It let users to transfer, receive, and exchange several currencies, including Bitcoin, Ethereum, BNB, ERC-20, and BEP-20 tokens. AtomicDEX eliminates the prerequisite of downloading the whole blockchain with its wallet using a 24-word seed phrase that must be kept secure or remembered by the user if the password is lost. AtomicDEX is one of the ecosystem products developed using the Komodo AtomicDEX API, an open-source framework compatible with 99.9 % all cryptocurrencies. Attestation Ledger, The common purpose of an attestation ledger is to attest that a financial transaction occurred or to demonstrate the legitimacy of transactions or items. The individual account may be a digital wallet or a PayPal account. Attestation ledgers serve as evidence that monetary transactions have occurred and evidence that commitments have been made. A Blockchain Operating Ledger System, also known as BOLOS, may employ attestation ledgers when connecting a host computer to confirm that the device has not been changed or tampered with. Applications may also utilize attestation ledgers to demonstrate that they are executing on a real ledger device. Auction, Live auctions use bidding to acquire antiques, real estate, cryptocurrency, NFTs, or other goods. The core concepts of auctions have not changed throughout time. The auctioneer suggests an opening bid when a (physical or digital) item is initially shown. Interested parties bid until no one continues. So-called Dutch auctions are staged in reverse order. E-auctions are centralized, computerized auctions. Their centralized structure allows for misuse and fraud. E-auction systems based on blockchain eliminate corruption and improve security and
20
Average Daily Trading Volume (ADTV) deal with data which has a changing mean, i. e., ARIMA models do not require stationarity. Avatar NFT Project, Occasionally used interchangeably with terminology such as PFP and generative art, an avatar project is a collection of cartoon avatar NFTs, often portrayed as a head-and-shoulders or neck-up picture. Average Annual Growth Rate (AAGR), The average annual growth rate (AAGR) illustrates the average annual return on investment, asset, portfolio, or cash flow over time. AAGR ignores compounding effects and is determined by averaging year-on-year growth rates. The average annual growth rate helps investors understand the company’s financial health and future orientation. It applies to costs, cash flow, income, etc. The ratio does not account for swings over the start and final periods. Therefore, it does not evaluate prospective risk. A CAGR eliminates compounding and volatility from periodic returns to compute growth dynamically. Average Annual Return (AAR), Average annual return (AAR) quantifies a mutual fund’s earnings over time. It excludes sales costs and, if applicable, brokerage commissions. Before investing, investors study a mutual fund’s AAR to gauge its long-term success. Share price appreciation, dividends, and capital gains contribute to mutual fund returns. Unrealized stock profits or losses drive share price rise. The share price influences the mutual fund’s AAR. Dividends effect AAR and portfolio net value. Dividends may be cashed out or reinvested. Realized AAR capital gains are paid from a mutual fund’s income. Average Daily Trading Volume (ADTV), The average daily trading volume (ADTV) is the number of shares or coins that are exchanged daily. It provides a broad impression of how busy a certain cryptocurrency’s market is. A high ADTV implies that investors are enthusiastic about a project. A low ADTV may indicate that investors are losing interest in NFTs or cryptocurrencies. Trading volume may fluctuate based on a variety of variables, such as the time of year (it tends to reduce around the Christmas and climb again in January), the economy’s general situation, and the overall health of a project. A rapid, dramatic shift in trade volume may be attributable to one of these variables, but it may also indicate a more significant issue.
Author, The author is the creator of the work. He is the owner of the copyright. Authority Masternode (VeChain), A network authority masternode (AM) operates the VeChainThor application. They maintain the blockchain, approve or distribute blocks, and participate in platform governance. They are rewarded for their services using VET, the network’s native coin, as compensation. Before becoming an authoritative masternode, a person or corporation must complete the VeVID portal’s KYC procedure. Authority masternodes fall into five kinds: Enterprise Users, Blockchain Development Teams, Business Development Ambassadors, Community Contributors, and Academic Research Partners. Automated Market Makers (AMMs), Automated Market Makers (AMMs) are an integral component of the decentralized finance (DeFi) ecosystem. By using liquidity pools rather than a conventional market of buyers and sellers, they enable the permissionless and automated trading of digital assets. An AMM is a technology that operates on decentralized exchanges (DEX) that removes the order book from conventional exchanges, where liquidity is given by buyer and seller orders, and replaces it with liquidity pools, a pooled pot of tokens. Therefore, an AMM is a sort of decentralized exchange (DEX) system that prices assets using a mathematical formula. Autonomous Economic Agent (AEA), Fetch. ai is an AI-based blockchain platform that leverages Autonomous Economic Agents (AEA) to analyze real-time data and take actions. AEAs are often used in financial markets, where fast, continual activity is needed to enhance earnings. Any person, organization, or institution that allocates limited resources is an economic agent. In recent years, the phrase has expanded to encompass bots. Autonomous agents can self-govern and control their own behaviors. Since an autonomous agent is not under external control or supervision, it must have self-generated objectives. Auto-Regressive-Integrated-Moving-Average (ARIMA), ARIMA models create forecasts based on a mixture of an autoregressive model (the AR part, e. g., some subset of the previous months explains the current month), and a moving average model (the MA part). Unlike the two separate models, ARIMA models can
21
Average Directional Index (ADX) may also mean that sales are down. A product backlog is used in project management to monitor completed and unfinished work. The organization may then prioritize and finish important activities first. Backorder, Backorders are orders for out-ofstock items. Backorders are caused by strong demand or supply or inventory problems. When a company’s supply chain or storage capacity is inadequate or the product is in high demand, customers may backorder products. Backorders reveal the professionalism of a company’s inventory management. Companies who know how to handle and fulfill backorders have more consumers and save space, storage, and costs. Storage savings can be used to provide cheaper prices on quality items than competitors. Customers queuing up backorders to purchase a product may also indicates its popularity. Backstop, Backstops insure unsubscribed firm shares. It is a secondary source of capital when the first source is inadequate. An underwriter, investment bank, or big shareholder frequently establishes a backstop arrangement. In case public shares get unsubscribed, this is a security offering. Underwriters agree to acquire all unsubscribed shares. Backstops help organizations mitigate risk and meet capital requirements. Business uses three primary backup agreements: Backstop in underwriting, loan and equity to leverage buyouts (LBO), and loan backstop arrangement. Backtesting, Backtesting allows the assessment of a forecasting model based on historical data, meaning one can get an idea of how well the model performs, without having to wait for future events to occur. The underlying assumption here, is that past behavior will be reflected in the future, which can be a drawback. Also, a lot of historical data is required to backtest effectively. Back-to-Back Letters of Credit, Back-toback letters of credit (LoC) are used for financial transactions between two parties giving international businesses several benefits. Instead of making direct payments, the buyer and seller use a financial broker or third-party intermediary. The buyer’s lender provides a LoC to the third party after the contract is confirmed. The vendor delivers the product to the customer per contract. After successful shipment, the third party’s financer issues a LoC and pays the seller in full.
Average Directional Index (ADX), Average Directional Index (ADX) measures a trend’s overall strength. It is based on the premise that trading when the trend is positive increases profit and reduces risk. Welles Wilder established the ADX indicator for daily commodities charts, but it is utilized in a broad variety of markets to assess trend strength. ADX is a non-directional indicator that assesses trend strength independent of price direction. The Directional Movement System uses the DMI+, DMI-, and ADX to measure positive and negative price movement. A single line represents ADX with readings ranging from 0 to 100 in the same window as the two directional movement indicator (DMI) lines. Average Return, The Average Return is computed by dividing the total return over a period by the number of periods. Average Return is used to determine an investment’s average growth rate over a certain time period. Average return is the easiest to measure but also inaccurate as it ignores compounding, Investors and analysts favor money-weighted returns when calculating returns. BaaS, → “Banking as a Service” Backflush Costing (Backflush Accounting), Backflush costing assigns product expenses after manufacturing is finished. This approach, often called backflush accounting, involves setting the ultimate price of produced items backward. When manufacturing begins, the firm orders raw materials. In basic costing, a journal entry is produced when a raw material is ordered, while in backflush costing, none is made. After manufacturing, raw materials, labor, utilities, and other costs are assessed. This last journal entry determines the product’s standard cost. Backflush costing works well for Just-in-Time inventory systems with little inventory. Backlog, Backlog refers to a person or company’s unfinished procedures or tasks. These might be corporate orders, cash dues, or delayed paperwork. A lengthier backlog gives investors the perception that the firm is behind and mismanaged. Depending on the circumstances, a backlog may be a benefit or negative. If a company has greater demand than supply for its product line, it may indicate inefficient manufacturing and supply chain management. If a company’s backorders drops, this may mean that all teams are working hard, but it
22
Balloon Payment baked, and they check if everything is done correctly. They get 2 XTZ. Baking, Baking is how Tezos adds additional transaction blocks to its blockchain via a delegated-proof-of-stake system where bakers get paid per block in Tez or XTZ. In order to bake or endorse, 10,000 XTZ, the native money on the Tezos network, are needed. By executing a full-note to maintain the network, bakers build new blocks in the Tezos blockchain and earn XTZ tokens. Implicit accounts are the only ones that can be baked using personal balance or delegated accounts. Second, one can delegate originating accounts with specific keys allowing participation in the consensus algorithm. Balanced Investment Strategy, A balanced investment strategy seeks to generate a healthy portfolio by balancing risk and reward. The technique is implemented by allocating investing capital between high-risk and low-risk assets. This approach is neither hazardous nor aggressive, in contrast to growth-oriented strategies that aim to raise the value of an investment over a predetermined time frame. A balanced fund is a mutual fund that invests in both high-risk and low-risk asset types in a single portfolio. The primary benefits of investing in a balanced mutual fund are diversity and reduced volatility. Negative aspects include costly fees and declining returns over time. Balloon Loan, A balloon loan is a loan that is not completely amortized. Due to its volume, the payment made at the end of the loan period is known as the balloon payment. Initially, balloon loans have a considerably lower interest rate and are typically utilized for shortterm loans of 5 to 7 years. They are typically utilized for mortgage and car loans. Traditional loans are more difficult for borrowers seeking a shorter loan length and lower monthly payments than balloon loans. Risks include the possibility that a funded asset is not worth the amount necessary at the end and rising interest rates as well as the possibility of loan default. Balloon Payment, A balloon loan’s remaining balance at the end is paid with a balloon payment. Most loans use balloon payments e. g., mortgages. Sometimes monthly payments are solely for interest, so the remaining balance equals the lent amount. Auto loans also typically have balloon payments. Startups can engage in balloon loans provided they have a good fi-
BaFIn, → “Bundesanstalt für Finanzdienstleistung” Bag, In the first meaning, there is no universally agreed-upon level at which a person’s cryptocurrency holdings qualify as a bag, although it is often understood to indicate to a greater-than-average amount of that currency. Extremely big cryptocurrency holdings are frequently referred to as a heavy bag. The word is helpful for differentiating various currencies or tokens within a person’s entire portfolio. Depending on the market circumstances for each asset in issue, an investor may have both high-performing and underperforming bags. In these contexts, bag is associated with bagholder, which refers to an investor who does not sell their holdings despite substantial price declines. Bagholder, Bagholders do not sell their holdings or assets, because they might think longterm benefit will outweigh short-term loss. Or they may be suffering from the sunk cost fallacy or the disposition effect may influence bagholders, referring to resisting to sell badly performing assets while swiftly gaining on other ones. But most often, bagholders lack the time (or inclination) to track the performance of their possessions. Price swings have led to large jumps in crypto investment among persons with no prior knowledge that often lose interest, particularly if their investment was small. Bagholding is similar to HODLing. Bait and Switch Scam, It is when a firm or individual seller offers low-priced products with the intention of substituting costlier ones now of sale. Businesses bait clients with reduced prices. They try to swap them by selling a different product, or in most instances a lower-quality one than claimed. When a consumer visits the business, they might be told the advertised product is out of stock and offered comparable choices at higher pricing. Baitand-switch scheme and real marketing have a narrow line. Bait and switch are illegal and depending on the circumstances, penalties may include a fine, legal expenses, and damages. Bakers, Bakers are similar to Bitcoin miners but on Tezos. A baker is more likely to bake a block if he has a larger number of rolls. Bakers get a reward of 16 XTZ per block for their work. Endorsers, on the other hand, are the people who verify the block after it has been
23
Bandwidth (BaaS), which refers to third-party cloud-based infrastructure and administration for creating and administering blockchain applications. Banking Secrecy Act (BSA), The Banking Secrecy Act (BSA), often called the Currency and Foreign Transactions Reporting Act, mandates banks and other financial organizations to submit data to regulatory authorities. When bank account holders transfer over $10,000, paperwork and verification are required. The BSA detects and prevents money laundering and applies to a person, company, corporation, partnership, organization, trust, or estate. The BSA has been commended for its efficacy in fighting illicit activities, although it has been criticized for its lack of regulations defining suspect transactions. The rise of cryptocurrencies has spurred arguments about whether and how organizations should comply with the BSA. The ability to make untraceable transactions and store cryptocurrencies in wallets rather than banks has made virtual currency an attractive tool for criminals and money launderers. As illicit use of cryptocurrencies has increased, the governments work to limit and monitor cryptocurrency transactions. Basket, A cryptocurrency basket is a collection of digital currencies handled as a single asset, reducing the need for users to constantly monitor individual currencies thus being more or less an index fund. In 2018, crypto asset baskets gained popularity by aggregating various currencies into a single token for trade. Users may trade the token on an exchange as a coin. Initially aimed at inexperienced traders, the package now contains alternatives for pros. The Coinbase Index Fund e. g., is for large-scale crypto investors and includes Bitcoin, Bitcoin Cash, Ethereum, and Litecoin (LTC). Batch Auctions, Batch auctions combine and execute orders concurrently. Each batch’s orders are settled at the same price. Batch auctions benefit from pooled liquidity and are popular in decentralized and conventional finance. Batch auctions are vital for blockchain ICOs, liquidations or buybacks of illiquid assets, and preventing Miner Extractable Value (MEV). Batch auctions are less prone to MEV since trading order does not affect pricing. Multi-dimensional batch auctions enable orders between several token pairs to be resolved in the same batch. This is especially helpful for fragmented token spaces (e. g., USD-stablecoins) or
nancial record and a good credit history. And, balloon payments are best for borrowers planning to resell shortly. Bandwidth, Sometimes, bandwidth is confused with internet speed. It refers to the amount of data that can be transmitted across a connection in a specified amount of time (quantified in megabits per second). Multiple devices connected to the Internet at the same time necessitate supplemental bandwidth to maintain connection speeds. Due to the high and steep demand for technologies like big data, analytics, and the internet of things, there is an ever-increasing need for computational resources such as bandwidth. Bandwidth might also act as a type of currency on a decentralized network if local businesses and individuals participated in building the required infrastructure. Without a central bank, bandwidth may provide total transparency and security in cryptocurrencies. Bank for International Settlements (BIS), The Bank for International Settlements (BIS) coordinates worldwide central banks’ monetary policy initiatives to promote global monetary and financial stability. It offers several financial services to the European Central Bank and the Federal Reserve including gold and currency transactions and short-term collateralized loans. It was formed in 1930 to discharge Versailles-mandated German war reparations. While most sovereign states establish monetary policies, they are nonetheless subject to central and private banking scrutiny and speculation, which influences exchange rates and export economies. BIS strives to maintain monetary policy in step with reality and help execute monetary changes on time, as a simultaneous policy across all 60 member banks and with IMF assistance. Banking as a Service (BaaS), Banking as a service (BaaS) systems increase financial transparency by allowing banks to provide their APIs to third parties. BaaS platforms are a fundamental component of open banking, in which corporations give financial transparency to account holders by providing their APIs to third parties. Fintech, digital banks, or other third-party providers pay a charge to use BaaS. Legacy institutions may create their own BaaS systems, generating additional income. Monetization techniques include monthly or per-service fees for access to the BaaS platform. This differentiates from blockchain-as-a-service
24
Benchmark Index fulness and that crypto prices will crash when this is realized. Bearwhale, A bearwhale is a person who owns a large quantity of cryptocurrencies and utilizes their big account to benefit by driving the price down. In 2014, a trader with the moniker BearWhale was spotted. This individual was a Bitcoin collector who attempted to sell 30,000 Bitcoin for $300 per coin, or $9 million in total, at once. This massive sale, however, was done via Bitstamp and was so enormous that it distorted the Bitcoin markets and caused the price of Bitcoin to briefly stall at $300 for hours until all 30,000 of the seller’s coins were sold. Beeple , Michael Joseph Winkelmann (born 20 June 1981), professionally known as Beeple, is an American digital artist, graphic designer, and animator well-known for selling non-fungible tokens (NFTs). Using a variety of media, he creates humorous, phantasmagoric paintings that offer political and social commentary while referencing pop culture personalities. Beeple was initially exposed to NFTs in October 2020. His collage Everydays – the First 5,000 Days, was sold on March 12, 2021 for $69 million in bitcoin being the first NFT sold by a classical auction house. Benchmark/Benchmarking, A benchmark is a reference point that acts as a baseline. Indexes, which are basically financial instruments that are used to represent a set of individual market prices or a collection of data points, are one of the most prevalent forms of benchmarks. Benchmarks are also utilized in the context of business analysis as a technique that involves the measurement and comparison of company behavior and performance – either against what would be considered the most productive or acceptable practice or against other highly successful businesses. In the blockchain industry, benchmarks that quantify network speed and scalability, degree of decentralization, efficacy of different consensus mechanisms, and performance of smart contracts are still not standardized and badly needed. Benchmark Index, A benchmark index is a collection of securities used to measure the performance of mutual funds, stocks, bonds, and other assets relative to the stock market. The S&P 500, the Dow Jones Industrial Average, the Nasdaq Composite, and the Russell 3000 are popular benchmark indexes. HFR Blockchain Index Methodology is an excellent
less liquid token sectors (e. g., certain insurance or prediction market outcome tokens), since transactions may place in rings. Beacon Chain, The Beacon Chain is a new blockchain that runs alongside Ethereum to aid in the transition from a Proof of Work (PoW) consensus mechanism to a Proof of Stake (PoS) consensus mechanism. The Beacon Chain, which is seen as phase 0 of a significant Ethereum blockchain update, started operational on December 1, 2020. Bear Market, A bear market is defined as a market that has lost 20 % of its value from its prior peak during the recent several months. It is typically precipitated by a recession or a once-in-a-lifetime event with economic repercussions, such as the Coronavirus. Some believe that the term bear market originated from an ancient proverb that advises against selling a bear’s skin before capturing the animal. Others say the phrase was derived from the way a bear assaults its prey by dragging its paws below. Bear markets do occur from time to time. Since World War II, Wall Street has seen 13 bear markets (every six years on average), each lasting around 362 days. A bear market will often self-correct, and the economy will rebound quite quickly. Nevertheless, if stock prices continue to decline, a recession may ensue. Bear Trap, Bear traps include many traders with large cryptocurrency holdings that sell a lot of that currency together. The goal is to convince other market players that a price correction is happening so they will sell their own holdings, sending prices down. The bear trap will then be released, and the group will purchase back its possessions at a discount. The coin’s value rises, and the trap-setters profit. Sometimes, institutional investors dump shares in hopes that less-skilled market players would follow, driving down prices. When prices fall to the institutions’ preferred level, they buy back shares, driving prices up and reaping a profit. Bear/Bearish, Bears are cautious or pessimistic, whereas a bear market has prolonged downward pressure. Bearish motivations differ per currency or token. Bearish mainstream analysts and investors are often negative on cryptocurrencies. Despite crypto’s huge gains over the years, many believe its momentum is unsustainable. Bearish critics also state that blockchain technology has not shown real world use-
25
BEP-2 (Binance Chain Tokenization Standard) tokens over time, according to BSC creators. BSC is the second-most-popular crypto network to adopt this method after Ethereum. BEP-95 is like Ethereum’s August EIP-1559 protocol. Binance plans to boost network decentralization by speeding up complete node sync. The BEP-95 burn will continue to lower BNB supply even after the planned BNB burning events reach 100 million tokens. speed up token burn, and boost BNB’s worth. Beta (Release), In the field of computer science, beta refers to the second stage of a software development cycle, after alpha. During this phase, the application software meets its primary functional criteria and is tested for efficiency, usability, and safety. Typically, the beta stage provides testers who are not part of the development team or organization with access to the program in order to identify and report defects. This enables for a review to be conducted objectively, with discovered faults being resolved promptly. Any new cryptocurrency that is to be introduced to the market will follow the exact same approach. BFA, → “Brute Force Attack” BFT, → “Byzantine Fault Tolerance” Bias, The bias is an error which arises due to false assumptions in the underlying model. It is essentially a measure of how far the expected value is away from the true value of the parameter. Increasing bias tends to reduce the variance. High bias can occur, for example, when asking only certain groups of people about their income (e. g., only young professionals). Bid Price, Bid price refers to the maximum price a buyer is willing to pay for a certain product, service, commodity, security, or cryptocurrency. In financial markets, traders may choose the price at which they are willing to acquire or sell an item. Typically, a bid is less than the offered price, also known as the ask price, which is the amount at which individuals are willing to sell. Unsolicited bids are made when a bidder makes an offer even if the seller is not actively seeking to sell. Multiple bidders competing for the same item and placing offers one after the other generate a bidding war. Bid-Ask Spread, A bid-ask spread is the difference between a buyer’s highest and lowest offer for an item. Price takers might purchase at the asking price and sell at the bid price, but the market maker buys at the bid price and sells
example of benchmark indexes in the world of blockchain. It consists of a set of metrics designed to represent the success of fund managers who participate in blockchain projects and shared ledger technology. BEP-2 (Binance Chain Tokenization Standard), BEP-2 is a technical standard for the creation and use of new Binance Chain tokens. It specifies the rules and technical requirements that tokens must follow. The standard guarantees their compatibility with one another and the surrounding ecosystem. ERC-20 is a very similar token standard on the Ethereum blockchain. In a single ecosystem, both chains are symbiotic, but de facto independent. BEP-2 tokens are tradable on Binance DEX. BEP-20, BEP-20 was created to extend ERC20, a popular Ethereum token standard. It outlines how a token can be spent, by whom, and its overall usage. The BEP-20 standard was derived from and is fully compatible with the ERC-20 standard, and its functions are modified ERC-20 code. These changes improved the protocol’s speed and transaction cost. BEP20 was created as a technical specification for Binance Smart Chain to provide a flexible format for launching tokens. These tokens could be business shares or dollars stored in a bank vault, like stablecoins. BEP-721, ERC-721 tokens indicate ownership of NFTs such as real estate or artworks. As the adoption of non-fungible tokens increased, various ecosystems arose. Since Ethereum’s high fees and lengthy transaction processing times restricted its utility and rendered many DeFi protocols inoperable, this tendency has intensified. BEP-721 changes the popular NFT standard ERC-721 of Ethereum as BEP-721 tokens are capable of tokenizing and identifying data. This uniqueness allows them to depict non-fungible items. Depending on their scarcity or use, they may be exchanged and moved. Art, antiques, gaming items, lottery tickets, real estate, and collectibles may be represented by these tokens. BEP-95 (Bruno Hard Fork Upgrade), Binance Evolution Proposal (BEP-95) adds real-time burning to Binance Smart Chain (BSC), a decentralized blockchain system. In October 2022, the network announced that the new BEP-95 protocol would allow real-time coin burning. The proposal would benefit both validators and holders by boosting the value of
26
Binary Code Binance Labs, Binance Labs enables blockchain entrepreneurs, enterprises, and communities and funds industry initiatives that expand the blockchain ecosystem. It helps tech teams have a beneficial impact on cryptocurrency and the decentralized web. Binance Labs’ Incubation Program e. g., honors the year’s most creative blockchain initiatives. Incubation program candidates submit new ideas to enhance crypto adoption. These suggestions might be about Binance Smart Chain, DeFi, or trade infrastructure. Binance Labs is one of the best platforms for blockchain businesses to establish their product-market fit and achieve a competitive edge. Entrepreneurs in the Binance labs incubation program receive help with all business affairs and operations, including as product/ service creation, regulatory/legal counseling, recruiting, technical execution, fundraising, marketing/PR, etc. Leading investors and funds have shown interest in Binance Incubation’s portfolio of firms, with some working as mentors and advisors. Binance Launchpad, Binance Launchpad helps crypto-startups raise financing by selling their tokens to Binance users. It pioneered Initial Exchange Offering (IEO), a popular funding tool for crypto-startups. Binance Launchpad projects get liquidity since newly listed cryptocurrencies are instantaneously released to Binance’s large user base. Binance also helps blockchain businesses develop in its ecosystem. Since 2019, Binance Launchpad has funded $107 million for 49 startups. Binance Smart Chain, Binance Smart Chain (BSC) is a new smart contract platform built by Binance and based on the Go Ethereum (Geth) client, making it interoperable with blockchain applications designed for the Ethereum network. However, running the identical applications on BSC is far less expensive and quicker than on Ethereum. Binance Chain utilizes Delegated Proof of Stake (DPoS), whereas Binance Smart Chain employs Proof of Staked Authority (PoSA). Users’ identities and reputations might be at risk in PoSA. After staking collateral, the PoS algorithm encourages users to corroborate network facts. Binary Code, Binary code is the most fundamental kind of computer-intelligible programming data. It is the outcome of a multiphase process that translates source code written in a high-level language such as C or Java into
at the asking price. Bid reflects demand, while ask represents supply. It measures market liquidity. The more liquid a stock is, the tighter its bid-ask spread. Multiple reasons might increase bid-ask spread. When a trading market has a lot of liquidity, the spread narrows. Bidask spreads are also lower for actively traded stocks. Unknown or unpopular stocks might have a greater bid-ask spread. For the bid-ask spread to work, traders must be ready to walk away via limit orders. Big Tech, Facebook, Amazon, Apple, and Google (GAFA) are major information technology companies in the US and are together referred to as the Big Tech. Microsoft is often included to this list. Big Tech firms’ market capitalizations range from $500 billion to $2 trillion, making them some of the world’s most valuable publicly traded enterprises. Every big technological company acts as a center for high-tech internet services and activities, have a monopoly in their respective sector, and have fundamentally revolutionized how people use technology, establishing a digital ecosystem that depends on their services daily for millions of people. They have been able to evade serious competition probes. But, investigations into monopolistic behavior are intensifying and fines are growing. Big Techs are today creating techniques to use blockchains and associated technology to create social media networks, store online data, and host websites without requiring a central authority and area also investing in cryptocurrency. Binance, Binance is the leading cryptocurrency exchange in the world based on the daily trading volume of cryptocurrencies. It was created in 2017 in the Cayman Islands. Changpeng Zhao, a developer who had previously designed high frequency trading software, launched Binance. Following the Chinese government’s increased regulation of cryptocurrencies, Binance relocated its headquarters to a country outside of China. In 2021, the US Department of Justice and Internal Revenue Service began investigating Binance on suspicion of money laundering and tax violations. The Financial Conduct Authority of the United Kingdom mandated that Binance cease all regulated business in the United Kingdom by June 2021. In 2021, Binance supplied customer information with the Russian authorities, including names and addresses.
27
Biometrics problems of double-spending and a decentralized P2P network. It was born out of the 2007 financial crisis by a person or group acting under the moniker Satoshi Nakamoto. Bitcoin ATM (BTM), Bitcoin ATMs operate like traditional cash dispensers, except instead of showing bank account data, consumers are given alternatives for exchanging Bitcoin for cash. Unidirectional BATMs only provide purchase choices. BATMs differ from normal ATMs behind the scenes. They do not link to a user’s bank or network. They are internet-enabled interfaces that let users communicate with an exchange. First Bitcoin ATM reportedly launched in 2013 in Vancouver, Canada. As of November 1, 2022, there were nearly 39,000 Bitcoin ATMs all over the world. Bitcoin DApps, Bitcoin dApps operate on Bitcoin-powered blockchains and use the network’s basic functionalities on layer-1, layer-2, or sidechain technologies. They implement smart contracts on scaling solutions, sidechains, and blockchains that operate with Bitcoin’s mainnet. Bitcoin inspired the creation of Ethereum, and since then, Ethereum and other L1s have been the preferred platforms for building decentralized applications (dApps), minting non-fungible tokens (NFTs), and hosting decentralized finance (DeFi) products and protocols. Developers may utilize the Bitcoin network’s anonymity, security, and liquidity via layer-2 solutions like Lightning Network, sidechains like RSK, and smart contract layers like Stacks. Bitcoin Dominance (BTCD), Bitcoin dominance (BTCD) is Bitcoin’s market cap compared to other cryptocurrencies. Bitcoin was and remains the most popular cryptocurrency, although its dominance was far higher five years ago. Bitcoin’s supremacy has been eroded by emerging currencies like Ethereum. 2013 had few Bitcoin rivals. It had 94 % market share. As of today, BTCD is 40 % and continues to fall as new coins and tokens enter the market. Bitcoin’s popularity is unmatched. When bitcoin’s price drops, so often do other cryptocurrencies and vice versa. Bitcoin Improvement Proposal (BIP), Bitcoin has no organizational hierarchy. Thus, Bitcoin needed a standard for introducing new ideas. The first Bitcoin Improvement Proposal (BIP) was released in 2011, establishing its structure and drawing influence from Python’s
machine code customized to the processor architecture on which the program runs. In some senses, it is the basic language of the computer, transformed from human-readable source code. A binary code transmission consists of a series of electrical pulses representing numbers, characters, and actions, such as transistors turning on (1) or off (0) to transmit or halt the pulses. All four elementary arithmetic operations (addition, subtraction, multiplication, and division) may be reduced to binary number combinations, often known as fundamental Boolean algebra operations. One might say that binary code is the fundamental building block of blockchain and the cryptocurrency it supports. Biometrics, Biometrics are observations of the human body and computations that pertain to human traits. In computer science, biometric authentication (or realistic authentication) is used for identification and access control. Additionally, it is utilized to identify people inside groups under surveillance. Biometric identifiers are the unique, quantifiable properties used to identify and classify people. Typically, biometric identifiers are characterized as physiological parameters associated with body form. Examples include fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris identification, retina, odor/scent, voice, ear shape, and stride, but are not limited to. Behavioral features include, but are not limited to, mouse movement, typing rhythm, stride, signature, behavioral profile, and credentials. Some academics have invented the word behaviometrics to refer to the last category of biometrics. BIP, → “Bitcoin Improvement Proposal” BIS, → “Bank for International Settlements” Bit, A bit is a computer basic unit of data. The term is an abbreviation of binary digit and represents a logical state with the two values 0 and 1 only. Bytes are used to store data and execute instructions. A byte is eight bits, whereas a nibble is four bits. One ASCII character fits in one byte. A kilobyte is 1.024 bytes because computers utilize binary calculation, not decimal. Computer storage is measured in mega, giga, and terabytes. Bitcoin, The first ever cryptocurrency, often known as digital gold. This term applies to both the cryptocurrency Bitcoin (also known as BTC) and the blockchain network. Bitcoin is the first cryptocurrency to have addressed the
28
BitPay have been HODLing. Most likely, a Bitcoiner acquaintance will be checking their phone to inform everyone on the current price of Bitcoin, either ecstatic about their recent gains or terrified that their life savings will be wiped out by the latest decline. Despite Bitcoin’s volatility, a Bitcoiner thinks that Bitcoin will continue to dominate the market capitalization of cryptocurrencies in the future. Some utopian Bitcoiners may feel that the cryptocurrency can alter the world political and economic order. Bitcointalk, Bitcointalk is now one of the biggest online forums where users may ask questions and debate Bitcoin, blockchain technology, and cryptocurrencies in general. In November 2009, Satoshi Nakamoto, the controversial creator of Bitcoin itself, established the forum. Similar to the majority of internet forums, Bitcointalk enables users to establish a profile and begin contributing to various posts and subthreads. The fact that anybody may start a discussion in any language has drawn people from across the globe. The ability to browse through the whole database of topics and conversation entries is a further advantageous feature of Bitcointalk. The search function enables users to rapidly locate the material they want and quickly establish a new thread for discussion with other users. BitLicense, The BitLicense was the first US regulation of bitcoin enterprises. It governs cryptocurrency transmission, exchange services, and digital asset issuance. Any New York citizen or non-resident engaging in regulated bitcoin operations with New York residents needs a BitLicense with Crypto payments being excluded. BitLicense was contentious at debut and remains so now. Many crypto firms say the system imposes unreasonably onerous limitations and duties, and that the BitLicense application fee (estimated at $100,000) is punitive. At least 10 crypto-related firms stopped trading in New York after the laws took effect in 2015. BitLicense is a significant aspect of worldwide politicians’ drive to regulate crypto, a sector that is resistant to governmental intrusion. Recent occurrences, such as the FTX meltdown foreshadow stricter control of cryptocurrencies and decentralized technologies. BitPay, BitPay is a supplier of Bitcoin payment services. It has its headquarters in Atlanta, Georgia, in the US, and was created by Stephen Pair and Tony Gallippi in May 2011. BitPay is
proposal system with GitHub hosting BIP. Changes to protocol or validation techniques are Standards Track BIPs. Informational BIPs raise awareness or educate. Process BIPs involve outside-the-Bitcoin-protocol process improvements. Bitcoin may accept or disregard informational BIPs. Standards Track and Process BIPs need community consensus. Most BIPs start as online debates. Even if a BIP has community agreement, each developer chooses which codebase to utilize. Many improvements, including UI adjustments, need no BIP. Bitcoin Misery Index (BMI), Tom Lee, a Wall Street trader, created the Bitcoin Misery Index (BMI) in 2018 to interpret Bitcoin’s price activity as a buy or sell signal. Below 27 is the misery stage, a strong buy signal, and above 67 is the happy stage, where Bitcoin is expected to plummet. The index is calculated using volatility and winning trades. It is a contrarian index which is informally known as a fear index. The Bitcoin Misery Index measures option prices to assess volatility like the VIX. Bitcoin NFTs, NFTs were implemented on the Bitcoin blockchain before smart contract capability. Digital collectibles (mainly cards) were tokenized and shared using Counterparty, a Bitcoin-based system that saves Bitcoin data. In 2016, Rare Pepes digital collector cards were promoted on the Bitcoin blockchain. Due to Bitcoin’s limits and Ethereum’s popularity, the project moved to Ethereum and other chains. Even though NFTs originated in the Bitcoin ecosystem, the legacy network is mainly detached from NFT initiatives, platforms, and markets as Bitcoin’s fundamental protocol does not support smart contracts. Bitcoin NFTs are minted on Bitcoin-powered platforms like Gamma, Byzantion, HeyLayer, and LightNight. Bitcoin Pizza, A Florida guy bought two Papa John’s pizzas using Bitcoin on May 22, 2010. The day is celebrated not because of the transaction, but because of the price: Laszlo Hanyecz paid 10,000 BTC for the two pizzas, which is currently worth around $170,000,000. Sturdivant, then 19, delivered the two pizzas to Hanyecz and receiving the 10,000 BTC. Unaware of the cryptocurrency’s potential, he spent them on a business trip. Since this transaction, May 22 is Bitcoin Pizza Day everywhere. Bitcoiner, A Bitcoiner may be that buddy who cannot stop discussing Bitcoin. Since the beginning of the 2010s, many Bitcoin users
29
Bits black hat are used to describe a hacker’s motivations and methods. They are derived from the spaghetti westerns (from the 1950s and 1960s). Good characters wore white hats whereas evil ones wore black hats in classic western films. Black Swan Event, A black swan – named by the finance professor and former Wall Street trader Nassim Nicholas Taleb – is an occurrence distinguished by its exceptional rarity and devastating effect. There are three primary components: when it occurs, it has catastrophic repercussions, it can only be explained in retrospect, and onlookers are eager to explain it after its occurrence and speculate on how it might have been foreseen beforehand. The 2008 Global Financial Crisis is the most well-known instance of a black swan event in the world of finance. It was precipitated by the sudden, catastrophic collapse of a once-thriving real estate market. COVID-19 is also eligible for this sort of occasion. Blake-256, Blake-256 was created by JeanPhilippe Aumasson, Luca Henzen, Willi Meier, and Raphael C.-W. Phan for use in Decred. It operates quicker than MD5 and SHA-1 on 32-bit and 64-bit computers, respectively. The message is split into blocks and hashed independently, with the last block being padded. Each block is processed using an internal 512bit compression algorithm (32 rows and 16 columns). The result of the compression function is XOR with the initial state and linearly permuted. The final state is then split into two parts of 512 bits and XOR. Blake is one of the quickest hashing algorithms available. In terms of speed, it outperforms the industry-leading cryptographic hash algorithm Whirlpool. Block, New blocks are added to a blockchain’s end. Every block hash-references the previous block. This makes it nearly impossible to falsify a blockchain ledger. Every block also includes a timestamp, the transaction record, and the hash of the preceding block. Mining requires solving this problem to add a new block to the chain. Solving this challenge earns a reward, thus every cryptocurrency block lists the addresses that earned it. This block structure makes blockchains hard to hack or fake and a malevolent actor would have to alter every block to update any blockchain record. This is very difficult since a blockchain is stored decentralized on each user’s computer.
accessible in over 38 countries and allows customers to deposit payments straight to a seller’s bank account using a bitcoin wallet. The BitPay Card is a debit card for cryptocurrencies that allows users to utilize their Bitcoin holdings to make purchases throughout the whole MasterCard network. The card is used as a prepaid debit card and a reloadable debit card, but not as a credit card. BitPay is also recognized for providing services such as the BitPay Wallet, where users may store, manage, and spend Bitcoin, as well as convert Bitcoin to dollars. Bits, Bitcoin must be divisible like any money to use Bitcoin and other cryptocurrencies as an exchange unit, not for speculation. Bitcoin’s price rise made subdivision more important. Bitcoin features a metric system with eight decimal places. dBTC is 0.1 of a bitcoin. Centi-bitcoin (cBTC) is 0.01; Satoshi is 0.00000001. The choice of bit as the standard subdivision stems from a Bitcoin subreddit suggestion to split each coin into one million parts. Subdivisions are key to Bitcoin’s broad acceptance since if it is to become a commonly utilized payment mechanism, normal customers must understand it. Bitstream, FPGA Bitstream is a file providing instructions or a program for a Field Programmable Gate Array (FPGA). FPGA bitstream file configures pinout and internal logic modules. HDL generates it, and the FPGA tool configures it. FPGA is a customer- or designer-configurable integrated circuit. This implies a client may alter an IC’s configuration after manufacture. To program an FPGA device, a Verilog or VHDL file describing the IC’s behavior is required. The FPGA partial bitstream implements part of the design. Partial FPGA bitstream implementation saves time by avoiding unneeded design elements also known as partial reconfiguration or compilation. It may be written via the device’s parallel interface or a host computer. Black Hat Hacker, Hacking can take several forms, each of which focuses on a different aspect of the subject. Black hat hackers can steal, modify, or delete system data after gaining access to their targets. Some black hat hackers steal money, while others gain access to classified information from the government and assist in spying on a party. Hacking includes keylogging, phishing, brute force, ransomware, DoS, DDoS, and more. The terms white hat and
30
Block Trade recent block producer project has acquired so much support that Google Cloud is now a block producer competitor, which is a positive indicator for all industry initiatives. Block Reward, Blockchains are sequences of blocks that record transactions throughout time. Each block is hashed cryptographically. Blockchain users that solve problems get bitcoin. The first Bitcoin blockchain payout for hashing was 50 BTC. This award is halved every 210,000 blocks. Currently, a Bitcoin halving happens every four years. First-transaction block rewards are distributed to the appropriate miner. Bitcoin mining is only economical for largescale operations employing pricey technology in closely regulated settings and low-energy costs. Block Size, Block size is how much data a block can store. In May 2021, one Bitcoin block could hold 1 MB of data. This restriction was implemented in 2010 to prevent blockchain overload and DoS attacks. Initially, the Bitcoin network was planned to run with 36 MB blocks, however security considerations required smaller blocks. Network overload is an issue with blockchain block size. The sooner blocks fill with transactions, the longer approval waits may be. The 1 MB block size of Bitcoin’s network slows transaction processing. Many experiments are underway to overcome the block size problem. The Ethereum blockchain lets users pay a fee to prioritize their transactions. Because of the restricted block size, researchers say users might pay more in gas prices to prioritize their transactions. Block Time, Block time is the time it takes a blockchain-based system to generate a new block, defining transaction confirmation speed in transactions per second (TPS). When a block is complete, it appears on the ledger as a validated copy of a collection of transactions, allowing another block to extend the chain. Increasing block size is a simple and practical approach to reduce block time, although its impact on a decentralized network’s security is debated. Too many people transacting on the network affects block time. Bitcoin’s block time currently is around 10 minutes; Ethereum’s is around 15 seconds. Block Trade, Block trades are huge order transactions. Due to the size of block trades these are typically done by institutions and hedge funds similar to OTC Trading. If a block
Block Explorer, Block explorers link to Bitcoin or Ethereum blockchains. They let users to examine and query individual blocks, revealing cryptocurrency holders’ transactions and other activity. Block explorers are important to cryptocurrency’s openness and decentralization, and the universal availability of all transaction data is a major difference from traditional currencies. Mempool, Bitaps, Blockstream, Multihash, Blockchain Info, and Bitupper Explorer are prominent block explorers online. Most show information on block height, age, block reward, the user or pool of users that mined the block, the TX (or transaction list) displaying the number of transactions in the block, and the transaction status. Block Header, Each block in a blockchain network has its own block header to monitor protocol changes. It handles all blockchain blocks, or nodes. Starting with the genesis block, blocks are stacked in sequence, with each block header including three sets of block information and other unique components such as previous block hash, nonce used by miners, cryptocurrency version number, timestamp of the block, Merkle root, and block’s difficulty target. Block headers for identical blocks typically take up 0.008GB, or 8MB. Block Height, The block height is the number of blocks generated before the current block. Blockchain blocks have height values. The genesis block has a block height of 0 since there are no blocks before it. Block height is a metric of the blockchain’s growth pace. Identifies each block. If two parties solve the identical issue simultaneously, they will produce blocks with the same height. This may cause a fork or orphan a block. Block explorers can show block height. Block Producer, Block producer is a terminology used in ecosystems that use Delegated Proof of Stake (DPoS), which let users to vote on block producers to validate and create blocks. Block producers are essential to the operation of the network; they gather transaction data and store it in blocks for validation on blockchain networks. They are responsible for creating new blocks containing recent network transactions and blockchain proof that the current state of the chain is valid. On a Proof-ofStake (PoS) network, such as Cardano, nodes stake a specific number of tokens in return for the chance to add the next block. The most
31
Blockchain guishes Bitcoin as an asset from the blockchain as a programmable distributed trust infrastructure with scalable on-chain usefulness and expandable features. Blockchain 2.0 expands the potential of this technology to decentralize markets in general, enabling the exchange of certificates, rights, and obligations in real estate, intellectual property, vehicles, and artworks. Smart contracts are blockchain-enabled coded agreements in blockchain 2.0 entries. Due to the blockchain’s trustworthiness as a database that cannot be falsified or manipulated, parties who have never met may now join into smart contracts. Blockchain 2.0 applications need physical connection. In general, blockchain 2.0 applications must capture legal data. Blockchain 2.0 has helped cryptocurrencies thrive despite company owners’ concerns. Blockchain 3.0, Blockchain 3.0 is focused on developing solutions for non-economic services and sectors. This third stage of the technology’s growth is devoted to expanding the financial applications of DLT and introducing new data management techniques. Undoubtedly, the worldwide adoption of blockchain technology will occur gradually as more private parties build industry-specific blockchain solutions. The march towards worldwide acceptance started with the introduction of cryptocurrencies, then smart contracts and decentralized applications (dApps), and now blockchain is taking over industry-specific enhancements. Obviously, blockchain technology is not perfect, and one of the primary goals of Blockchain 3.0 initiatives is to refine and enhance the technology. Concerns such as the energy consumption of proof-of-work (PoW) systems have recently come to the fore, thus developers are currently working on alternate consensus techniques to improve blockchains’ scalability and efficiency. Blockchain Explorer, Blockchain explorers let users browse the distributed ledger’s records. Blockchain explorers benefit from cryptocurrency’ transparency. Bitcoin (BTC) and Ethereum (ETH) have public ledgers where node operators record transactions. Thousands of token transactions are conducted every minute, making it difficult to retrieve data from the blockchain. Blockchain explorers are crucial here. Users may enter a public or private address to see all transactions to and from it. Blockchain explorers give information about
deal is performed on the open market, traders must be cautious since it might affect volume and the market value of the shares or bonds being bought. According to the New York Stock Exchange, a block deal must involve at least 10,000 shares or $200,000 in treasuries, although the quantity is generally significantly higher. Binance offers e. g., a specialized block trading system for trading larger than 10 BTC blocks. Blockchain, Blockchains are decentralized books and records that are saved on the computers of each blockchain user. I in the meantime, the hash, a unique block identifier, is generated from the information included on each previous block in the blockchain. In order to falsify any record on the blockchain, a malicious actor would need to alter every block on every instance of the blockchain. Therefore, blockchains are regarded as almost unfalsifiable and as immutable transaction ledgers. The majority of blockchains are now public. This incorporates Bitcoin and Ethereum the two largest cryptocurrencies. Using a block explorer, anybody may access records of transactions made on a certain blockchain. However, blockchains provide users with a high amount of privacy in theory. Private blockchains are being considered as a solution for several commercial and government use cases, despite the prevalence of public blockchains. Blockchain 1.0, Since Satoshi Nakamoto’s 2008 Bitcoin whitepaper, blockchain technology has grown significantly. Blockchain 1.0 is its initial evolutionary phase. It was developed from Bitcoin’s initial technology, which was based on 1980s and 1990s ECash systems. Blockchain 1.0 aimed to revolutionize banking and attempts to deliver transparency and public access to the global financial system via a decentralized, distributed, unchangeable online record of transactions. Blockchain 1.0 began with Bitcoin’s blockchain-based digital currency system. Developers began experimenting with DLT’s financial applications. Blockchain 1.0 was focused on cryptocurrency. For the first time in global financial history, monetary transactions were decentralized, meaning no one corporation or entity set the rules. By this, Blockchain 1.0 revolutionized personal and business finance. Blockchain 2.0, Blockchain 2.0 involves decentralized, peer-to-peer value exchange distin-
32
Bluesky Crypto Protocol defenses to prevent attacks. Blockchains should accommodate many transactions and users without raising costs and transaction delays. Algorand claims to have solved the blockchain trilemma. Blockchain-Enabled Smart Locks, Blockchain-enabled smart locks may be locked or unlocked depending on a smart contract variable. The virtually unrestricted programmability and ability to integrate any payment mechanism (e. g., tokens or oracles) with the lock state opens new business models that were previously unattainable owing to security concerns. Using a smart contract as the smart lock’s logic layer improves adaptability and security. Blockchain-enabled locks are more secure than typical smart devices and can be programmed. With blockchain’s intrinsic security, locking and unlocking instructions may be delivered from anywhere in the world, allowing cooperation and joint signatures without extra security infrastructure. With its programmability and inherent link to the token world, a blockchain-enabled smart lock may allow many new and unique business applications. Blue Chip (NFTs), The so-called blue-chip NFT collections are those initiatives that have exhibited a high and steady market worth throughout the NFT market’s very short history. Traditionally associated with the stock market, blue-chip investments include well-established market leaders such as Apple, Coca-Cola, and Disney. Larva Labs’ CryptoPunks is an illustration of a blue chip. This is one of the early and most significant NFT initiatives, with values ranging between 80 and 159 ETH. Bluesky Crypto Protocol, Twitter’s decentralized Bluesky crypto technology enables social networks to engage through an open standard. Applications are interconnected networks with moderation and content control systems. Bluesky has been related to P2P filesharing technology IPFS and Basic Attention Token (BAT). In 2019, Twitter CEO Jack Dorsey introduced Bluesky. Twitter backs Bluesky and approves its aims and scope. Bluesky lets apps personalize their moderation mechanism and makes them accountable for compliance and takedown demands. Bluesky published a testing command line, an experimental personal data server, and a network architecture overview in May 2022. It intends to let users move their
new blocks and transaction processing speed. The explorer program delivers a search query when a user enters it in. Blockchain explorer connects to a node via API and extracts needed data. Blockchain Mutual Credit, Blockchain mutual credit allows multilateral trade networks to generate stable coins. This system’s actors create a closed exchange network where an internal unit of account facilitates transaction. Participants acquire credit lines denominated in this unit of account to buy products and services from other members and repay their debts by accepting it as payment for services they supply to other network participants. Since the late 19th century, businesses worldwide have employed mutual credit clearing networks. DLT-based credit networks can automate risk underwriting, currency stability, and payment clearing expanding faster than their predecessors while maintaining a decentralized, self-regulating money supply. Due to its anti-fragile characteristics, blockchain mutual credit networks may become a standard paradigm. Blockchain Transmission Protocol (BTP), Blockchain Transmission Protocol (BTP) enables service activation, value transfer, and data exchange between blockchains with different algorithms and consensus models. BTP is useful for token trades across several blockchains since it allows them through smart contracts from one blockchain to the next without an intermediary trading platform. BTP simplifies blockchain certificate issuance. BTP follows a set of functions and criteria to ensure data correctness and integrity. BTP is meant to be adaptable, thus blockchains that do not support smart contracts may participate in BTP transactions as sender chains, but not receiver chains. Blockchain Trilemma, Vitalik Buterin’s blockchain trilemma suggests three key difficulties — decentralization, security, and scalability — that blockchain developers face, compelling them to forgo one part to accommodate the other two. This means, decentralized networks can only provide two of three advantages at once. Innovation in the decentralized ecosystem has led to Layer-1 and Layer-2 solutions that overcome these constraints to solve the trilemma. Blockchains provide network control to all members rather than a single organization. Blockchain networks need strong
33
BMI motional activity. Fraudulent projects used this marketing strategy to promote bogus tokens. The SEC has cited ICOs and bounty awards schemes as evidence of misconduct in court. Like Wild West bounty hunters, crypto bounty hunters rush to secure the best-paying rewards schemes. Even though bounty incentives schemes are controversial, many cryptocurrency projects nonetheless employ them. Brave Browser, Brave Browser is based on Google’s open-source Chromium technology. Their code instantly removes all ads from a page and replaces them with its own offering faster search speeds and a new approach to internet advertising and incentives. Many websites utilize ad tracking scripts to monitor user activity and collect behavioral data. By deleting ad tracking scripts, Brave claims to be a privacy-friendly browser. Brave Browser allows users to donate and reward ad providers with BAT tokens. Users choose which adverts to reward. This unique strategy, coupled with blockchain technology, has made Brave a top cryptocurrency supplier. Breaking, Because of a blow, shock, or tension, breaking is the process of separating or causing to divide into pieces. It may also indicate the end of a series, a continuous condition, or a course. In the field of cryptocurrencies, breaking refers to hard forks of a cryptocurrency, which occur when something causes the system to fail and split into a new blockchain. Breakout, A breakout occurs when the price of an asset rises above or below a resistance or support level. Breakouts imply that the price may begin to trend in the direction of the breakout. A breakout to the upward from a chart pattern, for instance, might imply an upward price trend. Volume and candle analysis may be the most effective combination of indicators for spotting a genuine breakout in cryptocurrency trading. The most important indication to look for when trading breakouts is a break in an established support or resistance level that is adequately supported by substantial trading volume. Brian Armstrong, Coinbase’s CEO and founder is Brian Armstrong. He was born in California and studied in Texas. After getting his master’s in computer science, he started a tutoring company. He was a developer at IBM and Airbnb. Armstrong believed in Bitcoin after reading the whitepaper in 2010. He
data across apps, allowing user-owned data in web2 social networks. BMI, → “Bitcoin Misery Index” Bollinger Band, John Bollinger invented the Bollinger band technical analysis tool. Three lines form Bollinger bands: Simple moving average (20-period default), upper band (2 standard deviations above 20-period default, and lower band (usually defaulted to two standard deviations below the 20-period moving average). Bollinger bands are used to estimate asset volatility. Bollinger bands are applied to Coinbase’s daily BTC/USD chart. As the bands grow, prices move away from the trailing 20 MA, indicating market volatility. As bands narrow, market volatility decreases. Traders may build two strategies on Bollinger bands, which gauge volatility. Bitcoin and other cryptocurrencies are volatile and tend to trend for lengthy duration, hence breakout trades are favored above mean reversion transactions. Bonding Curve, A bonding curve describes the price-to-supply relationship of an asset. When a person buys a limited-quantity item (like Bitcoin), each subsequent buyer must pay somewhat more. As more asset units are bought, the price rises. This technique should benefit early investors. Recently, bonding curve contracts appeared in cryptocurrencies. Bonding curve contracts calculate the token price, issue them after payment, and purchase them. Smart contracts determine the average price and rate in both circumstances. Cryptocurrency supply and price curve limit how many may circulate in the market. Bots, Stock markets have utilized (trading) bots for decades, reaching their pinnacle with HFT software. Advanced bots can evaluate many markets and purchase or sell in real time. Arbitrage, market making, technical trading, and profile automation are common bot uses. Bots are faster than humans, never sleep and make decisions based on statistics, not emotion. Bots are widespread in crypto trading. Bounty, Blockchain initiatives use (crypto) bounties to incentivize the completion of network activities. Initially, bounties were used to incentivize individuals to do blockchain project validation. Today, crypto bonuses are not only a marketing tool. A bounty incentives scheme helps promote ICOs or new cryptocurrency. Users obtain free or reduced tokens for pro-
34
BUIDL/Buidlers BTFD, → “Buy The (F*******) Dip” BTM, → “Bitcoin ATM” BTP, → “Blockchain Transmission Protocol” Bubble, Cryptocurrencies (especially Bitcoin) have been called a bubble for years. By this, it is implied that a coin’s or digital asset’s price is significantly over its true worth. Complete crypto skeptics think most cryptocurrencies are worthless. Cryptocurrency’s applications and use cases are developing daily, and fans believe the technology and its tokens will become valuable. DeFi proponents utilize blockchain technology to construct alternatives to standard financial goods like loans and insurance. Many feel this is the future of decentralized tech. Bug Bounty, Bug bounties are hacker contests and paid in the expectation that security flaws will be detected and disclosed before being exploited. Protocols, exchanges, and wallet providers offer bug bounties in crypto. Even the most diligent coders overlook flaws, and some pose security threats. Bug bounties safeguard software owners and users from malicious actors. Critical vulnerabilities may earn $10,000plus incentives. Bug Exploit, Bug exploits are assaults that use system vulnerabilities to obtain profit or expose a system. Malicious actors may exploit bugs to obtain access to apps or networks or launch denial-of-service (DDoS) attacks. According to some reports, hackers are still looking for weaknesses in blockchain and cryptocurrency systems. Bugs may cause a significant loss of assets by disrupting cryptocurrency marketplaces and exchanges’ services and time-sensitive contracts. Before releasing a product to the public on their mainnet, developers should do rigorous security assessments and follow strict testnet processes. BUIDL/Buidlers , The BUIDL meaning is the same deformation of the word build as HODL. BUIDL refers to the call to arms for constructing and contributing to the blockchain and the cryptocurrency, as opposed to holding passively. It is unclear where the term originated, although major players in the crypto sector have used it in recent years. Vitalik Buterin, the inventor of Ethereum, mentioned it in a tweet in 2018 while supporting the foundation’s advantages. The word also gave its name to a blockchain conference held in South Korea in 2018 for the final time.
recognized chances to improve cross-border payments. To overcome the issue, he created a platform for storing and sending bitcoin. After raising $150,000, he established Coinbase in 2012. Coinbase has 56 million registered customers, making it one of the world’s biggest crypto exchanges. Bridges, A blockchain bridge is a system for minting and burning tokens across two platforms connecting blockchain protocols. When a token is locked on one blockchain, its equal is produced in the other, allowing interoperability between two systems. Interoperability across blockchains lets developers delegate jobs and enhance app performance. Blockchain bridges allow developers combine functions and achieve interoperability. Tezos and Ethereum have a famous blockchain bridge. Browser Extension, A browser extension is a plugin that adds new features and functions to an internet browser that were not originally there. Extensions may change a browser’s UI and provide Web service capability. A browser extension is a tiny software plug that may execute controls and filters to affect how a user visits a web page or views online service information. It may use comparable APIs on a web page as JavaScript, and extensions have their own APIs. Browser extensions may be used to eliminate pop-up ads and auto-play features from internet videos. Brute Force Attack (BFA), Brute force attacks require sophisticated software to try every possible password or key on a system. In principle, this attack might guess any password or key and decrypt data. The time a brute force assault needs to succeed is used to assess an encryption system’s strength. As password lengths increase, the time needed to guess them climbs exponentially. Thus, cryptographic key bit sizes have expanded from 56 to 128 or 256 bits. Cracking a 256-bit key demands so much computing power that only supercomputers can do it. Most sophisticated brute force assaults are assumed to be state-sponsored. Some encryption is potentially brute-force-proof as e. g., OTPC. BSA, → “Banking Secrecy Act” BTC , → “Bitcoin” BTCD, → “Bitcoin Dominance” BTD, → “Buy The (F*******) Dip”
35
Bull/Bullish lic law that performs tasks to ensure a stable and functioning financial system in Germany. Burn/Burned, Burning cryptocurrency tokens or coins permanently removes them from circulation, as opposed to accidentally losing them by sending them to an address with no owner or losing access to their wallet. Usually, a cryptocurrency’s development staff burns tokens. It may be done in numerous ways, most typically by transferring coins to an eater address whose current balance is visible on the blockchain but whose contents are not. Developers may also purchase tokens back from the market or burn sections of their supply. The reduction in circulating supply tends to push an asset’s price higher, motivating traders and investors to join involved. BURST, Burstcoin (BURST) is a cryptocurrency and payment system derived from a 2014 summer split of the Nxt (NXT) cryptocurrency. Burst was developed to address several outstanding issues with cryptocurrencies at the time. In particular: energy lost while mining and control of the network by big miners. Business Cycle, Business cycles are based on economic activity and entail a period of expansion followed by recession. They can be caused by many factors (e. g., price of oil), and have a periodicity (i. e., how long it takes until they repeat themselves) which tends to last anywhere from 2 to 10 years. Buy The (F*******) Dip (BTD/BTFD), For cryptocurrency bulls, a decrease in the price of their preferred coin means it is time to purchase more. Buy The (F*******) Dip (BTFD) is crypto bulls’ credo. It is the embodiment of persistent optimism, which some claim is vital for crypto investors, who often wake up to discover that 20 % of their net worth has been wiped away overnight. BTFD is far from a cohesive trading strategy since it is impossible to foresee every market decline or the long-term success of any asset. BTFD differentiates weak hands from Lambo owners. Buy Wall, A buy wall is a huge limit order to purchase cryptocurrencies at a specified price. When the order is executed, demand will likely outweigh supply, preventing a coin from going below that value. A cryptocurrency whale often creates a buy wall by placing a big buy limit order. In a manner, it bars the asset’s price from sliding below a specific threshold: sellers
Bull/Bullish, Bull, or bullish, can refer to, first, bulls are optimists who believe that their chosen asset(s)’ fundamental characteristics or the overall market conditions are conducive to a steady increase in price. Second, the term bull market may be used to describe a market in which the prices of assets rise continuously over time. Bitcoin (BTC), the first and biggest cryptocurrency, has increased in value from $0.003 per coin in March 2010 to around $17,000 in December 2022, despite frequent, often significant, falls. Bull Market, A bull market is defined by the value of shares rising over time. During a bull market, investors purchase many shares with the idea that their value will increase. Bull markets are characterized by investor growth, optimism, confidence, and other favorable traits. Between 2003 and 2007, the most recent bull market in the conventional financial sector happened. In November 2021, Bitcoin, a digital currency that launched in 2010 with a value of around 8 cents, reached an all-time high of over $69,000. The rapid bullish ascent of the cryptocurrency has prompted enormous speculation from non-typical investors. Bull Run, A bull run is a period in the financial market during which the prices of particular assets are consistently increasing. During a crypto bull run, the prices of crypto assets steadily increase over the course of an entire market cycle. The causes and length of a bull run vary. Bitcoin halving is often a catalyst for these bull markets in the cryptocurrency industry. Bull Trap, Bull traps are deceptive market signals e. g., for cryptocurrencies. In a bull trap, the price of an asset exceeds its historical support levels, luring traders and long-term investors to initiate fresh long positions or acquire more of the asset. Bull traps are notoriously false indicators that may have disastrous effects on all market participants. They arise when bull traders fail to sustain an asset’s upward trend after a price breakthrough. Low trade volumes during breakouts are reliable markers of such occurrences. By taking additional measures, such as watching for further confirmation indications of a protracted bull run, it is possible to escape bull traps. Bundesanstalt für Finanzdienstleistung (BaFin), The Federal Financial Supervisory Authority (Bundesanstalt für Finanzdienstleistung, abbreviated to BaFin) is an institute under pub-
36
Candlesticks tocol in successive blocks. This helped Ethereum’s network speed up chain building without parallel processing and supported linear transaction sequences. Byzantium provides four native Ethereum contracts with code to lower the power needed to implement zk-snarks, Since Ethereum implemented Byzantium, ETH transactions have exceeded BTC. C++, There are several languages for creating apps and protocols. Bjarne Stroustrup created C++ in 1985 as a simple expansion of the C programming language. C++ improves program performance, flexibility, and efficiency through developing software infrastructure. It is used for desktop apps, video games, online search tools, and databases as well as creating blockchains. Even though it lacks certain modern-language features, it is still a key crypto language as e. g., Bitcoin was written in C++. Developers today also employ JavaScript, Python, Solidity, and Go to create cryptocurrencies and blockchains. More than 4 million developers can code in C++, proving how tough it is. Call Options, Call options are financial contracts that allow the buyer the right, but not the responsibility, to buy a stock, bond, commodity, or other asset at a certain price and time. The s trike price is the specified price and expiry period is the time frame for selling. Spread or combination techniques may leverage them. An investor might acquire 50 shares of a corporation for $10 using a four-month call option contract giving him multiple expiry dates and striking prices. The buyer of a call option may retain it until expiry or sell it earlier at the market price. They may also wait for expiry and accept 50 shares of stock. Candidate Block, A candidate block is a temporary block constructed using memory pool-selected transactions. Nodes (mining nodes) choose transactions from their memory pool to create candidate blocks. Any miner may choose which transactions to include in their candidate block. Through mining, each node then attempts to add its candidate block to the network. Every block begins as a candidate block, but only successfully mined blocks are added to the blockchain. Candlesticks, A candlestick chart shows historical asset prices (e. g., cryptocurrency) and summarizes price behavior. Candlestick patterns suggest bullish or bearish reversals in
are not motivated to sell at a price lower than what the unfilled buy wall promises to acquire at. Buy walls have several uses e. g., simply buying a large amount of a cryptocurrency or engaging in price manipulation by making the asset seem healthier than it is. Byron Phase, Cardano’s first phase, Byron, launched in September 2017. Sustainability, interoperability, and scalability were Byron’s focus by creating a robust foundation for future developments. Byron is the first Cardano settlement layer like other public blockchains’ bootstrap. During Byron, Cardano utilized a novel Proof-of-Stake method named Ouroboros. Ouroboros, allows every stakeholder to participate in the network and get rewards depending on how much they stake. Byzantine Fault Tolerance (BFT), Byzantine Fault Tolerance (BFT) refers to the feature of a distributed computer system that enables it to overcome the Byzantine Generals’ Problem and consistently build agreement even though some nodes mistakenly or deliberately disagree with the rest. Technical solutions, like as Bitcoin’s proof-of-work method, can do this, but only if more than two-thirds of nodes stay faithful to the system. Byzantine Generals’ Problem, The Byzantine Generals’ Problem asks whether a computer network made of independent, geographically separated nodes can reach agreement. The basic thought experiment was done like this: Byzantine generals siege a city, merely exchange messages, and must decide whether to assault or withdraw. The number and names of disloyal generals are unknown. The issue asks what decision-making process the generals should employ to establish a single strategy. According to researcher, the number of loyal generals must reach two-thirds. In a scenario with three generals, two loyal ones cannot ensure a consensus. This approach is crucial for cryptocurrencies since they are distributed computer systems built of separate transaction-processing nodes that can only connect remotely. Proof-ofwork and proof-of-stake algorithms overcome this issue for Bitcoin (BTC) and other cryptocurrencies. Byzantium Fork, Byzantium hard fork was Ethereum’s fifth upgrade to improve its privacy, stability, and resilience. Byzantium hard fork updated this functionality by implementing the transaction status communication pro-
37
Cantillon Effect transfer than cash, especially when scalability and security costs are included. This implies less money is needed as collateral, so it may be used more efficiently. Capital Funds, Capital funds are the debt or equity to used to run a firm. Company’s capital structure can by observed in its balance sheet looking at obligations and shareholder equity. With tokens and DAOs, a corporation or organization may not require conventional capital sources but instead issue tokens instead. Global authorities have up till now decided that tokens are not securities, therefore they lack the securities act’s rights and protections. Companies may increase their capital funds by issuing shares, debt, or tokens. Capitulation, The classical meaning is to abandon power. Capitulation is selling assets at a loss because of no hope for the price to recover. abandon power. Both conventional stock trading and cryptocurrency trading are risky. Traders seldom know which way prices will go. Given the tremendous volatility of cryptocurrencies, traders are more prone to capitulate. Sometimes crypto tokens lose value rapidly, and investors find it hard to think they can wait it out and still win. Captcha, CAPTCHA is an abbreviation for Completely Automated Public Turing test to tell Computers and Humans Apart and thus a method in computers to establish whether a user is human. Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford created the word in 2003. One CAPTCHA demands users to accurately assess and input letters or numbers from a distorted picture. The average CAPTCHA solution takes 10 seconds. Casascius Coin, Casascius coins are tangible Bitcoin units that available in different designs, sizes, and sorts. Invented by Mike Caldwell in 2011, they are the first known physical bitcoins. The Financial Crimes Enforcement Network (FINCEN) intervened, claiming the practice to be money transferring and need a license. He created 27,938 Casascius coins and bars worth 91,262 BTC over three years. Due to their limited quantity, Casascius coins are an interesting investment and carry a premium. Several other physical Bitcoins have appeared including Alitin Mint, Titan Bitcoin, Cryptmint coins, Antana coins, Ravenbit Satoshi coin, CoinedBits and Lealana coins.
asset and cryptocurrency trading. By responding on leading candlestick patterns before other traders, one may get ahead of the trend. A candlestick chart shows open, high, low, and closing prices for a certain time. Japanese rice dealers in the 18th century created candlestick charts. Candlestick patterns are leading indicators since they use raw price data and update immediately. Cantillon Effect, Richard Cantillon’s Cantillon Effect explains the velocity of money and its unequal influence on prices, wages, and inflation. The modern US economy shows the Cantillon Effect. Businesses received enormous quantities of fresh money through stimulus packages (Quantitative Easing) during the pandemic. Well organized businesses were able to repay debt, buy shares, and generally perform what Richard Cantillon predicted which pushed up prices, not only on Wall Street. This resulted in inflation for the public. The Cantillon Effect on digital assets was seen when BTC hit $60,000 in March 2020 after the House enacted a stimulus package. BTC was seen as digital gold, an inflation-proof asset that cannot be quantitatively loosened or fractionally banked. CAP, → “Market Capitalization” Capital, Capital is money or other assets possessed by a person or organization or accessible for launching a business or investing. Capital is the money that is invested to earn more money, but it may also refer to structures or machinery needed to manufacture things or make firms more efficient. A business’s capital is the money it has to pay for operations and finance expansion. Working capital, debt, equity, and trade capital are four forms of capital. The capital structure of a corporation defines the forms of debt it uses. In many jurisdictions, Bitcoin and other digital currencies are considered capital assets and may be taxed like stocks. Capital Efficiencies, Capital efficiency compares a company’s expenditure on expanding revenue to its profitability. A corporation with a 1:1 ratio earns $1 for every $1 invested. Higher ratios indicate a company’s capital efficiency and profit. Capital efficiency helps organizations examine their processes to decrease costs without sacrificing quality. A corporation that spends too much compared to its growth may struggle to raise money. In crypto, digital assets are regarded more efficient than currency since they are cheaper to maintain, use, process, and
38
Central Bank CDO, → “Collateralized Debt Obligation” CDP, → “Collateralized Debt Position” CDS, → “Community Designated Sellers” CeDeFi, CeDeFi combines the features of Centralized and Decentralized Financing letting companies explore decentralized exchanges (DEX), liquidity aggregators, yield farming tools, lending protocols, and more at minimal transaction costs. CeDeFi allows companies to install smart contracts and add goods and services on a single platform. Benefits are verified projects and tokens, better accessibility, satisfying KYC and AML standards, lower expenses, and faster speed, Censorship, Censorship prohibits any unregulated media. It is seen in government and private organizations. Typical stated reasons are to protect national security, regulate obscene material, avoid child pornography, discourage objectionable language, protect children or disadvantaged communities, encourage or restrain political or religious ideas. Censorship may be placed on art, the press, TV, and the Internet. Decentralization is a method of resistance against financial censorship. Bitcoin’s (BTC) censorship resistance is an important feature as no nation/state, firm, or third-party service controls individuals who trade or retain money on the blockchain network. In contrast, Google is tech censorship example as it only allows crypto service providers to run advertising with severe limits. Censorship-resistance, Nobody can block anybody from using a platform or network, according to censorship resistance. In blockchain systems, censorship resistance ensures that all rules are defined and observed equally by users and cannot be modified for personal advantage. A censorship-resistant blockchain makes all network transactions irreversible by preventing tampering. Proponents see blockchains as a chance to escape oppressive institutions. However, blockchain censorship is tough yet theoretically doable. It may occur through a 51 % assault, but the impacts would be ephemeral since sustaining such attacks is expensive, deterring attackers. Central Bank, Modern central banks are financial institutions responsible for monetary policy and bank regulation. The central bank regulates the money supply and sets interest rates to control a country’s monetary system
Cascading Liquidations, Cascading liquidations occur in overheated or overleveraged markets. When accepting a loan against crypto, like Bitcoin, the liquidation price is based on the collateral and quantity of tokens. Most lending methods start selling the collateral if the market price declines and things do not proceed as expected. It causes additional liquidations when other loans are affected. Cascading liquidations have a rippling effect; other coins suffer cell pressure and loans against them collapse. Cascading liquidations may be avoided by avoiding leverage. Cash, Cash is the tangible form of currency: coins and banknotes that may be carried and used instantly. In certain settings, cash might include bank accounts and tradable instruments like government bonds. The introduction of paper money in the seventh century led to the progressive dissociation of cash’s value from its substance and the eventual rise of fiat currencies like the US dollar and the Euro which are government-issued money with no inherent worth. Since the 1980s, civilizations throughout the world have replaced cash with debit, credit, and mobile payments. Casper (Ethereum), Ethereum project in which Proof-of-Work (PoW) is changed to Proof-of-Stake (PoS). Casper’s alternative validation approach allows it to execute more transactions per second, resulting in quicker and cheaper transactions and save electricity. Casper aims to transition Ethereum to version 2.0, called Serenity. CAT , These are one of the most popular Ethereum NFTs and an abbreviation for CryptoKitties standing for Cryptocollectible Asset Token. Cathie Wood, Catherine ‘Cathie’ Wood started ARK Invest and ARK Innovation ETF (NYSEMKT: ARKK) in 2014 after working at other investment businesses to bundle active stock portfolios into ETFs. Ark Innovation Fund has returned over 45 % annually on average over the previous five years. ARK Innovation ETF was the top US equity fund in 2021 and supports Bitcoin (BTC). ARK Invest thinks opensource cryptocurrencies will usher in a new era of monetary systems and asset storage and transmission. CBDC, → “Central Bank Digital Currency” CC, → “Creative Commons” CD, → “Certificate of Deposit”
39
Central Bank Digital Currency (CBDC) including RAM, GPU, and others. Early in the crypto sector, CPUs were used for cryptocurrency mining. As the industry evolved and competition increased, CPUs were eventually replaced by GPUs and specialized ASICs (ASICs). Centralized, Centralized structures depend on a central authority to make decisions and run the system. A centralized organization is a corporation with a single CEO or a limited number of senior managers. Centralized companies have a clear line of command and a concentrated vision, which leads to swift and efficient decision-making and reduced mistake. Due to defined roles, they are frequently more cost-effective. Decentralized systems avoid the single point of failure whether intentional, incompetent, or unintentional, but might have redundancy. Networks like Bitcoin (BTC) or Ethereum (ETH) remain completely functioning even when one or more nodes cease operating. Centralized Exchange (CEX), Centralized exchanges (CEX) promote trading between customers by keeping an order book. CEXs gather buy and sell orders from its users and match them using software. CEXs are the most common cryptocurrency exchange model. CEXs’ dependence on a central entity has drawbacks. Lack of transparency at centralized exchanges promotes wash trading and price manipulation. In 2019, nearly $292 million in client cash were stolen in the 12 greatest CEX thefts. even more in the FTX scam in 2022. Centralized exchanges are an obvious target for government censorship, enabling authorities to freeze and/or take user cash and compel parent businesses to provide client information. Centre (Consortium), Centre, supported by Circle and Coinbase, manages USD Coin. Its value is tethered to the US dollar, making it price-stable. This is unlike Bitcoin and other free-floating cryptocurrencies. The Centre is a network driven by price-stable crypto assets that improves worldwide money movement and forex. network mints, trades, and transfers stablecoins. Businesses may employ token-based transactions to access into global marketplaces without making local currency deposits or opening multiple bank accounts. Stablecoins like USDC are meant as a dependable store of value or unit of account. Coinbase is a significant US cryptocurrency exchange, while Circle
and policies. Central banks may expand or contract a country’s money supply, affecting loan cost and availability. Increasing or reducing interest rates may boost or balance GDP, industrial activity, and consumer spending. All these judgments are made typically based on national economic interests. Central Bank Digital Currency (CBDC), CBDCs are central bank-issued digital fiat currency. CBDCs stay inside the conventional, intermediated financial system of fiat currencies, which are supported by faith in the currency’s issuer: a national central bank and eventually, the sovereign government or political authority. They are inspired by cryptocurrencies like Bitcoin (BTC) and Ethereum (ETH). CBDCs are digital versions of fiat currencies like the US dollar, euro, or Japanese yen. Today, only The Bahamas, Nigeria, and the ECU have publicly accessible CBDCs whereas China and Uruguayan are still proof-of-concept experiments. CBDCs may or may not use blockchain, but they are not actual cryptocurrencies. Their issuing central banks oversee production and distribution, just as with regular fiat currencies, hence they are not decentralized. CBDCs provide various benefits over fiat money. Central Ledger, Central ledgers are physical books or digital files used to record and total economic transactions centrally, as opposed to distributed ledgers technology (DLT). Ledgers have been used since ancient times to record asset ownership, legal identification, legal status, and political rights. Double-entry bookkeeping, popularized in 16th century Italy, improved the use of ledgers in banking and accounting. Accounting departments normally administer a single, central ledger to record all economic activities for financial analysis, tax filing, and more. Distributed ledger technology strives to decentralize accounting and eliminate the central authority. Bitcoin’s blockchain is a successful decentralized ledger. Central Processing Unit (CPU), A central processing unit (CPU) is the computer’s brain and conducts arithmetic, logic, and control functions. Computer science has used CPUs since the 1950s. Modern CPUs are microchips with millions of transistors that may switch on and off, indicating binary ones and zeros. These transistors enable CPUs to conduct billions of computations each second. A CPU supervises the work of other computer components,
40
Changpeng Zhao (CZ) develop independently separating one or more projects from the parent project. Many cryptocurrencies, particularly in the early years of the industry, were launched as open-source projects, making it simple to fork a project, even for a developer without the expertise to produce their own currency. Some of the top cryptocurrencies are forks or forks of forks of parent projects. Sometimes, ideological disagreements produce chain splits, as e. g., Bitcoin Cash (BCH) or Ethereum Classic (ETC). Change, Numerous cryptocurrencies, including Bitcoin (BTC), are built on the so-called unspent transaction outputs (UTXO) paradigm. In the UTXO paradigm, transactions consist of inputs and outputs: when a user wishes to transmit coins to another user, they provide inputs into the network. After processing the transaction, the latter generates outputs that may be utilized as inputs for subsequent transactions. Contrary to popular belief, the balance of a cryptocurrency address is not the number of coins held on it, but rather a collection of unspent outputs from past transactions. When a user transmits cryptocurrencies, they can only do so in entire outputs, with the remainder being returned as change. Change Address, Cryptocurrency users do not always know the precise amount to transmit, just as with conventional money. In cryptocurrency transactions, inputs cannot always be computed accurately. The sender address might deliver more money than asked. Change is the difference between the desired and input amounts. This change is saved in a change address and reimbursed to the sender’s wallet address. Change addresses are hidden from users. Users may not observe changing addresses while using the blockchain and performing transactions. But without them, sending precise amounts to other wallets or buying NFTs would be difficult. Changpeng Zhao (CZ), Binance’s founder and CEO is Changpeng Zhao (or CZ). He is a Chinese-Canadian billionaire who founded Binance in 2017 and holds dual residence in China and Taiwan. Zhao was born in Jiangsu, China, and came to Vancouver in the 1980s. Zhao studied computer science in Canada. After graduating, Zhao worked as a software engineer for the Tokyo Stock Exchange and Bloomberg Tradebook. Zhao came to Shanghai in 2005 and built a broker trading platform.
is a popular stablecoin creator. This lends the USD Coin a lot of credibility. Certificate of Deposit (CD), Credits enable users to buy products and services without the requisite cash. Customers might also desire to start profiting from their capital. A Certificate of Deposit (CD) is issued by banks and other financial organizations when clients make deposits. The institution uses this deposit while the consumer obtains a percentage-based interest rate premium. CDs remain a popular method to receive passive income on assets. While the idea is enticing, few crypto ventures have moved into CDs. In general, cryptocurrency CDs are riskier than their standard equivalents as the return rate on any crypto-backed CD fluctuates in a correlation with the price movement of the given token. CEX, → “Centralized Exchange” CFD, → “Contract for Difference” CFTC, → “Commodity Futures Trading Commission” Chain Linking, Chainlink (LINK) is an opensource cryptocurrency and technology platform that allows non-blockchain businesses to connect securely with blockchain platforms. It links blockchain-based smart contracts to external data such as baseball scores and market prices. The LINK token is used to compensate Chainlink network operators and to secure the network’s smart contract agreements. Chainlink is often referred to as a decentralized oracle network or blockchain abstraction layer. It utilizes blockchain technology to enable hybrid smart contracts. Businesses using Chainlink have access to all major blockchain networks, including as Ethereum and Solana. Chain Reorganization, During chain reorganization, a node deactivates blocks in its previous longest chain to add the newest blocks, which form the new longest chain. Chain reorganization occurs mostly on busy blockchains like Bitcoin and Ethereum. When two nodes update their ledgers, the node with the shorter follow-up chain reorganizes it giving all node operators the same distributed ledger. This key mechanism makes blockchain technology so adaptable. Chain restructuring ensures that all ledger copies across nodes are identical, validating all recorded transactions. Chain Split, Software forks arise when developers clone an existing project’s codebase and
41
Chargeback cryptocurrencies on established exchanges by launching cryptocurrency futures. Chunk (NEAR), Chunks are sharded portions of NEAR blocks. Chunk stores state histories and offers indexing and querying services and performs transactions using the EVM and preserves a transaction history. NEAR utilizes open Proof of Stake. NEAR’s basic protocol was developed with sharding from the start, unlike many other systems. Chunks include a block’s transactions, receipts, and execution outcomes. Cipher, Ciphers were created so individuals could share private information in secret. Ciphers change plaintext (the communication the sender wants to encrypt) into ciphertext, which may be securely given to the recipient. The receiver uses a key to decode ciphertext into plaintext. Sender and receiver agree on the key before commencing communication. A good cipher must create ciphertext that is difficult or impossible to decipher without the key. Classic ciphers are older pen-and-paper ciphers that have long been replaced by computer-assisted approaches. New cryptographic ciphers are so computationally complex that encryption can only be done with computers, and decoding is prohibitively expensive even with the most powerful machines. Cryptocurrencies depend heavily on cryptography, especially ciphers, to maintain network security. Ciphertext, In cryptography, ciphertext is encrypted plaintext using a cipher. Decryption converts ciphertext to plaintext. A transposition cipher, or rail fence cipher, permutes the plaintext to ciphertext. Permutation ciphers alter the plaintext’s locations such that the ciphertext is a permutation of the plaintext. Sender and recipient exchange a secret pre-shared key. In public-key cryptography, the sender uses the public key to encrypt and the recipient does not know the private key. Circle, Circle offers a peer-to-peer payment method. Circle’s platform also lets consumers and companies conduct mobile payments. In 2018, Circle announced USDC, a stablecoin backed by $1 or an equivalent asset. The USD Coin is tied to the US Dollar 1:1 making it simple to transfer money into, out of, and between crypto apps, exchanges, and protocols, providing a much-needed foundation for decentralized finance. USD Coin may help innovators in established sectors explore new business mod-
He worked on Blockchain.info in 2013. Zhao started Binance in 2017 with $15 million from an ICO (ICO). Binance has become the largest cryptocurrency exchange by trading volume. Chargeback, Chargebacks are commonly filed by customers after fraudulent or erroneous transactions, such as when they paid for a goods using their credit card but never received it. A chargeback is neither automated nor quick; the customer must first successfully challenge the initial charge. Clerical mistakes like a duplicate payment or technological faults may also lead to chargebacks. Chargebacks defend against identity theft, when a person’s credit card is used without their knowledge or permission. A crucial benefit for retailers accepting crypto payments it the impossibility of chargeback fraud with decentralized cryptocurrencies as all transactions are permanently recorded on the blockchain, Chatbots, Chatbots are a computer software that employs artificial intelligence (AI) and natural language processing (NLP) to simulate human interaction by understanding client requests and providing automated replies. Chatbots may make it easier for users to get the information they want by replying to their queries and requests via text input, voice input, or both, without human interaction. Chatbot technology is almost ubiquitous now, from smart speakers at home to office chat tools. The newest artificial intelligence chatbots are sometimes referred to as virtual assistants or virtual agents. They may engage through vocal input, such as Siri, Google Assistant, and Amazon Alexa, or via SMS text messaging. In any case, consumers may ask conversational inquiries about their needs, and the chatbot can assist focus the search via replies and follow-up queries. Chicago Mercantile Exchange (CME), Chicago Mercantile Exchange (CME), formed in 1898 as Chicago Butter and Egg Board, is a major US exchange. Initially, CME’s futures and stocks centered on the food and beverage business. CME revolutionizes the American stock market in many ways. CME launched the first US interest bond in 1972 and was the first exchange to become a shareholder-owned business in 2000. CME exchange merged with Chicago Board of Trade in 2007, establishing one of the world’s top financial exchanges. In 2017, CME began trading Bitcoin futures. CME pioneered the international acceptance of
42
Code is Law servers and can do it remotely. Through the cloud, one may access the same files and programs from any device since all computation and storing takes place on servers in a data center, not on the individual device. Cloud computing uses virtualization to create simulated, digital-only virtual machines that operate as if they were real, hardware-based computers. When done properly, files and apps from one virtual machine are not visible to another, even if they operate on the same hardware. SaaS, PaaS, IaaS, and FaaS are cloud computing service models (FaaS). One can further differentiate between private clouds, public clouds, hybrid clouds, and m multiclouds. Cloud Mining, Cloud mining arose as the solution to the necessity for extensive software and hardware engineering skills or the hiring of a skilled engineer while mining cryptocurrencies. Cloud mining businesses establish specialized crypto mining operations in areas with relatively inexpensive power and often cold climates (eliminating the need for artificial cooling). They lease portions of their hashpower to customers through so-called mining contracts. This approach enables small-scale miners to use the effectiveness of the cloud mining provider’s infrastructure through proxy. By acquiring mining contracts, the customers pay them directly the mining income that would otherwise be spread out over time. CME, → “Chicago Mercantile Exchange“ CMO, → “Collateralized Mortgage Obligation“ Code, Coding is the process of writing programming statements or source code for a computer program. In communications and information processing, a code is a set of rules that transforms information into a shorter or hidden form. This is basically the encoding process, which transforms information from a source into symbols for transmission or storage. On the other end of this spectrum is decoding, which is the act of converting code symbols back into an understandable form. In the context of cryptography, code has both particular technical implications and broad connotations. Technically speaking, code is the substitution of one word or phrase with another word, number, or symbol to obscure the original word or phrase. Code is Law, With Code is Law, constitutional lawyer and Internet activist Lawrence Lessig
els while avoiding the volatility risk of cryptocurrencies. Circulating Supply, The number of circulating cryptocurrency coins or tokens fluctuates over time. If a cryptocurrency is mineable, mining may produce new coins. In a centralized token, the supply may be raised instantly by the creators. The supply may be reduced by burning or by transferring coins to an unrecoverable address or losing access to a wallet. The network does not know how much of the entire supply is in active circulation. Even though Bitcoin’s (BTC) circulating supply should be around 18 million coins, since that is how many have been produced since the network’s creation, roughly 4 million have been permanently lost, bringing the genuine circulating number closer to 14 million. Thus, circulating supply is not the same as total supply or maximum supply. CJEU, → “Court of Justice of the European Union“ Client, A client is a piece of software or hardware (or the user of such tools) that connects to the server in a client-server connection, or to the rest of the network in a peer-to-peer environment. It enables remote Internet interaction between end users and other entities. In the cryptocurrency sector, software clients are used to connect to the blockchain network and interact with it. As part of their operations, clients interact with other network nodes. Clients for cryptocurrencies are used in a variety of use cases. Close, The closing price is one of four primary data points used in day trading to monitor an asset’s performance. All four are known as opening, high, low, and closing values (OHLC). Before 1969, stock exchange trading was limited to normal market hours, 9:30 am to 16:00 pm for the NYSE. Trading commenced and concluded at specified price points, and each day had plainly recognized OHLC. After-hours trading became possible with the advent of electronic trading, but OHLC measures are still monitored during market hours. Cryptocurrency exchanges offered 24/7 trading from the start. Nevertheless, they still give OHLC data in candlestick charts. Cloud, A cloud is a set of internet-accessible servers including the servers’ software and databases. By using cloud computing, consumers and businesses do not have to operate physical
43
Coin that the value of this transaction is tied to the reward of the current block and is affected by the current halving of the currency. A coinbase transaction on the Bitcoin network now has a value of 12.5 BTC, which is paid to the valid block miner or miners, but cannot be used until 100 confirmations have occurred. This ensures that the block meets all requirements for being totally valid. Coincident Indicator, Coincident indicators change at approximately the same time as reference series, i. e., at the time of interest. These are important, as they show the current situation and help to define the business cycle. Cold Storage, Cold storage offers an extra degree of security for user cash by physically isolating wallets from insecure networks, most notably the Internet, while they are not in use. As long as the actual cold wallet stays in a safe place, prospective attackers are unable to access the funds held on it. Cold storage is used by both people and businesses whose business strategy requires custody of client assets, such as cryptocurrency exchanges. There are several cold storage options, but paper and hardware wallets are the most common. A paper wallet is only a tangible piece of paper on which the public and private keys of the wallet are written. A hardware wallet is a USB drive-like device that must be physically connected to a computer in order to access money. Cold Wallet, When not in use, cold wallets are cryptocurrency wallets that are not linked to the internet or other insecure networks. Individual cryptocurrency users use cold wallets as a cost-effective and very straightforward method of insulating their crypto money from the potential of hacks, phishing, and other vectors of attack that may result in irreversible loss of coins. Paper and hardware wallets are the two most common kinds of cold wallets. Other, less common forms of cold wallets include smart cards and even sound wallets, which store private keys as music on CDs or vinyl records. Collateral, Collateral is a key financial word. Collateral is any asset used as loan security. Collateral ensures that the borrower will either pay back the loan to receive the collateral back or give the lender the amount borrowed. If the lender approves, any asset may be used as collateral except mortgages. Collateral reduces the lender’s risk. With collateral tokens, cryptocurrency collateralization is gaining momentum.
popularized an idea 22 years ago that is more relevant today than ever. The slogan goes back to MIT professor William J. Mitchell and states that rules laid down in program code have a quasi-legislative power. They determine, for example, who gets access to what information. Coin, Coins are single units of a cryptocurrencies that function on their own blockchains. The phrase distinguishes autonomous cryptocurrencies from tokens that run on blockchain systems like Ethereum (ETH). Bitcoin (BTC) was the first coin on the cryptocurrency market when it was released in January 2009. Some systems, like Ethereum and EOS (EOS), enable anyone to create tokens whose function depends on the parent blockchain and which would cease working if the platform went down. Coin Mixer, Coin mixing guarantees both parties stay anonymous. Anyone, anywhere may see cryptocurrency transactions on a public blockchain ledger by in putting a public address into a block explorer to see all transactions to and from it. Coin mixers were intended for those who want complete privacy and are software firms that transfer and receive cryptocurrency. Coin mixer combine a transaction with others, collecting the same cryptocurrency, and dispersing it to the designated addresses. Coin mixers charge a percentage fee for their services. There are pros and cons to coin mixers, but the fact is that they remain a legitimate service. Coinbase, Many cryptocurrencies are mineable, which means that every user may contribute computing power to the coin’s security. The network encourages mining by inserting an unique transaction in every new block that gives a fixed number of freshly mined coins to the individual or entity who mined that block. This is known as the generation transaction, and the coins it contains represent the block’s coinbase. The coinbase serves as the input for the generation transaction, the result of which is provided to the miner. Bitcoin’s coinbase was initially 50 BTC at the network’s debut. Approximately every four years, this value is cut in half, and it presently equals 6.25 coins. Coinbase Transaction, The first transaction on a block that is initiated by blockchain users is known as the coinbase transaction. The base value of this transaction is equal to the active reward for mining this block. This indicates
44
Collateralized Mortgage Obligation (CMO) take practically any cryptocurrency token as collateral for a loan. Many crypto lenders use fiat-pegged stablecoins to reduce risk. Cryptocurrency collateralization has more opportunity for growth. NFTs and other crypto-assets are now accepted as collateral for loans. Collateralized Debt Obligation (CDO), Drexel Burnham Lambert introduced collateralized debt obligations to (CDOs) the US in 1987. This derivative gained attention during the 2008 global financial crisis. CDOs are a collection of smaller loans (e. g., mortgages, car leases, and school debts) given to an institutional investor with the original lenders getting a lump sum and the new investor receives the loans and collateral. Between 2003 and 2007, CDOs were considered the next big thing in institutional investing with m any CDOs including riskier mortgage-backed securities. Many lost values as more individuals defaulted on their mortgages. CDOs have fallen from favor since the US housing bubble crashed, but still, banks use them to produce liquidity quicker on a smaller scale. Collateralized Debt Position (CDP), Collateralized debt positions (CDPs) are generated by locking collateral in MakerDAO’s smart contract to earn DAI. CDP collateral must always be worth 150 % of the DAI it generated. If a position is undercollateralized, the smart contract’s assets are liquidated to pay for DAI, a 13 % liquidation penalty, and stability costs (8.5 % each year). To unlock the collateral, a user must pay back the earned DAI plus stability costs. All 440 million DAI stablecoins in circulation were minted this way. Previously, only Ether could be used to finance MakerDAO’s CDPs. Now BAT, USDC, WBTC, TUSD, KNC, ZRX, and MANA are also supported. SAI is a remaining decentralized Ether-only stablecoin. Other DeFi projects might also use CDPs in the future. Collateralized Mortgage Obligation (CMO), Collateralized mortgage obligations (CMOs) are utilized by banks to increase their liquidity. CMOs are bundles of mortgages from various persons or corporations. The bank offers this package of loans to investors to swiftly get liquidity. The investor gets a collateralized loan package and repayments. The 2008 financial crisis showed how CMOs work as the US and worldwide financial worlds crumbled due to defaulting collateral debts. In 2008, more con-
Collateral tokens act as a risk mitigator for crypto-based lenders, similar to conventional financial markets. As bitcoin loans and blockchain-based banking grow more prominent, collateral tokens are in demand. Collateral Cap, Collateral cap spreads protocol-wide lending risk over many assets. It determines a market’s maximum effective collateral, measured in token units, and limits ‘borrowing power’ per asset. If a market’s collateral maximum is 1 million tokens, only 1 million may be utilized as borrowing collateral. This reduces systemic risks from single assets, particularly low-liquidity assets. Collateral caps limit the greatest possible protocol loss from a collapse or significant price decline in the token markets. They are an effective technique to govern and manage risks. Collateral Factor, Collateral Factor is the maximum amount a user may borrow depending on the total assets provided. It is also expressed by loan-to-value ratios (LTV) for DeFi and conventional banking institutions. Liquid or less volatile assets have larger collateral elements, which might alter with the market. Users may utilize the collateral factor to limit liquidation risk and preserve their holdings’ health. Lower collateral factors may be used to manage or control risks for assets with low on-chain liquidity, which are more volatile and prone to price changes leading to liquidation cascades. Collateral Tokens, Like conventional collateral, collateral tokens serve as a risk-mitigating asset for crypto lenders. Crypto collateralization works similarly as in traditional finance. The lending platform determines the borrower’s collateral token. COLL, or Collateral Pay, is a popular collateral token. The token was designed to serve as collateral, allowing holders to pay with fiat borrowed against their COLL holdings. This flexibility provides crypto investors a portfolio they can use every day. Collateralization, In contemporary finance, collateralization is one of the most prevalent loan insurance strategies. Larger loans provide a greater risk of default for lenders. Collateralization helps by offering one asset (property, fiat money, cryptocurrencies, commodities, etc.) as collateral for a loan in another asset. Traditional banking uses mortgages as security, while crypto gives borrowers and lenders alternative options. Crypto lending services may
45
Collateralized Stablecoin forms of commingled funds provide investors scale benefits, meaning they are likely to obtain a greater return than with a standalone investment vehicle. Typically, it is less costly than engaging personal investment managers for smaller investments. Commodity Futures Trading Commission (CFTC), The Commodity Futures Trading Commission (CFTC) is an independent government regulator that promotes the integrity and resiliency of the US derivatives market, including futures, swaps, and options and it punishes market fraud. Commodity Futures Trading Commissions Act of 1974 created the CFTC. During this period, agriculture futures trading dominated. Since then, the Commission’s authority has expanded to cover foreign currencies, national and international government securities, stock indexes, single-stock futures (SEC). swaps. The CFTC also now considers Bitcoin and Ether a commodity under the Commodity Exchange Act (CEA). The Commission underlined dangers connected with trading cryptocu’rencies owing to market volatility. Community Designated Sellers (CDS), Community Designated Sellers (CDS) are individuals who use their addresses for certain reasons and charge others who are attempting to sell their possessions. COMP Token, The COMP coin is Compound’s Ethereum-based native asset. COMP lets holders to vote on protocol improvements and interest rate modifications. The Compound team has committed to a transparent procedure for choosing which recommendations are incorporated in future protocol versions and drafted voting criteria. Compound is an open-source, free-to-use protocol whose online interface and API let anybody deposit or withdraw assets to earn an automatically adjusted return. Compound employs a bonding curve technique to guarantee its market has similar supply and demand as a typical financial asset and adjusts borrowing rates along a curve. Composable DeFi, Since Ethereum debuted smart contracts, decentralized finance has risen in the blockchain ecosystem (DeFi). The DeFi ecosystem has matured into a permissionless and borderless marketplace, redefining traditional finance (TradFi) by allowing anybody with an internet connection to access financial goods. Composability is a property of smart contracts that connects the DeFi ecosystem
sumers could not afford to make their monthly payments, hence many defaulted. In principle, this should have been wonderful for investors, but as they bought more property, the housing market imploded and property values plunged. Central banks and authorities have tightened CDO and CMO requirements since 2008. Collateralized Stablecoin, Collateralized stablecoins are backed by reserve collateral. USDT, USDC, and DAI are fully-collateralized stablecoins. The collateral allows token holders to exchange tokens for cash or other real-world assets. Cash, business documents, bond purchases, and more may be used as stablecoin collateral. The collateral may be invested to increase capital efficiency. Decentralized stablecoins pledge their collateral to onchain assets like crypto rather than conventional bonds/ paper. Collateralized stablecoins need a lot of cash for legitimacy and confidence, and their stability relies on the collateral. Many collateralized stablecoins need over-collateralization to absorb value volatility. This contrasts from algorithmic stablecoins (e. g., FRAX, ESD), which employ smart contracts to purchase, sell, and/or burn tokens to maintain a peg. Commercial Use, Commercial rights and hence usage for an NFT may be divided into three categories: unrestricted commercial rights for the owner, limited commercial rights, and no commercial rights whatsoever. In terms of copyright, NFTs function similarly to actual artworks. Someone may purchase a print and they would own the print, but they would not possess the copyright until given to them in writing. The same is true with NFTs. The photographer holds the copyright unless they have given it to another party. As the owner of the copyright, a photographer has the sole right to reproduce and distribute the work, as well as utilize it for commercial reasons. A collector who purchases an NFT may resale it to another collector, but they cannot license the picture if they have not been given the rights. Commingling, Commingling pools money from several investors into one fund combing them into a single fund or entity. Each investor partially owns this single fund. Multiple advantages justify the method. Pooled funds let fund managers conduct deals in bigger blocks, reducing trading expenses. Commingled funds provide investors access to a broader selection of assets that may demand a bigger buy-in. All
46
Consensus Mechanism every huge transaction. Once an unconfirmed transaction is posted to the BTC blockchain, a confirmation occurs every 10 minutes. Confirmations, Since there is no central authority to enable cryptocurrency transactions, they are handled by the network, or miners, who combine new transactions into blocks, secure them using the proof-of-work mechanism, and add them to the blockchain. A transaction (TX) must be communicated to the network before being recorded on the blockchain. Unconfirmed transactions are confirmed when they make it into a freshly mined block. Every new block added to the chain then confirms the transaction. The more blocks mined since a transaction, the harder it is to reverse it. Most crypto services, including as wallets and exchanges, demand at least three confirmations before acknowledging a TX as genuine and irreversible. Confirmed, The addition of a transaction to a public blockchain is determined by consensus. This signifies that most nodes (or network computers) must concur that the transaction is genuine. Those who own the computers in the network are rewarded for their efforts to verify transactions. Therefore, a transaction is confirmed if many nodes concur that it is genuine. Consensus, Blockchain is a distributed record of transactions maintained by individual miners without central control. Consensus is needed on the network’s current status at any time. Achieving distant agreement across several nodes is a non-trivial problem, particularly when an unknown number of nodes malfunction or act against the network’s interests, as shown by the Byzantine Generals’ Problem. Bitcoin (BTC), Ethereum (ETH), and other cryptocurrencies use proof-of-work and proofof-stake algorithms to maintain network consensus without central enforcement. Consensus Mechanism, Over the last 30 years, consensus mechanisms have been part of regular computer use. They are the cornerstone of all blockchains and the backbone of the cryptocurrency economy. First blockchain consensus mechanism was proof-of-work (PoW) from Bitcoin. Ethereum’s proof-of-stake and VeChain’s proof-of-authority (PoA) are other well-known consensus mechanisms. All these consensus approaches emphasize a certain criterion (effort, stake, authority) to assure agreement, transaction validation, and block
together, including DEXs, lending and borrowing protocols, collateralized loans, synthetic assets, leveraged trading, futures markets, and payment networks. Open-source DeFi dApps and protocols, commonly called Money Legos, communicate with each other. Many DeFi products are on Ethereum’s blockchain. Composable Token, Composable ERC-998 tokens let users to assemble or arrange assets into complicated hierarchies and exchange them with a single ownership. It may represent many digital collectibles or assets, such as a group of ERC-20 tokens, a collection of distinct ERC-721 tokens, a combination of the two, or another ERC-998 token and permits non-fungible tokens to own or be owned by ERC-721 and ERC-20 tokens. A non-fungible composable token is essentially a portfolio or collection of digital assets. These bundles may include any token type, such as art/game/sport NFTs, standard ERC-20 tokens, and crypto derivatives. The ERC-998 token enables a variety of novel use cases, especially because it enables the connection of many components to produce a single umbrella asset. This may assist users in constructing trees of interconnected ERC721 tokens and sell or purchase several ERC721 tokens in a single transaction. Concentrated Liquidity, First implemented by Uniswap v3, concentrated liquidity attempts to increase capital efficiency and make up for the original x*y = k calculation underpinning the typical automated market maker approach. In the new approach, liquidity may be assigned to a price interval, resulting in concentrated liquidity. Concentrating liquidity around the present price and adjusting bespoke positions according to price changes is an excellent approach for maximizing returns while exposing significantly less money to the risk of asset atoshieion. Confirmation , Confirmation proves something’s truth and is a final proof. Confirmation in cryptocurrencies measures how many blocks have elapsed after a transaction was uploaded to a cryptocurrency’s blockchain. More confirmations increase transaction security. Buyers and sellers may agree to wait for zero blocks for minor transactions, but for bigger ones they may request more. Three blocks are a secure medium ground for cryptocurrency confirmations, whereas six confirmations are indicated for bigger transactions and 60 confirmations for
47
Consensus Process unemployed, and more. Housing, clothes, education, and communication are major CPI areas. The CPI is broadly correct, although it misses regional pricing differences and assumes homogeneous purchasing habits. Contract, Since the beginning of time, humans have used contracts. Historically, contracts were mostly spoken, but today they are typically written or electronic. A contract indicates that A has agreed to do business with B. Contracts are binding agreements between two parties. Cryptocurrency contracts are different. Crypto and blockchain have various essential contract kinds. Blockchains rely on smart contracts. They make blockchain transactions and activities anonymous. Smart contracts are self-executing computer programs containing buyer-seller agreements incorporated in code. Contracts are crucial to distributed ledgers and blockchain-based apps. Contract Account, When contractors accept a contract, a separate account is formed for each contract to gather all related expenditures. This account is called a contract account and is given a serial number. All contract expenditures, such supplies, labor, and subcontract costs, are credited to this contract account. A contract account has a cryptocurrency balance and associated code, where code execution is triggered by transactions or messages from other contracts. When a contract account gets a transaction, its code is performed based on the transaction’s input parameters. Contract for Difference (CFD), Contract for difference (CFD) is a financial product that protects investors against price volatility in sold assets. Modern asset prices are volatile. Buyers and sellers sign a contract for difference to prevent sellers from losing money during document preparations. A CFD assures that the seller will get money for the asset’s worth now of the agreement, even if the actual sale occurs months later due to administrative formalities. CFDs joined cryptocurrencies as the financial landscape evolved. A CFD guarantees a crypto seller payment for the agreed price, even if the token’s value drops 10 minutes later. If the buyer profits, the seller receives less for their tokens. From this perspective, CDFs are a zero-sum game. Conversational Agent, Conversational agents may be utilized for several reasons, including customer service, chatbot applications, and
formation. Any blockchain protocol needs consensus mechanisms to work properly. They protect blockchain users as the node validators filter out invalid transactions using consensus mechanism rules. Creating a workable consensus mechanism is difficult, but blockchain developers are taking novel techniques. Consensus Process, The term Consensus Process refers to the nodes responsible for maintaining the blockchain ledger. Especially, for reaching a consensus when a transaction is made with the consensus algorithm from all the participants of the Blockchain network. Its ultimate goal is to reach a consensus about the current state of the distributed ledger. ConsenSys, ConsenSys provides developer tools and business blockchain solutions. Their mission is to allow developers, organizations, and consumers globally to construct next-generation apps and establish contemporary financial infrastructure while accessing the decentralized web. ConsenSys was created in 2014 and develops decentralized software and Ethereum apps as e. g., MetaMask, an Ethereum wallet application that enables users to store, transfer, and interact with decentralized Ethereum blockchain apps. Codefi, Diligence, Quorum, Infura, and Truffle are other projects. Consortium Blockchain, Consortium blockchains are established and utilized by groupings of organizations who find public, permissionless blockchains insufficient for sharing value and information. Consortium blockchains are between public and private blockchains. Bitcoin (BTC) and Ethereum (ETH), the major cryptocurrencies, use public blockchains. Private blockchains are intended by organizations for internal usage. Consortium blockchains are in between. They are built by groupings of enterprises that desire a decentralized network only they can access and limit access from outside the consortium, preserving critical company data and decreasing network traffic from additional nodes. Consumer Price Index (CPI), A Consumer Price Index (CPI) tracks the prices of a basket of products and services to obtain market segment insights. CPI tracks consumer products and services that the typical customer buys. It is a way to measure inflation and deflation and allows governments to get insight into their monetary policy choices and adjust them. The CPI statistics cover professionals, self-employed,
48
Corporate Treasury digital records to allow users receive, store, and transmit digital money. Bitcoin Core, a comprehensive Bitcoin client, builds the network’s backbone is secure, private, and stable and stores Bitcoins. This is a heavy complete node of the blockchain network. Therefore, one must download the whole chain to operate the wallet on an own device. Corporate Digital Responsibility, Corporate Digital Responsibility (CDR) has risen in importance in service industries as the disruptive power of digital technology continues to create ethical issues. Big data and AI technologies are reshaping the delivery of services, creating lucrative prospects for businesses. Nonetheless, these technologies also represent several potential concerns to users, including privacy issues and unjust treatment based on algorithmic biases. Therefore, service companies must consider their CDR while interacting with clients in the digital world. This requires establishing company-wide rules that place an emphasis on ethics, justice, and privacy, and ensuring that CDR becomes an intrinsic part of the company’s culture. Services are interwoven in people’s lives and create a plethora of data and insights that provide lucrative business possibilities but often expose customers to risk. However, these digital technologies also provide significant client dangers that must be managed with caution. Data security is of the utmost importance, since abuse or unauthorized access to personal information may result in reputational harm and legal consequences. Moreover, algorithmic biases may result in unjust treatment, such as when consumers are discriminated against based on their color, gender, or age. Service providers must emphasize the establishment of company-wide standards that favor ethical conduct. Developing a corporate culture that values CDR and takes client safety seriously is required. Corporate Treasury, Corporate treasuries manage cash reserves. Treasurers oversee firm financial reserves to guarantee liquidity, risk, financing, effective capital allocation, and strategic objectives. Asset and liability liquidity are used to manage a company’s liquidity. Corporate treasurers manage company-wide plans, reporting to C suites on the feasibility of acquiring a firm or expanding into new territory. If the C suite chooses, they may need to liquidate assets, issue shares, or use reserves.
instructional chatbots, and across sectors to automate processes, save costs, and enhance the customer experience. They use natural language processing (NLP) technology to comprehend and react to user input, enabling them to engage in meaningful conversations with humans. Conversational agents may be incorporated into websites, mobile applications, chat platforms, and other avenues of communication, making them readily available to users. They are able to manage a large number of contacts and questions and provide prompt, individualized replies. In recent years, conversational agents have gained popularity as companies attempt to enhance the customer experience. They are an excellent method for organizations to engage consumers, automate procedures, save expenses, and save time. Coordinator, A coordinator monitors and checks validator nodes in blockchain technology and sets milestones. These milestones are blockchain transactions validator nodes utilize to validate their ledger copy. Not all blockchains have coordinator clients. IOTA uses a coordinator client to verify ledgers. Blockchain and cryptocurrency advocates think coordinators inhibit decentralized power. New consensus mechanisms are emerging as blockchain technology advances helping to further decentralize blockchains. For new projects or those who seek blockchain centralization, a coordinator client may assist ensuring network security. Copyright, Copyright is a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression. In copyright law, there are a lot of different types of works, including linguistic works, works of music, performing works, works of visual arts, photographic works, cinematographic works, representation of a scientific or technical nature. Copyright Infringement, As a general matter, copyright infringement occurs when a copyrighted work is reproduced, distributed, publicly exhibited, performed, or communicated to the public without the permission of the copyright owner. Core Wallet, A core wallet may include the full blockchain, not just a fragment, and enables users to receive, store, and transmit digital money with or on it. Bitcoin transactions are held on a global digital ledger called a blockchain. A wallet interacts with the network of
49
Correction Craig Wright, Craig Steven Wright is a computer scientist who has worked with high-profile firms and the Australian Securities Exchange. Wired magazine named Wright a probable Bitcoin creator in 2015. After Wired publicized this information, federal police searched Wright’s Australian house, claiming the Australian Taxation Office ordered it. Wright claims he is Satoshi Nakamoto, and cryptographic proof supports this. Digital communications bearing Wright’s name are purportedly related to early Bitcoin blocks. Wright says he and cryptographers Dave Klieman and Hal Finney invented Bitcoin (who created the first proof-of-work algorithm before Bitcoin). Wright is fascinating, but the search for Satoshi Nakamoto continues. Creative Commons (CC) , Creative Commons (CC) is a non-profit organization that provides free licenses for creators to use when making their work available to the public. These licenses help the creator to give permission for others to use the work in advance under certain conditions. Creator Economy, The creator economy consists of customers, entrepreneurs that cater to their audience, advertising, and corporations that market to creative entrepreneurs. The creative economy includes persons who can monetize a pastime online. Platforms enable creators to generate money from their work. YouTubers and TikTokers make fan material. This typically limits financial options, such as products, subscriptions, ad revenue, or tipping, to the top 1 % of producers with significant followings. Platforms take much of authors’ money. A typical streaming artist makes 10 % of their royalties, with the rest going to the record company. They do not allow artists to be identified by their algorithms, and few grant direct ownership, allowing all stakeholders to benefit from their efforts. Credit Rating, A credit rating is one of the most essential measures banks and lending institutions use to determine a borrower’s loan-repayment ability. Any firm seeking a loan from a bank or other lender has a credit rating. Credit ratings influence whether banks provide loans. Credit scores are dependent on many criteria. Moody’s, S&P Worldwide, and Fitch Ratings dominate the global government credit rating sector. These three firms examine nations’ economic situations and readiness for
Corporate treasuries manage risks, too. Interest rates, loans, currencies, commodities, or firm operations may provide dangers. Correction, A correction is a quick drop of at least 10 % in an asset’s price from its previous high. Corrections revert prices from anomalous surges to their long-term trend. Corrections are normally followed by recoveries, but they might lead to bear markets with 20 % or greater price drops. According to Charles Schwab, the S&P 500 index had 24 corrections from November 1974 to February 2020, but only five led to bear markets. Due to its extreme volatility, the cryptocurrency market experiences corrections of 5-10 % more often than conventional markets. Co-Signer, Co-signers refer to multi-signature cryptocurrency wallets. Most cryptocurrency wallets utilize a single private key to control money. In certain situations, these wallets are not easy, convenient, or secure enough. Multi-signature bitcoin wallets need many persons or organizations to produce unique keys before granting access to stored assets. 2-of-3 requires two out of three keys to access monies, for example. Co-signers use private keys. In certain cases, crypto money must be co-signed. Country of Protection Principle, The country of protection principle is a principle in private international law according to which the law of the country for whose territory protection is claimed is applicable to intellectual property issues Court of Justice of the European Union (CJEU), The Court of Justice of the European Union (CJEU) interprets EU law to make sure it is applied in the same way in all EU countries, and settles legal disputes between national governments and EU institutions. CPI, → “Consumer Price Index“ CPU, → “Central Processing Unit“ CPU Miner, CPU miner is software used to mine cryptocurrencies on a CPU. Some coins need a CPU and software for mining. CPU mining uses a computer to conduct difficult computations on blockchain data blocks and run hashing functions until the proper result is obtained. Since crypto mining, particularly BTC, has become harder, miners have turned to GPU and ASIC mining. GPUs and ASIC miners can mine blocks quicker than CPUs.
50
Crowdloan Cosmos, and Wanchain are leading cross-chain projects. Cross-chain solutions improve data ownership, encryption, efficiency, and transparency. Cross-Chain Communication, Cross-chain communication is crucial for blockchain’s decentralized operation. As blockchain projects have distinct architectures, it may be hard to communicate data without third-party software. Several cross-chain communication techniques allow blockchains to exchange data. Atomic swaps are blockchain developers’ most popular cross-chain tool. An atomic swap enables peers to move tokens wallet-to-wallet via a smart contract. SVP is another blockchain cross-chain tool estimating transaction validity without storing complete transaction data. This allows blockchains to connect without exchanging much data. The optimum cross-chain communication method depends on the two blockchains involved. Lack of cross-chain communications on the other hand hinders blockchains’ performance. Cross-Chain Contract Calls, Cross-chain contract calls enable information, coins, and NFTs to travel freely across blockchains achieving Web3 interoperability. Cross-chain contract calls eliminate the need to transmit cash across chains, use bridges, and manage native gas tokens, creating a chain-agnostic, chainless experience. NFT purchases, multichain yield farms, and liquidity pools use crosschain contract calls. Crowdfunding, Crowdfunding helps finance initiatives and enterprises and allows fundraisers to gather money from many individuals online. Instead of obtaining financing from conventional sources such as banks, mutual funds, or business angels, crowds are used. The rewards crowdfunders get depend on the crowdsourcing technique utilized to raise the cash. They might obtain a concrete or intangible reward for their risk. Crowdloan, During their early phases, most crypto ventures employ Initial Coin Offering (ICO) which has no success guarantee. Polkadot solved this problem using crowdloans. Crowdloans are part of Polkadot’s substrate structure and enable parachains to create $DOT and enter auctions. There is a crowdloan timetable before every parachain slot sale. The investors’ $DOT are locked for the parachain lease duration (typically six months to
greater national debt. A strong credit score is crucial since it affects future loan terms. Credit Risk, Banks and lending institutions calculate credit risk before extending loans. All loans, whether personal, business, and national, include credit risk. Lenders must minimize the risk of defaulting borrowers. Consumer credit risk is based on credit history, ability to repay, capital, lending circumstances, and collateral. Institutions have credit risk management departments. Credit risk management calculates new borrowers’ credit scores. Credit risk is still relatively new in the cryptocurrency industry, but several classic financial ideas have already been adopted and many crypto lenders use collateral to secure their investments. Cross Margin, Cross Margin, sometimes called spread margin, uses all available money to avert liquidations. Any realized profit-andloss statement might help boost margin to a losing position. Cross margin implies all a user’s positions utilize one pool of money as collateral. The user does not need to add or delete margin for each position, simplifying collateral management. In this paradigm, one position’s P&L impacts the others. If the user holds numerous highly leveraged holdings, one might put others at danger and lead to liquidations. Depending on risk tolerance and trading style, cross-margin may be better for hedging or pair trading. Cross-Border Trading, Cross-border trading in financial markets and trade finance allows worldwide trading in local currencies and against local counterparties. Cross-border trading allows investors to capitalize on price disparities and arbitrage possibilities in global marketplaces. In the early days of crypto trading, traders could not access other nations’ exchanges. A US-based crypto exchange would only allow BTC/USD trading. With cross-border trading platforms, one may quickly access local currency liquidity, such as BTC/JPY, BTC/EUR, and more. Cross-Chain, Cross-chain allows blockchain networks to share information and value. It breaks blockchains’ silos to build a distributed environment. Unlike linked platforms, crosschains run separately, therefore they do not inherit their flaws. Inter-blockchain technology eliminates middlemen when transferring value across decentralized networks, allowing seamless user interaction. Polkadot, Blocknet,
51
Crowdsales standard debit cards. Despite being paid with a crypto card, retailers are paid in fiat currencies like EUR or USD since the card issuer uses market prices. The conversion equals the card to a debit card, but it offers cryptocurrency users extra perks, particularly if consumers go abroad often, they may avoid hefty currency exchange costs. In addition, a crypto debit card exempts consumers from annual fees charged on traditional cards. Crypto debit cards allow ATM withdrawals and interact with Samsung Pay, Google Pay, and Apple Pay. Crypto Deposit, Until now, cryptocurrency exchanges have offered systematic investment plans (SIPs) and crypto token baskets, similar to mutual funds. In addition, ere is the crypto deposit which is comparable to a bank fixed deposit. Since these items are not regulated, their characteristics and interest vary substantially across exchanges. Crypto Game, Using a decentralized blockchain as opposed to a centralized server, NFTs in a video game are distributed directly to players, are interoperable across games, and have proven scarcity. Games that store tokens, such as in-game objects, on a distributed ledger atop a cryptocurrency network are often referred to as crypto-games. They permit the trade of game goods for cryptocurrencies, which can subsequently be converted into fiat cash. Crypto Invoicing, Crypto invoicing lets businesses and private persons make customized bills for goods or services. It allows billing customers in cryptocurrency via email without switching wallets and applications. Many companies and people are already accepting cryptocurrencies as payment for products and services, but u ser-unfriendliness still hinders many crypto payments. It is harder to record the counterparty and transaction price than with regular invoicing making crypto bookkeeping a tax and accounting headache. A crypto invoicing platform helps to make, manage, monitor, and evaluate client bitcoin payments. It searches the blockchain explorer and informs both parties when the payment was done. PayPal, Venmo, Visa, and Mastercard have teamed with crypto firms to let customers buy products using their digital assets. McDonald’s, Starbucks, AMC, Pizza Hut, and others accept crypto payments. Freelancers, professionals, athletes, artists, and even politicians are taking cryptocurrencies.
two years). At lease’s end, investors get their $DOTs. Because projects never own the tokens used in crowdlending parachain auctions, they have no incentive to seek a crowdloan unless they can provide an economic return. The crowdloan approach secures investors’ money while allowing them to earn more tokens on a possible enterprise. Crowdsales , A cryptocurrency crowdsale is a public selling of new cryptocurrencies or other digital assets, such as non-fungible tokens (NFTs), for investment. Crowdsales of cryptocurrencies may generate funding for anything relating to cryptocurrencies or blockchain, including the establishment of a new company or initiative. Occasionally, companies establishing a NFT project may conduct a pre-sale, enabling everyone to utilize ETH (or their own altcoins to purchase the new tokens). Purchased tokens are distributed to investors and individuals who have been involved from the beginning. Crypto, → “Cryptocurrency“ Crypto Artist , Creatives, visual artists, singers, and filmmakers who provide value by selling NFT artworks for bitcoin. Numerous of the most renowned crypto artists have been well-known in the field of digital art for some time. Some, such as the DJ Deadmau5, Micah Johnson, and the musician Grimes, have already established reputations. Others protect their anonymity by adopting street artist-style pseudonyms. Crypto Collectables , A crypto-collectible is a non-fungible, cryptographically-unique digital asset. In contrast to cryptocurrencies, for which all tokens must be similar, each crypto-collectible token is either unique or restricted in number. Typically, crypto-collectibles are shown as physical items, such as animals, pets, aliens, avatars, or any other digital item. There are restrictions on the number of tokens that may be created, and each token has a unique combination of properties. These collectible goods may serve several purposes, such as part of a community and in video games. Crypto Debit Card, A crypto debit card enables its user to pay using cryptocurrencies like Bitcoin (BTC), Litecoin (LTC), and Ethereum (ETH). Most crypto debit cards are enabled by Visa and MasterCard, allowing worldwide usage. Users must first load their crypto debit cards with cryptocurrency before buying, like
52
Cryptocurrency Cryptocollectibles , A crypto-collectible is a non-fungible, cryptographically uncommon digital asset. In contrast to cryptocurrencies, which require all tokens to be identical, each crypto-collectible token is unique or limited in quantity. These blockchain assets are not readily marketable since they represent unique digital goods, such as crypto paintings or crypto cats. Cryptocurrency Money Laundering, As part of the FUD, cryptocurrency-enabled money laundering is popular. Governments and conventional banking organizations regularly discuss money laundering when discussing cryptocurrencies. Politicians and economists regard crypto as a vehicle for money laundering, tax evasion, and other crimes. SEC, Fed, and other regulatory organizations criticize decentralized cryptocurrencies for lack of traceability and responsibility. Bitcoin transactions are neither anonymous nor undetected. In 2020, the US authorities confiscated $1 billion in Bitcoin from the Silk Road network, where people bought illicit products and laundered money. Such examples have caused most governments to strengthen crypto AML legislation e. g., with Know Your Customer (KYC) requirements. As crypto becomes more popular, the IRS and SEC are taxing crypto earnings and crypto-denominated wages. Coinbase, Binance.US, Gemini, and Kraken are examples of SEC-approved US exchanges. Cryptocurrency Pairs, A cryptocurrency pair compares two token prices. ETH/BTC is most popular. Trading pairings show how much of one token can be bought with another. Cryptocurrency exchanges use crypto trading pairs to show each token’s worth, like conventional currency trading. With so many cryptocurrencies, new trading pairings appear every hour. Trading pairs for cryptocurrencies help investors conduct efficient exchange trades. Cryptocurrency trading pairings enable simple swapping of one token for another. Unpopular cryptocurrency trading pairings normally have higher costs, while the most popular ones are cheaper. Cryptocurrency , David Chaum invented ecash, a cryptographic digital money, in 1983. Bitcoin (BTC), introduced in 2009, was the first cryptocurrency to gain public attention. Bitcoin’s major invention was blockchain, a cryptographically protected distributed record
Crypto Law, Crypto law is a cross section of several different legal fields such as IT law, financial regulations, financial investment regulations, contract law, data protection, anti-money laundering regulations, competition law and consumer law, and tax law. Crypto Loan, A crypto loan is a secured loan, like a car or student loan with a cryptocurrency as collateral. The borrower repays the loans in stablecoins. With crypto loans, lenders (typically other users) lend cryptocurrencies to borrowers (those seeking cryptocurrency). Lenders charge interests for loaning money. Crypto lending lets consumers take benefit of crypto investment, as the value grows the longer one holds onto the cryptocurrency. Crypto loans are also fast as the platforms distribute cash instantaneously since there is no credit check or certification procedure. Some crypto lenders will lend up to 50 % of the collateral’s value. Aave, Compound, MakerDAO, and SmartFi are exemplary crypto-lending platforms. Crypto Winter, Eugene Etsebeth, a venture investor, coined crypto winter following the 2018 bitcoin meltdown. It is a period when the cryptocurrency market performs badly, affecting investor sentiment. Due to price volatility, it is hard to estimate when a crypto winter would end. Regulatory change, lack of demand, greater difficulty, and unsustainable highs might precipitate a crypto winter. Market collapses, exchange hacks/breakdowns, and government overregulation may cause crypto winters. A crypto winter typically begins after a cryptocurrency’s all-time high. Cryptoasset, Cryptoassets use encryption, consensus techniques, distributed ledgers, peerto-peer technology, and/or smart contracts as a store of value, medium of exchange, unit of account, or decentralized application (dApp). Cryptocurrencies, utility tokens, security tokens, and stablecoins are typical cryptoassets. Utility tokens are not coins since they do not have their own blockchain. Utility tokens may be exchanged, but that is not their main use. Security tokens derive their worth from exchangeable real and digital assets. These tokens must follow SEC rules. Cryptocollectable Asset Token (CAT), This is the Cryptocollectible Asset Token abbreviation for CryptoKitties (CAT). It is one of Ethereum’s most popular NFTs.
53
Cryptographic Hash Function owner’s knowledge or permission by clicking on an email link or attachment. The application consumes the host’s resources while the hacker benefits. Second, drive-by cryptojacking is accomplished online through malicious JavaScript code on web sites controlled or hijacked by hackers. Cryptojacking increases power consumption, slows computers, and shortens equipment life. Most contemporary antivirus software companies include cryptojacking prevention. Cryptojacking techniques might go unreported for a long time, enabling hackers to mine from unknowing victims’ devices. CryptoKitties, Dapper Labs’ CryptoKitties is an Ethereum blockchain game that lets users buy, breed, and trade virtual cats. It is one of the initial uses of blockchain for recreation. In December 2017, the game’s popularity slowed down the Ethereum network by creating a record number of transactions. Smart contracts on Ethereum monitor CryptoKitty ownership. CryptoKitty is a non-fungible Ethereum ERC721 token. For one year, one Generation 0 CryptoKitties was auctioned off every 15 minutes (672 every week). Based on the number of cats in circulation and their genomes, only 4 billion cats can be produced. Each cat’s phenotype is decided by its genotype in the smart contract. Cats may be purchased, traded, and transferred digitally with solid ownership guarantees as blockchain tokens. Cryptology, Cryptology studies encryption and decryption. Cryptography and cryptanalysis rely on mathematics, particularly number theory, formulae, and algorithms. Data must be changed so that an unauthorized person cannot view its real meaning for storage or transfer. This is done via difficult-to-solve mathematical problems. Intractability describes the difficulty of solving these equations. Because most of cryptology’s nomenclature stems to a period when only written communications needed to be protected, the source information, even if it is an unintelligible system of 1s and 0s, is called plaintext. Encryption transforms plaintext under the control of a key into ciphertext. Decryption is the opposite procedure, when a valid receiver obtains the hidden information using the key. CryptoPunks, CryptoPunks is an NFT collectable created by John Watkinson, Matt Hall, and Andy Milenius in 2017. Each of the created 10,000 24x24 pictures depicts a distinct
of all BTC transactions. By the end of 2022, there are tens of thousands different cryptocurrencies worth around 850 billion US dollars, down from over 3,000 billion in November 2021. All cryptocurrencies use cryptography to safeguard their networks. Cryptographic Hash Function, A cryptographic hash function is an algorithm that transforms a variable-length data string into a fixed-length, fixed-format hash. A hash function requires three qualities to work well: It should be simple to calculate an output for any input, but difficult to determine the input of a known output. A n input should always yield the same outcome. Changing a single input bit should drastically change the output. Hash functions are used as checksums to validate file integrity after transmission or storage, or as randomizing functions. They are also used to mine proof-of-work cryptocurrencies like Bitcoin (BTC), which employs SHA-256. Miners must create a hash value below a specific target to add a new block to the blockchain and earn their Bitcoin reward. Hashes are pseudorandom, so miners cannot produce coins out of thin air and must verify their labor. Cryptography, For a long time, cryptography dealt primarily with ciphers – algorithms that turned plaintext communications into ciphertext. The receiver would employ a key to decode the ciphertext into plaintext. This information was meaningless to third-party enemies without the key, even if the mail was physically intercepted, until cryptanalysis was developed. The early forms of ciphers, substitution, and transposition, were hand-crackable. They did not jumble the data sufficiently to defy current cryptanalysis tools. Radio and later internet connections increased the requirement for robust encryption since messages were broadcast indiscriminately and may be intercepted. Through computers, new ways of plaintext scrambling become available that are practically unbreakable or infeasible to do so in a reasonable amount of time with the resources available. Today, SHA-256 is used to safeguard Bitcoin (BTC) and other cryptocurrency networks. Cryptojacking, Unscrupulous hackers may mine bitcoin by stealing others’ computing resources, a behavior called cryptojacking. There are various methods to cryptojack, but two are common. First, a trojan installs without the
54
Custody scheme boosts involvement by connecting with other DeFi protocols and giving Curve DAO (CRV) tokens and interest. Curve AMO uses FRAX, a fractional algorithmic stablecoin, and USDC collateral to provide protocol liquidity and tighten the peg. This enables Curve AMO to establish and collect admin fees for FRAX stablecoin holders and future functionality. The protocol may shift idle USDC collateral or fresh FRAX to its Curve pool to increase liquidity, tighten the peg, and generate trading fees. Custodial, A custodial arrangement is one in which a service provider holds a customer’s private keys while offering a login account. Custodial wallets maintain a user’s private keys and enable them to access their cash through a simple login-password setup. Custodial services include centralized cryptocurrency exchanges. Customers may put crypto into an exchange account and swap it for other cryptos or currency. Trades are recorded on the exchange’s internal balance sheet, not the blockchain. Customers’ funds are kept in custody from the time they are placed until they are withdrawn. Easy to use and efficient, these systems pose custodial concerns by holding numerous clients’ cash in one location, making them vulnerable to hackers, government censorship, or technical problems. Custodian, Financial custodians hold financial assets. Money and assets are frequently kept by a brokerage business, commercial bank, or similar entity. Financial custodians maintain physical control over checking, savings, money market, and 401(k) accounts and offer transaction settlements, account administration, dividend and interest payment collection, foreign exchange transactions, and tax aid. Well known custodian banks include Bank of New York Mellon, JPMorgan Chase, Citigroup, Bank of China, Credit Suisse, UBS, or Deutsche Bank. Institutional investors with large bitcoin holdings typically use blockchain custodial services. Custodians of cryptocurrencies employ hot and cold storage. Custody, Custody is a financial service that protects a customer’s securities. Custody has changed from a personal relationship to a regulated institution. This increased financial complexity, isolating banks from normal life. Custodians that take client money now agree to lend them out for their own advantage. Custo-
punk (alien, robot, ape, etc.) that can be held by blockchain asset owners. Many of these punks resemble celebrities. CryptoPunks were developed to highlight what is possible with non-fungible tokens on Ethereum through ERC-721, much like CryptoKitties did with ERC-20/ERC-233 reproducible tokens. CryptoPunks and the NFT market soared in 2021. Several NFTs have sold for millions of dollars from this collection. Larva Labs offered CryptoPunks for free as an experiment having no clue it would become the top NFT. Currency, A currency is any means of circulating or exchanging money especially banknotes and coins. Currency is also the national money system and a country’s paper and metal money used for commerce. The US utilizes dollars, quarters, nickels, dimes, and pennies. Cryptocurrencies are virtual currency safeguarded by encryption. This prevents counterfeiting and double-spending. Many cryptocurrencies are built on decentralized network blockchain technology, which acts as a global distributed ledger. Fiat currencies are government-issued, unbacked currencies. Central banks may determine how much fiat money to produce, giving them greater power over the economy. FIAT currencies include USD, EUR, and AUD. Currency Crisis, A currency crisis happens when there are concerns about a central bank’s foreign exchange reserves. A crisis often coincides with a speculative assault on the currency market. These are markets where people may buy and sell currencies like stocks, which may further weaken the currency – a currency devaluation bubble. In a devaluation, many individuals panic-sell the currency at below-acceptable values, thus it depreciates more than it should. Governments combat such assaults by using their currency reserves or foreign reserves to accommodate excess demand. Inflation, political instability, rising debts, credit unbalance, and other economic issues including currency exchange rate volatility may produce a currency crisis. Crisis instances include: London’s 1772 credit crisis, the Great Depression 1929–39, the OPEC Oil Price Shock of 1973, the Asian Crisis of 1997, or the 2007–2008 Financial Crisis. Curve AMO, Curve AMO employs numerous cryptocurrencies to run a stablecoin-focused AMM service (cryptocurrencies programmed to mimic other assets). Curve AMO’s incentive
55
Cypherpunk Moloch DAO, however it may apply to any new DAO. All-important DAO infrastructure may be implemented in seconds, and several tools make it feasible with a few clicks. Summon in the context of founding a new DAO expresses the urgency of calling on a community to gather around a shared purpose or similar values and a devotion to the DAO ethos of dispersed and collaborative ownership. Traditional firms and organizations, which are neither community-driven nor community-owned, use more utilitarian phrases like create, start, or finance. DAO summoning also means gathering new DAO members. A DAO summoner recruits the initial members. Dapps, → “Decentralized Applications“ Dark Web, The dark web is an unsearchable subset of the deep web that needs specific software to access. Tor (The Onion Routing) and I2P (The Invisible Internet Project) are necessary to access the dark web. The dark web’s multilayer encryption, which sends messages via several volunteer nodes, guarantees that users’ names and whereabouts are hidden. Both visitors and hosts of dark web sites cannot access each other’s personal information, allowing for private communication. This degree of secrecy, enables users to freely communicate ideas and information. Researchers say it also leads to unlawful and unethical actions on dark web markets, such as selling illicit narcotics, guns, and child pornography. Due to their anonymity, digital nature, and permissionlessness, cryptocurrencies like Bitcoin (BTC) are popular on the dark web. Darknodes, RenVM is a cross-blockchain liquidity network of darknodes. Anyone may host darknode. Darknodes are decentralized, trustless custodians for RenVM digital assets. Although Darknode is permissionless, a 100,000 REN token bond is required to register and operate. This stops attackers from flooding the network with erroneous Darknodes. Darknode users must regularly upgrade and add ETH. Data Mining, The goal of data mining is to discover and extract patterns in large data sets, using methods at the intersection of machine learning, statistics, and database systems. The knowledge discovery in databases process, describes how raw data is turned into useful information, and data mining constitutes the analysis step of this process.
dians play a key role in the financial ecosystem, from onboarding newcomers to providing sophisticated trading tools. Custodians hold digital and physical assets. In the blockchain world, a third-party crypto exchange maintains the private keys of its cryptocurrency customers. Crypto exchanges offer security methods to keep consumers’ digital funds secure from theft or unforeseen losses. If hacked or stolen, the custodian (crypto exchange) must repay users. Cypherpunk, In the late 1980s Cypherpunks a movement of activists who championed encryption for personal privacy and independence was founded. Cypherpunks mailing list began in 1992. Its members discussed math, cryptography, computer science, politics, and philosophy. They questioned government surveillance and corporate control of information a decade before Edward Snowden made them public. Cypherpunks believe in implementing, not merely discussing, excellent ideas. As a result, they built various cryptography-based privacy-focused programs, notably Pretty Good Privacy (PGP) for secure data transfer. Cypherpunk ideas and successes led to the Tor project and Bitcoin, the first cryptocurrency (BTC). Nick Szabo and Adam Back are Cypherpunks. CZ, → “Changpeng Zhao“ Daedalus Wallet, Daedalus Wallet is a multi-platform, open-source, hierarchical-deterministic (HD) wallet that generates unlimited keys from a single seed. Encrypted private keys and passwords defend against malware. Input-Output Hong Kong introduced the multi-platform Daedalus wallet. It secures ADA coin storage and transfer between addresses. There are no geographical limits on users. When a Daedalus wallet is established, it generates a 12-word seed phrase to protect the funds. When money leaves the wallet, a password must be entered. HD Wallets produce all addresses from a single master seed. When a new counter value is added to the seed, a limitless number of new addresses are automatically formed. DAG, → “Directed Acyclic Graph“ DAICO, → “Decentralized Autonomous Initial Coin Offerings“ DAO, → “Decentralized Autonomous Organization“ DAO Summoning, DAO summoning creates a DAO. The word usually refers to starting a new
56
Death Cross to fluctuate frequently throughout the day due to the impacts of supply and demand. Day traders are market players that actively seek to benefit from these fluctuations as they attempt to forecast the short-term price movements of the assets, they trade in order to make profitable buy and sell transactions. Due to the vast number of variables impacting intraday price swings, some of which are difficult or impossible to measure, this is a high-risk, high-reward activity. Day traders use a variety of tools and strategies to perform the most profitable deals possible. Due to its notoriously high volatility, the cryptocurrency market offers day traders a highly dangerous but potentially rewarding trading environment. When asset values often fluctuate by 20 % or more in a single day, both gains and losses may be substantial. DdoS, → “Distributed Denial of Service“ Dead Cat Bounce, A dead cat bounce is a technical analysis price chart pattern. It happens in assets that are in a long-term downtrend and indicates a temporary comeback, followed by a retracement to the previous low and further decline. The origin of the word is the proverb even a dead cat would bounce if thrown from a certain height. Many inexperienced traders fall victim to dead cat bounces because they assume the assets they purchase are on the verge of a rebound. Multiple indicators may indicate the source of a dead cat bounce, such as when bears begin closing their short bets or when bulls initiate fresh long positions. It is crucial for analysts to continue observing the market if an asset unexpectedly rallies in an upward direction after a prolonged fall. Dead Coin, Dead coins are digital tokens that have failed or been shown to be fraudulent, and are thus no longer functional. There are dozens of inactive cryptocurrency projects or ICOs for a variety of reasons, including internal corruption among developers, significant depreciation, limited liquidity, and desertion. Even though the majority of coins that are branded dead coins die extinct, a few might recover value if sufficient demand is generated. Death Cross, When a slower moving average crosses a faster moving average in an upward direction, a death cross is generated. Typically, a death cross is generated when the price goes below the 50-day moving average. There is no conclusive evidence that the bull market has finished when a death cross appears. Before
Data Privacy, Data privacy covers the management of sensitive data, including notice, consent, and legal responsibilities. Data handling covers backup and file restoration, data security, and data privacy. Data privacy and protection mean an individual or party is the lone actor in managing their personal information and must comply with all privacy regulations. The contemporary technology environment relies significantly on data, which big corporations consider as valuable assets. Amazon, Google, and Facebook profit on data economics. Decentralized technologies lack data privacy. Everyone can see all network users’ transaction details. If a user’s wallet address is not connected to his real-world identity, his privacy is protected. Privacy coins, coin mixers, and private wallets like Blank may protect cryptocurrency transactions. Data Scraping, Data scraping is a software-based technique for grabbing data from websites and storing it in local databases or other applications. It is often used to acquire content, price, or contact information from Internet sources. Scraping plays a significant part in market research as it is used to price, monitor, evaluate, and gather product/service data. The web scraper can instantly discover a competitor’s new price as soon as it appears online, enabling the company to retain its position. Web scraping is mostly used in e-commerce and sales to monitor pricing and create leads, but an increasing number of investors are using this technique in online financial transactions. It may also be utilized to perform a comprehensive market analysis and collect historical crypto market data in the crypto sector. Date of Launch, The date of launch is one component of any ICO campaign: it is the time at which the public sale of the asset starts. It is often preceded by many months of extensive planning and, sometimes, one or more private sale rounds. Prior to ICO, the development team must build the fundamental technology, guarantee appropriate legal compliance, establish a distribution strategy, produce and publish all applicable documentation, and more. Therefore, the launch date is often announced far in advance to give the developers time to incorporate community comments and to allow for a complete marketing campaign. Day Traders/Day Trading, In stock, cryptocurrency, and other markets, asset values tend .
57
Decentralization dent computer-nodes that use techniques like proof-of-work (PoW) to process and record all transactions. By not depending on a single source of authority, decentralized organizations are more resilient than centralized. But this reduces efficiency. In 2020, Bitcoin’s network utilized about 70 terawatt-hours of power, equivalent to Chile. Decentralized API (dAPI), Decentralized application programming interfaces (dAPIs) are API services that are intrinsically interoperable with blockchain technology. This is an API3 protocol innovation. API3 is an application programming interface (API) service that extends the Web API service to the blockchain by addressing regular APIs’ smart contract compliance concerns. Decentralized Applications (Dapps), dApps are computer programs whose functionality is maintained by a distributed network of computer-nodes, as opposed to a single server. Ethereum was the first blockchain platform to allow smart contracts, hence making possible the notion of a decentralized application. dApps can offer the same level of service as traditional applications due to the way they are implemented, while also enjoying the full benefits of decentralization, such as near-constant uptime and resistance to censorship and corruption. The Augur (REP) prediction market platform, the Golem (GNT) market for idle computer power, and the Basic Attention Token (BAT) blockchain-based digital advertising platform are all examples of successful dApps. Neo (NEO) and NEM (XEM) are two more examples of popular dApp platforms besides Ethereum. Decentralized Autonomous Initial Coin Offerings (DAICO), Vitalik Buterin proposed it in 2018 to merge DAOs with ICOs to boost investors’ confidence in the latter and give them greater power over money distribution. ICOs are a cryptocurrency-native way to raise funding for developing and marketing new cryptoassets. Developers seeking financing sell part of their atoshiets to the public during an ICO. ICO teams cannot always complete on time, leading in vaporware. Some ICOs are frauds that were never meant to flourish. Buterin’s DAICO idea locks all ICO profits into a DAO smart contract and puts governance in the hands of investors. The investors vote on a per-second rate called the tap variable to unlock the cash following the fundraising campaign. If
making a final choice to purchase or sell an asset/stock/cryptocurrency, financial professionals suggest considering a range of technical indications. Among them are the accumulation/distribution indicator (OBV), the relative strength index (RSI), and the moving average convergence divergence (MACD). Decentralization, Decentralization in blockchain is the transfer of control and decision-making authority from a centralized entity (person, business, or group) to a distributed network. Decentralized networks aim to lower the degree of confidence that users must have in one another and to impede their capacity to assert authority or control over one another in a manner that degrades the network’s performance. Decentralization Maximalism, Maximalism emphasizes a more is more attitude to life to display one’s supremacy, in contrast to minimalism, which encourages simplicity and a less is more approach. In the realms of DeFi, blockchain, and cryptocurrencies, maximalism sometimes has negative connotations, since it takes a similar attitude to an even more extreme degree. Maximalists tend to feel that their philosophy, structure, and technology are so great that others are inferior and unnecessary to the point where regulation is unnecessary. In addition, there is sometimes an overemphasis on the advantages of decentralization, such as freedom, democracy, absence of censorship, or no corruption of governing organizations. Decentralization Ratio (DR), Decentralization Ratio (DR) is the ratio of decentralized collateral value to total stablecoin supply. It is a function that gauges an asset’s decentralized value and helps analyze asset risk. Collateral with high off-chain risk (e. g., fiatcoins, stocks, gold, oil) is considered 0 % decentralized. Offchain threats include government seizing assets or forcing KYC. SEC limiting USDC transfers to non-KYC firms is one example. It also contains base currency concerns, such as USDC inflation. Decentralized, Decentralized organizations operate without a single authority center. Instead, they are formed of several decision-makers with similar power over the rest of the system and depend on consensus methods to develop a shared plan of action. Decentralized networks like Bitcoin (BTC) and Ethereum (ETH) are maintained by networks of indepen-
58
Decentralized Identifier (DID) gives decentralized databases 100 % dispersed data access. Each file is duplicated over several storage nodes globally, reducing storage costs and maintaining data availability even if some nodes are offline. The underlying technology adapts the placement and number of nodes to increase speed. Decentralized Exchange(s) (DEXs), CEXs link buyers and sellers of crypto like stock markets. Every transaction on a CEX involves a third party with its own objectives and interests. This challenges user anonymity, one of the pillars of cryptocurrency. Decentralized exchanges (DEX) allow anonymity and non-custodial transactions. The traded asset never travels via an intermediary. Many consider DEXs as crucial to crypto’s future. Regulators have suggested that DEXs should not be subject to the same regulation as CEX. Decentralized Finance (DeFi), The decentralized finance (DeFi) movement believes the financial system should be decentralized and not controlled by monopolistic third-party suppliers. DeFis employ smart contract technologies to reduce or eliminate gatekeepers. Stablecoins, decentralized exchanges, and P2P lending are DeFi applications. DeFi startups are seen as the future of financial services by many analysts. DeFi should not be confused with embedded finance (also called invisible finance), which attempts to expand access to banking and payments technologies. Decentralized Governance, Decentralized governance involves voting on platform technology, strategy, updates, and legislation. On-chain and off-chain governance are typical blockchain options. On-chain governance uses blockchain-based solutions, which use automated cryptographic algorithms in network creation and consensus. Stakeholders vote using local currency to directly update the blockchain. Off-chain governance refers to decision-making outside the blockchain, through online forums or in person. Off-chain governance includes discussion, ideas, and upgrades. Traditional forms of governance view power in roles, whereas decentralized network governance sees it in relationships and new social contract. Decentralized Identifier (DID), Decentralized IDs are cryptographically provable universally unique identifiers (UUID) without a centralized registration authority. They identify people, ab-
the development team cannot complete, donors may vote to keep any remaining funds. DAICO is a new and untested idea that might make ICO governance more democratic and safeguard investors from fraud. Decentralized Autonomous Organization (DAO), The DAO is the world’s first autonomous, decentralized organization. It started in April 2016 after a USD 150 million first token crowdsale. The primary objective of the DAO’s designers was to remove the possibility of human mistake in fund administration. The DAO did not possess the conventional management structure of a venture capital firm. The organization’s programming was entirely opensource, meaning that anybody may add to its functionality. Additionally, being a decentralized entity, the DAO had no ties to any country or state. This resulted in various regulatory obstacles and questions, as well as countless precedents. Even though the DAO as an organization no longer exists owing to one of the largest hacks in the history of cryptocurrency, DAOs are becoming more popular. As a result of the lessons learnt from the DAO hacking debacle, the technology and organization underpinning cryptocurrencies have improved dramatically. Decentralized Currency, Decentralized currency is a way to transfer wealth or ownership without a bank. Traditional money is centrally managed. Third-party ownership has caused systemic concerns since currency value depends on centralized authority’s willingness to fulfill commitment. Central banks may freely modify the value to satisfy specific financing commitments, which is harmful to citizens who lose control over their own resources. Decentralized currencies, or peer-to-peer currencies, are mostly utilized in virtual marketplaces. They employ encrypted code that is easy to verify but hard to copy. Without a central authority, they are valued by demand, allow for easier and cheaper international transfers, and are typically resistant to inflation or deflation. Decentralized currencies are altering how we transfer value and measure wealth. Decentralized Database, Centralized storage systems are cost-effective yet hackable. Developers must choose between expensive costs and insecure data. Decentralized databases allow users to preserve their intellectual property in a censorship-resistant, safe, and always-available fashion. Blockchain technology
59
Decentralized Marketplace millions of individuals internationally and give them more financial autonomy. Decentralized Social Media, Decentralized social media is enabled by distributed ledger technology (DLT) like blockchain or DAG. These platforms record activity permanently on a decentralized system that no central authority can control or monitor, unlike Facebook, Twitter, etc. Conventional social sites manage users’ postings and what they view to maximize profit. They utilize attention-grabbing advertising to keep customers amused rather than informed. Decentralized social media networks allow users to connect without restriction since developers simply provide guidelines and leave the rest to a dispersed community of users. Decentralized Stablecoin, Stablecoins are blockchain-based digital assets meant to maintain a fixed price, usually $1. Centralized stablecoins are generally fiat-collateralized off-chain and tied to banks. Decentralized stablecoins are transparent, non-custodial, and not third-party-controlled. All collateral-backing is public since the funds are on a blockchain. Manually minting or destroying collateralized stablecoins may raise or reduce supply. Smart contracts or AMOs govern the supply of algorithmic stablecoins. Decryption, Decryption is the process of restoring encrypted information to its original state. In general, decryption is the opposite of encryption. It decodes the encrypted data so that only an authorized user may decrypt it using a secret key or password. The most prevalent kind of cryptography in the cryptocurrency industry is public key or asymmetric key encryption. In this approach, information is encrypted and decrypted using pairs of keys. Elliptical Curve Digital Signature Algorithm is used to perform encryption and decryption on the Bitcoin blockchain (ECDSA). Deep Learning, This is the subfield of ML, which is responsible for the media hype and most of the breakthroughs in ANI, that has been seen in recent years. Deep Learning (DL) concerns itself with specific sophisticated algorithms called Neural Networks (NNs). The deep part stems from the fact that these NNs usually contain many layers. Due to this distinction, ML algorithms now usually refer to more simple, traditional algorithms (statistical learning), such as Support Vector Machines (SVMs). DL algorithms tend to require much
stract things, companies, data models, and IoT devices. Users may save government-issued credentials, educational and tax certificates, and other personally identifiable information in a secure digital wallet. Decentralized Identifier (DID) enables users to share their identify with other services. Users may offer just needed information to any organization, unlike the centralized structure (website, app, etc.). W3C’s core DID draft specifies that a DID is a text string. DID Documents contain an authentication public key. Using the document’s private key, the owner may establish ownership. Decentralized Marketplace, A blockchain-based decentralized marketplace eliminates intermediaries for traders and investors. Decentralized markets decrease system flaws that might lead to limited access to resources, outages, bottlenecks, or a lack of incentive mechanisms to avoid corruption or inefficiency. Investors may utilize decentralized markets to exchange NFTs, properties, patented technologies, or intellectual property. Centralized markets have higher costs, lack transparency, and set regulations customers may not like. Decentralized Network, A decentralized network is a collection of protocols distributed among several nodes, or computer devices. Each machine in a distributed system has an up-to-date copy of the available data. Rather than relying on a centralized server managed by a firm, these systems use servers that are operated independently. Such networks provide several benefits, including increased system stability, scalability, and anonymity. There is no actual single point of failure since user workstations do not depend on a central server to conduct all operations. Decentralized social networks are also gaining popularity. Decentralized Payment Network, Decentralized payment networks allow users, consumers, and suppliers to transact money without relying on a third party. These networks are developed utilizing blockchains, which provide decentralization, scalability, and security. A bank or remittance firm may be a centralized payment network. Governments may change central bankers’ monetary policies anytime. Blockchain-based distributed ledgers overcome centralization concerns. Decentralized payment networks are cheaper, more transparent, dependable, and less hackable than centralized networks. They can deliver financial services to
60
Denial-of-Service (DoS) Attack due to poor economic output, technological breakthroughs, or decreasing demand. Deflation also refers to Bitcoin’s maximum supply. Once 21 million Bitcoins are mined, no further coins or block rewards will be generated. Cryptocurrencies may be the first deflationary currency system in economic history. Some economists think a deflationary currency system would lead to hoarding and liquidity difficulties. Bitcoin’s limitless divisibility may assist with deflation, say proponents. Delegated Proof-of-Stake (dPoS), Proof-ofStake (PoS) systems have been created in recent years in response to the perceived issues and limits of Proof-of-Work (PoW). In a Delegated Proof-of-Stake (DPoS) system, users stake coins. Instead of validating themselves, stakeholders outsource the process to delegates, who must then establish agreement. DPoS delegates are chosen based on their reputation and perceived trustworthiness: The system incentivizes good conduct among delegates since the community may vote them out at any moment. DPoS blockchains have a greater per-second transaction pace than PoW and PoS. DPoS is young and not regarded safe enough for money-transaction blockchains yet. Delist/Delisting, When a project no longer fits the listing requirements of an exchange, it may be delisted. There might be several causes for delisting such as absence of regular trading activity or protocol development, unreliable network or smart contract, absence of business-to-customer engagement, or evidence of fraudulent or harmful conduct. A delisted asset is no longer available for purchase or sale on an exchange. Typically, delisting is permanent as a trading pair are withdrawn from the cryptocurrency exchange when it is delisted. However, after resolving the problem and meeting the listing conditions, a company may request that its shares be re-listed. Denial-of-Service (DoS) Attack, Denial-ofservice (DoS) attacks block people from accessing a computer or network. DoS attacks are the main tools hackers use in order to disturb the operation of computer (networks). Volumetric assaults fill a network’s bandwidth with echo requests. Syn flooding attacks are similar, but the attacker does not close the server connection. Fragmentation attacks hinder a network’s reassembling capabilities. Application layer attacks overload a target with requests to
more data in comparison to these traditional algorithms, making them computationally expensive. Deep Web, Deep web has several names such as black web or invisible web describing areas of the internet inaccessible by generic browsers. Instead, interested users must download a browser like Tor. Deep web gained popular attention during the 2015 Silk Road trial, when creator Ross Ulbricht was convicted. Silk Road was a deep web bazaar that introduced many people to Bitcoin. Despite the FBI’s raid on Silk Road, the deep web remains popular for individuals seeking what they cannot get on the ordinary internet. The deep web is often connected with drug sales and other black-market items. DeFi, → “Decentralized Finance“ DeFi Aggregator, A DeFi aggregator consolidates cryptocurrency trades from many DeFi platforms, saving customers time and enhancing efficiency. While having a broad number of protocols helps diversify investments and receive the greatest crypto lending yields, efficiency and convenience are limited since financial information is scattered over numerous protocols. DeFi aggregators flourish there. Gathering the best prices from DEXs, loan services, and liquidity pools so consumers may optimize trades. Without an aggregator, customers must visit each portal individually to compare costs. They assist not as crypto-savvy enthusiasts explore DeFi via good UI/UX and bring together the best of both worlds of centralized organization strategies and decentralized finance protocols. DeFi Degens, DeFi’s chaotic, uncontrolled crypto initiatives sometimes teeter between humor and fraud. The subculture of DeFi degens dwell in these projects. Degens discuss information on new DeFi initiatives in private Telegram and Discord groups. Some degens se decentralized finance as an opportunity to develop projects that amount to crossovers between monetary projects and massive multiplayer online games. DeFi degens are associated with the pump and dump movement, in which trash currencies are talked up via secret forums and channels before being abandoned or driven into collapse. Deflation, Deflation generally occurs when monetary supply contracts. Prices might fall
61
Depth Chart Design Flaw Attack, Design flaw attacks aim to steal crypto money. Attackers create defective software (a smart contract, a marketplace, a DEX) so that consumers utilize these permissionless, decentralized applications without knowing about the flaws. Because markets offer ambiguous explanations, users may be tricked into betting on a defective contract. A design flaw attack generates fake options for users to lock their cash in a smart contract. A plausible but inaccurate contract condition or process might lead to an unlawful settlement and capital release. Desktop Wallet, Desktop wallets are non-custodial software wallets with no central institution or third party holding the wallet funds. With private keys only end-users may access the wallet. Desktop wallets are commonly linked to trading platforms, allowing users to monitor their crypto balance while keeping their private keys. Some desktop wallets, like AtomicDEX, employ atomic swaps to allow peer-to-peer cryptocurrency trading. Desktop wallets are normally free of charge and many employ open-source programming. Most desktop wallets have mobile counterparts allowing users to shift from a desktop to a mobile device. AtomicDEX, Exodus, and Guarda are popular desktop wallets. Deterministic Wallet, Deterministic wallets use an algorithm and seed. All deterministic wallet keys and addresses are generated from the seed. If the users know the seed, a new wallet may be constructed and all the addresses and keys restored, even if the previous wallet is lost or damaged. Deterministic wallets have further benefits. Master public keys may be produced from a wallet’s master private key and used to create all addresses, but not private keys. A third-party user with a wallet’s public key may examine its balance but not utilize it. Deterministic wallets are layered. Every private key created by the seed may be used as a master private key to create subsequent keys and a deterministic wallet. Today, most cryptocurrency wallets are deterministic. Dex Aggregator, There are two primary kinds of cryptocurrency exchanges: centralized and decentralized. It is not always easy to locate the best price for the trade pair on decentralized exchanges. DEX aggregators collect information from a variety of decentralized exchanges and allow split transactions in order to provide
find unnoticed code faults. Phlashing DoS attacks affect the target network by sending bogus update requests and injecting malware. Depth Chart, Based on limit orders, a depth chart is a graph that displays requests to purchase (bids) and requests to sell (asks) on a chart. The graph depicts the moment at which a transaction is most likely to be accepted by the market. Since people may place a limit order on their buy or sell transaction, the depth chart displays the point at which the market is most likely to accept a transaction promptly. It also indicates if there are major buy or sell walls in play. Derivative, Derivatives are often used for risk hedging. If an investor wants to acquire a certain asset, they may sign a derivatives contract to hedge against asset value volatility. Speculation is also common in derivatives markets. Traders may speculate on an asset’s future worth without owning it. Derivatives are becoming more popular in crypto. Crypto derivatives may be utilized to create money, much as currency derivatives. Bitcoin futures on the Chicago Board Options Exchange were a milestone because they allowed institutional investors to hedge against price volatility. Derivative NFT, NFT derivatives are NFT ventures derived from current projects’ creative assets and intellectual property. In addition to having a comparable aesthetic look to the original NFTs, derivative art NFTs sometimes have titles that honor the original collections. Derivatives Market, On a derivatives market there exist two types of derivatives: Options provide the right, but not the obligation, to purchase or sell an underlying asset at an agreed price. Futures imply that the transaction must occur on the expiration date. Forwards and swaps are two additional derivatives, but they are unregulated and hence not traded on regulated exchanges. Numerous prominent cryptocurrency exchanges are also derivatives markets. The expansion of derivatives is crucial for the public acceptance of cryptocurrencies. Derivatives markets in crypto have been subject to periodic governmental crackdowns. The Financial Services Authority of the UK said in 2020 that it would prohibit the selling of crypto futures to ordinary investors, citing the volatility of the underlying assets and the potential of criminality in crypto.
62
Digital Asset Custodian and cryptocurrency exchanges are some of the most well-known examples. One may describe a digital object as one that records or stores information as a sequence of ones and zeros. Cryptocurrencies are digital-only currencies implying that there are no tangible coins in the real world. Tey only exist as 1s and 0s and exist only in the digital ledger known as the blockchain. Thus, only 1s and 0s are moved from one crypto address or wallet to another during the transfer of any coin. Digital Art, Digital art may be defined as anything created or seen using digital technology. Digital artwork has existed since the 1960s. Artists started combining new types of media, such as digital installations, video art, graphic images, digital photography, etc., with the introduction of computers and multimedia technology. Recently the concept of NFTs has raised digital art even higher by giving more explicit intellectual property rights via cryptographic keys. NFTs have exponentially increased the value and desirability of digital art. Users of cryptocurrencies have created digital art markets to auction off works of art, media, and other digital artifacts. Digital Asset, Digital assets are digital representations of value in crypto and fintech. Their value is tokenized, and the resultant tokens represent complete or partial ownership of it on a distributed ledger. A digital asset may be a cryptocurrency or crypto token, or it can represent a real-world object kept on the blockchain as a token. This may be a commodity, file, land registration record, accounting ledger, 3D printing raw file, etc. Digital assets may be used as a means of trade to buy products or services, or as the digital representation of a real-world object with its unique ID. As blockchain and cryptocurrency assets develop, digital asset use cases will proliferate, creating new wealth generating possibilities. Digital Asset Custodian, A custodian manages an investor’s or client’s valuable assets. The Digital asset custodians are liable for assets like BTC or ETH. Digital assets need sophisticated security and internal control mechanisms to guarantee safe storage for customers and are riskier than conventional ones. Losing a private key restricts access to assets, for example. Thus, institutions may select a third-party custodian to manage and keep digital assets.
the most competitive pricing. Therefore, DEX aggregators let investors make more educated judgments about their transactions and coin exchanges. DEX aggregators have gained popularity as interest in decentralized finance (DeFi) has increased since 2019. DEXs, → “Decentralized Exchange(s)“ Dharma Protocol, Dharma Protocol is a permissionless lending platform that eliminates intermediaries. The protocol supports order-book bonds and margin lending products without a centralized mediator. It is a decentralized blockchain-based platform that tokenizes debt for digital lending. By putting all its functions into a single API, it simplifies credit-issuing for consumers and businesses. Built for credit applications, it may be used for any agreement requiring robustness and flexibility. Its modular modules allow first-time developers and Fortune 500 companies to issue tokenized debt in minutes. Diamond hands, Diamond hands is a typical self-description used by cryptocurrency holders. It is a technique of conveying that a person will continue to hold on to an asset even if its value declines by 20 % or more. Those with diamond hands may even recommend Buy The (F*******) Dip to their followers, relatives, and anybody else willing to listen. Members of this group might post variations of the I’m not leaving! GIF from The Wolf of Wall Street to emphasize their unwavering resolve. On social media networks such as Reddit and Twitter, the diamond hands emoji is often used. DID, → “Decentralized Identifier“ Difficulty, Due to improvements in the used hardware, the rate at which cryptographic puzzles are solved will decrease with time. To compensate for advances in hardware performance, the difficulty of cryptographic riddles is increased. This difficulty is regularly updated to achieve a certain number of blocks each hour. The difficulty rise on the Bitcoin blockchain is astounding. When Satoshi Nakamoto mined the genesis block, he likely used a standard desktop computer. At this time, the degree of difficulty was rated as 1. As of this writing, the Bitcoin difficulty is about 34 trillion. Digital (Technologies), Digital technologies include electronic instruments, systems, devices, and resources that can create, store, or even process data. Social media, online gaming,
63
Digital Asset Ecosystem action speeds, cheaper prices, increased transparency, and decentralization. DigiCash was a late 1980s digital currency prototype. Bitcoin was the first digital money to tackle double spending by employing blockchain technology to establish immutable transaction records. Digital currencies are a major financial innovation. Today, central banks are inspired by blockchain technology and establish their own digital currency in form of CBDCs. This would let the central bank regulate monetary supply as in a traditional economy. Digital Dollar, A digital dollar is a sort of money that is only accessible in electronic form, and many nations’ financial systems depend on the electronic form of US dollars kept in different electronic or digital bank accounts. Digital dollars, like all other digital currencies, are controlled by the Federal Reserve and backed by the government, so they operate and have the same value as real currency. The digital dollar is an intangible asset with an acquisition cost valuation. The transmission of digital currency will function similarly to popular payment programs such as Google Pay, Venmo, and PayPal. Numerous nations are adopting digital currencies, like the Bahamas’ Sand Dollar initiative, which is now in production, and China’s digital yuan, a 2014 pilot experiment. Digital Identity, Multiple sorts of digital identities are already in general usage for financial access, business registration, and, of course, monitoring. Traditional identification systems may be unavailable (sometimes by design), unsecure and prone to assault, especially vulnerable to fraud, and highly fragmented. Many of these issues may be solved by using blockchain technology. Extensive trials are presently being undertaken on the use of blockchain for digital identification applications, and some of them are already operational on a large scale. Blockchain technology is also far more secure than the digital identification systems that are widely used today. Due to the irreversible nature of blockchain-based recordkeeping, blockchain-based identification solutions provide ultimate trust in the veracity of an identity, even though it is now incredibly simple to fake an online identity. Digital Millennium Copyright Act (DCMA), DMCA is Digital Millennium Copyright Act. It is a part of the US Copyright Law and relates to a defined process in removing
Digital asset custodians need a license from a regulator to assure safety and security. Digital Asset Ecosystem, A digital asset ecosystem includes anything in the crypto space. It comprises cryptocurrency tokens, NFTs, stablecoins, products, services, and futures. The digital asset ecosystem is growing into new markets. Art (in the form of NFTs), banking, insurance, real estate, gaming, healthcare, and gambling are examples. The digital asset ecosystem is a basket of classes safeguarded by a blockchain. Traditional assets will become digitally accessible and available to investors, decreasing expenses. In summary, digital asset ecosystem is an umbrella term with multiple subcategories. Digital Barter Economy, The direct exchange of commodities and services constitutes a barter economy. Using blockchain technology, digital barter brings the basics of a conventional physical barter economy into the 21st century, giving answers to the physical and standard unit barriers that prevent large-scale bartering. The ability of blockchains to digitize tangible products and services with tokens eliminates the physical proximity issue. In addition to digitizing actual products, blockchains also strengthen digital barter by providing mechanisms to exchange tokens. Another novelty is that digital barter economies may contain non-physical things, such as a patent or intellectual property, or physical objects that are too big to be utilized as a form of payment in their physical form. Digital Commodity, Digital commodities are diverse. Digital commodity increasingly means digital currency with their regulation targeting cryptocurrency. The Digital Commodity Exchange Act 2020 regulates trading platforms in the US. Other rules and regulations covering cryptocurrencies and related activities have developed swiftly in recent years, from New York’s BitLicense to the UK’s restriction on crypto derivatives sales to individual investors. Because cryptocurrencies are commodities, they may be used as the foundation for derivatives, a popular financial product. Digital commodities trading may also mean selling oil and gas online by digitizing the commodities trade chain. Digital Currency, Digital currency might (theoretically) be used for all purposes from fiat money with some advantages like f aster trans-
64
Distributed Denial of Service (DdoS) Attack secular downtrends, it is either unprofitable or more difficult. But dip buying may reduce the average cost of positions. Directed Acyclic Graph (DAG), The components of directed acyclic graphs (DAG) are vertices and edges. Unlike a blockchain, no blocks are present. Instead, transactions are stored as vertices, which are then stacked atop one another. Every new transaction in a DAG must reference previous transactions in order to be allowed into the network. DAGs offer a variety of purported benefits. As block formation is not a limiting factor, transaction speeds are very fast. Because there are no miners, there are no transaction fees, and the absence of mining offers enormous environmental advantages. The application of DAGs in cryptocurrency contexts is still in its infancy. Discord , Discord is a communication tool that allows users to exchange text messages, make audio and video chats, and join groups. On Discord, anybody may build a community, known as a server, and invite others to join and communicate with them. Discord is no longer a communication network exclusive to gamers. Recent years have seen Discord become a hub for crypto aficionados, with several organizations forming communities on its servers. By the end of 2022, there were over 150 million active Discord members. It is possible to access Discord straight from the website and utilize it in a web browser. Distributed Consensus, Distributed consensus is required for the decentralized operation of a network or machine. Agreement is simpler to reach between two parties, but as the number of participants (or nodes in a network) rises, it gets more challenging to reach consensus. Distributed consensus methods are used by blockchain projects. Most distributed consensus techniques have similar fundamental features: they are stake-based, entail a compensation for validation, and operate on a transparent basis. Proof-of-Work is the cornerstone for blockchain-based consensus, however other blockchain projects are increasingly using alternative consensus techniques. Distributed Denial of Service (DdoS) Attack, Distributed Denial of Service (DdoS) Attack are prevalent. They employ networks (botnets) of malware-infected devices (bots) to gain control. The attacker tells every bot to flood the target with requests to overload the network.
content from the internet. The DMCA is most connected to a process known as a DMCA Takedown. Digital Rights Management, Digital rights management (DRM) is a way to protect copyrights for digital media. This approach includes the use of technologies that limit the copying and use of copyrighted works and proprietary software. Digital Signature, Digital signatures allow for the authentication of digital messages and documents. They use public key cryptography, which encrypts and decrypts data using pairs of public and private keys. To digitally sign a message, the sender uses software to generate a message hash, which is then encrypted using their private key. If this hash corresponds with the decrypted hash, the message is legitimate. Digital signatures are distinct from electronic signatures, even though the former phrase is often used to refer to the latter technology. A digital mark meant to represent a signature is referred to as an electronic signature. Digital Signature Algorithm (DSA), National Institute of Standards and Technology (NIST) introduced the Digital Signature Algorithm (DSA) in the 1990s based on the difficulties of calculating discrete logarithms. DSA may be used to produce digital signatures of messages. It is often used with other security methods, such as PGP or SSL/TLS. DSA is quicker than RSA and consumes less memory space than other algorithms since it generates signatures using just 160-bit hash values. Additionally, the signature protects the user against forgery. It employs asymmetric key cryptography, which eliminates the need for supplementary key encryption. Dildo, Contrary to the everyday use of the word, dildos simply depict price fluctuations on cryptocurrency-related graphs. In many cryptographic graphs, red or green candles are dispersed throughout each axis. These candles illustrate the price range of an item or the exchange rate over a specific time period. Dip, In the realm of cryptocurrencies, a dip refers to the act of purchasing an asset after its price has decreased. Buy the dip is a term used in relation to finance. This refers to purchasing an asset or security following recurrent shortterm price declines. During secular uptrends, it is lucrative to purchase the dip; but, during
65
Distributed Ledger sets. This is a technique to invest in more than one cryptocurrency since the future is unclear, particularly in the turbulent world of cryptocurrencies DLT, → “Distributed Ledger Technology“ DMCA, → “Digital Millennium Copyright Act“ DMCA Takedown, The DMCA notice and takedown process is a tool for copyright holders to get user-uploaded material that infringes their copyrights removed from websites. The process entails the copyright owner sending a takedown notice to a service provider requesting the provider to remove material that is infringing their copyright(s). A service provider can be a website operator (e. g., YouTube), search engine (e. g., Google), a web host (e. g., GoDaddy). Do Your Own Research, Do Your Own Research (DYOR) is considered one of the most crucial parts of becoming a cryptocurrency trader. Between 2016 and 2018, a tidal wave of initial coin offering (ICO) initiatives swamped the cryptocurrency market, leading to the term’s first use. Some cryptocurrency influencers also use it as a disclaimer when they publish about projects or analyses on social media networks. There are a variety of research resources that provide vital insights and knowledge about certain currencies and tokens. Information includes prices, rankings of coins and tokens, market intelligence, market capitalization, trading volumes, circulating supply and total supply numbers, a list of exchanges where the asset is traded, the fully diluted value (FDV), etc. Documentation, Documentation is one of the four necessary components of token economies. Documentation enables the recording of all the information of an asset (which may be anything) and the securing of its proof of validity on the blockchain. The timestamp, author’s signature, and fingerprint (hash) serve as evidence of who recorded what and when. Documents stored on a blockchain are immutable, meaning they cannot be modified. Outside of a blockchain setting, verifying the unalterable origin time of a signed contract, statement, or document is almost unachievable. Images and signatures may be simply edited using Photoshop. By establishing the data’s integrity and documenting the timestamp on the blockchain, blockchain documentation eliminates these
At this moment, valid traffic is blocked, thus the term. DdoS assaults like to target crypto exchanges. For exchanges, DdoS attacks mean users cannot trade until they are back up. Successful DdoS assaults on crypto exchanges and similar sites may leave users worrying about the industry’s stability. Distributed Ledger, Distributed ledgers are ledgers in which data is kept in numerous places throughout a network of decentralized nodes, allowing multiple parties to view and validate each entry. A distributed ledger does not need the use of a cryptocurrency and may be private and permission-based. In the context of cryptocurrencies, this refers to the blockchain being stored on numerous network nodes that are all reviewed concurrently. Distributed Ledger Technology (DLT), A decentralized network replicates and synchronizes distributed ledgers across its members. This technology contrasts with the centralized systems used by most enterprises and financial institutions. In a corporate context, ledgers are often complicated, cumbersome, costly, and highly susceptible to manipulation. Distributed ledger technology (DLT) permits very high degrees of security. As a result of the use of cryptographic hashes and digital signature technologies, participants may be certain that all transactions recorded in the ledger are authentic and come from legitimate senders as opposed to malicious parties. DLT has many more potential applications in both public and private contexts. Distributed Network, In a distributed network, data, processing processes, and applications are dispersed among many (typically numerous) devices that interact and rely on one another. Distributed networking is very effective for eliminating or minimizing bottlenecks in computer processes and a highly efficient way of sharing resources. There are several kinds of distributed networks based on various computer techniques. Distributed decentralized networking is the foundation of blockchain technology. Diversification, Diversification mixes a portfolio’s assets to manage risk. Portfolio holdings may be diversified between asset classes, within classes, and geographically via international and local markets. Rather of focusing money in a single firm, cryptocurrency, industry, or asset class, investors might diversify their as-
66
Drift not wait for the confirmation of the transaction. Although the blockchain cannot completely prevent double-spending, it can serve as a line of defense against double-spending attacks via many decentralized validator nodes. Double Spending, Due to the relative simplicity with which data may be replicated and the rising availability of the computational power necessary to do so, digital currencies are susceptible to double spending. Most of the time, criminals transmit many packets pertaining to a transaction to the currency’s network, but then reverse those transactions to make it look as if they never happened. Bitcoin is currently regarded to have eliminated double spending. dPoS, → “Delegated Proof-of-Stake” dPoSec, → “Distributed Proof of Security“ dPoSec (Distributed Proof of Security), Distributed Proof of Security (dPoSec) is a novel consensus technique that ensures the underlying blockchain network continues to function even if roughly one-third of participating nodes are hacked. It overcomes the primary obstacles encountered by the current network of nodes and validators. The dPoSec method utilizes the Zero-Trust architecture to satisfy the Web2 and Web3 ecosystems’ dynamic cybersecurity needs. The dPoSec consensus architecture is capable of overcoming risks like selfish mining, feather forking, DoS assaults, bribery attacks, and transaction integrity protection. Since the baseline security will increase each time a new device (node/validator) enters the network, Web3 goods and services will be able to achieve greater scalability and decentralization. DR, → “Decentralization Ratio“ Drawdown, Drawdown is a measurement of an account’s peak-to-valley drop over a certain time period. It may be used to evaluate the robustness of a trading strategy or model throughout that time, or to predict the amount of equity capital necessary to prevent drawdowns below specified levels. The maximum drawdown (MDD) is generally used to evaluate the portfolio risk. A higher MDD suggests an increased risk, while a lower MDD indicates a decreased risk. It offers investors extra information on the amount of money they stand to lose on a certain investment. Drift, A variation of the naïve model, which allows forecasts to increase or decrease over time
doubts. Through the record’s cryptographic signature, documentation also helps to establish the record’s authorship. Dolphin, Cryptocurrency investors are sometimes categorized by their holdings. Minnows or fish are minor investors with low currency holdings or a small portfolio. Whales have big crypto holdings. Crypto dolphins are not the tiniest crypto players, but they do not have enough to be the largest. Crypto whales’ movements are tightly watched, unlike dolphins or minnows. Crypto whales have been seen to exchange hundreds of thousands if not millions of dollars in cryptocurrency for only a few dollars in fees. Dominance, → “Bitcoin Dominance“ Dorian Nakamoto, Some articles have identified Dorian Nakamoto as the face behind bitcoin being Satoshi Nakamoto. Dorian later denied all claims, stating that he had never heard of Bitcoin up until that point and that this was a misinterpretation. The genuine Satoshi’s P2P Foundation account at the time posted its first remark in five years, “I’m not Dorian Nakamoto.“ Dorian Nakamoto resided a few streets from Satoshi contender Hal Finney in Temple City, CA. DoS, → “Denial of Service“ DotSama, DotSama is a convenient combination of the terms Polkadot (DOT) and Kusama (KSM). DotSama presumably emerged on Twitter and refers to both growing ecosystems in the cryptocurrency world. Polkadot is a sharded level-0 metaprotocol that enables many blockchain networks to function together, whereas Kusama is the canary network for Polkadot. So, when a person wants to discuss both Polkadot and Kusama in the future they do not need to type out their individual names; just refer to DotSama, and Twitter will understand precisely what is meant. Double Spend Attack, In a typical bitcoin double-spend attack, the hacker replicates the original transaction and uses it in another transaction to make it seem original. It permits the hacker to retain both the stolen goods and the bitcoin (which should have been transferred to the victim). Reversing a transaction after obtaining the counterparty’s assets or services is yet another way to double-spend Bitcoin. A Finney attack is a kind of misleading double-spend attack in which the merchant does
67
Drizzle Dust Transaction, Dust in cryptocurrency refers to near-worthless assets spread throughout investors’ digital wallets. This unwieldy collection of particles with little or no value may appear harmless, yet it may impair financial networks. The value of dust in a dust transaction is usually smaller than the moving charge. Therefore, these fractions often collect in wallets and are seldom used. In a dusting attack, many individual dust transactions are utilized to trace wallet activity and breach the owner’s identity. Dust trades must not always be bad, a dust aid e. g., allows consumers to contribute wallet dust to charity. Dusting Attack, A dusting attack issues a huge number of small transactions into a multitude of private wallets to disclose the owners’ data. An attacker may utilize dust to trace wallet activities and learn the owners’ identities. Hundreds of thousands of dust transactions were conducted in Litecoin wallets throughout the summer of 2019. The attack’s source was discovered before any damage was done. Later, they said they wanted to promote their mining pool to Litecoin users. Despite the innocuous end, the episode highlighted how easily such assaults can be accomplished, since they may happen to any public blockchain. DYCO, → “Dynamic Coin Offering“ Dynamic Coin Offering, DAO Maker’s Dynamic Coin Offering (DYCO) uses utility tokens backed by USD for the first 16 months of its lifecycle to enhance project developer responsibility. The USD backing enables DYCO investors to get their tokens back if the business fails to provide a product. Refunded tokens are burned, reducing the token supply, and increasing each token’s value. The USD backing hedges against a token’s price declines and gives endless rising momentum. DYCO v2 targets the secondary market in addition to the main market. DYCO v2 focuses on a project’s early expansion without inconveniencing early leavers or undermining the secondary market’s trust. Orion Protocol used this concept initially. DYOR, → “Do Your Own Research“ Economic Utility, Economic utility refers to a person’s overall satisfaction from consuming a product or service. Modern economics identifies four categories of utility: form, time, location, and ownership. Form utility is how effectively a product or service meets consumers’
by the average change seen in historical data, the so-called drift. Drizzle, Drizzle is an additional essential component of the Truffle Suite that contains frontend development libraries. Its principal role is to facilitate the creation of user interfaces for decentralized applications. Drizzle is built on the Redux store, which simplifies the synchronization of contract data, transaction data, and more. Drizzle makes front-end development far more accessible and predictable. Drop , This is an event in which users earn free tokens for owning specific sorts of assets (see also Airdrop), or a typical method to communicate that a new digital collection of NFTs has been released or will soon be accessible. DSA, → “Digital Signature Algorithm“ Dual-Token Economy/Model (Two-Token Economy), The dual-token economy refers to crypto companies that provide two distinct token kinds. Creating tokens is mostly motivated by a desire to avoid compliance concerns with authorities. Typically, one of the two tokens is used as collateral to get funding for the project. On the network, the other token is utilized to complete specific jobs or actions. With two tokens, a crypto project can provide end-users with a superior incentive structure, features, upgrades, and functionalities. Axie Infinity, an NFT game project that provides two tokens, SLP and AXS, is a prime example. Other projects using the dual-economy method are e. g., VeChainThor, MakerDAO, Anchor, and Filmio. Dump, A dump is the rapid sale of a considerable quantity of cryptocurrency, often by a whale. In certain instances, these sales will cause the price of an asset to fall. Frequently, the word is used in conjunction with pumpand-dump operations, which are nearly always related with fraudulent conduct and an effort to manipulate the price of a cryptocurrency. A fully legal dump may also refer to the rapid sale of one’s own cryptocurrency assets for immediate profit. Dumping, When the market is startled by outside reasons like economic upheaval or a news item, dumping may occur. When Bitcoin approaches a halving, the market might be volatile, which has traditionally triggered dumping. When a cryptocurrency’s price encounters resistance, dumping is probable.
68
Elliott Waves it a consumer’s account. EFT transactions have several names across nations and payment systems. In the US, they may be called e-checks. In the UK, bank transfer and bank payment are used, in Canada, e-transfer, and in numerous European nations, giro transfer. Electrum Wallet, Electrum created in 2011 is a lightweight wallet working on Mac, Linux, and Windows and mobile devices. Electrum supports hardware wallets (TREZOR, Ledger Nano, KeepKey) and offline Bitcoin storage. Electrum’s basic interface generates conventional Bitcoin transactions and enables multisig services, hardware wallets, etc. Electrum is fast and simple without wasting resources. Many Bitcoin users trust Electrum’s reputation as it excels at security and user privacy, which are crucial for crypto wallets. ElGamal, ElGamal is an asymmetric key encryption technique for public-key cryptography based on the Diffie–Hellman key exchange. It was described in 1985 by Taher ElGamal. It is used by the free software GNU Privacy Guard, newer versions of PGP, and other cryptosystems and should not be confused with the Digital Signature Algorithm (DSA), which is a version of the ElGamal signature technique. The three components of ElGamal encryption are the key generator, the encryption method, and the decryption algorithm. ELI5, Even though the phrase explain like I’m five (ELI5) predates Satoshi’s white paper, it is now associated with cryptocurrencies and blockchain. The notion of ELI5 has been introduced so that those working in crypto may halt a conversation in order to have a certain feature of the technology described in the simplest words before continuing. The origin may be traced back to Albert Einstein who said if a person cannot explain it to a six-year-old, he/ she does not understand it him-/herself. The argument was that with a sufficient grasp of something, one should be able to explain it in words that a small kid can truly understand and that it is possible to communicate a challenging topic without using difficult language. ELI5 became famous by the TV sitcom The Office, whose characters often utilized a variation of the phrase. Elliott Waves, After detecting repeated fractal wave patterns in the 1930s, Ralph Nelson Elliott created the Elliott Wave Theory, an essential tool for many stock and cryptocurren-
demands. Time utility is when a corporation seeks to align product availability with consumer demand. Third, location utility means physically offering products or services to clients. Possession utility is how much a customer or owner uses or values a product. Economic utility comes from the consumer’s demands and requirements and the product’s functioning and not the pure quantity. As an example, t wo meals are not always better when hungry. One might be full from the first meal, the second may be just as tasty but less beneficial or even without a value. Edge Nodes, Edge nodes are instances of a cluster that link the user’s computer to the cluster’s computers. They let users to accomplish their tasks on the edge node as opposed to the master nodes, which are essential to the system’s functioning. Edge nodes offer network connectivity for the cluster, enabling end-users to interact with worker nodes as necessary without exposing the whole cluster to communication. As work is properly distributed across work nodes, the role of the edge node helps reduce data skew and performance issues. Edge Node operators are compensated with THETA tokens for their contributions to Theta’s global content-sharing ecosystem. EEA, → “Enterprise Ethereum Alliance“ Effective Proof-of-Stake, Harmony’s improvised Proof of Stake (PoS) leverages random state sharding to maintain decentralization to prevent major network stakeholders from centralizing power. The PoS consensus produces fresh blocks and avoids double-counting. Cryptocurrency holders may stake them to validate transactions and earn incentives. PoS is an alternative to proof-of-work (PoW), which requires miners to solve hard issues. In a PoS network, the complexity of creating a block grows with the validator’s stake. EFT, → “Electronic Fund Transfer“ EIP, → “Ethereum Improvement Proposal“ Electronic Fund Transfer, EFT is the transfer of money from one bank account to another using computer-based systems, without the participation of bank employees. The Electronic Fund Transfer Act of 1978 defines it as a money transfer started using an electronic terminal, telephone, computer (including online banking), or magnetic tape to request, instruct, or authorize a financial institution to debit or cred-
69
ELM verified block, or 7,200 a day. Recent halving occurrences have reduced the quantity of fresh Bitcoin entering the ecosystem. Bitcoin’s final BTC will be mined in 2140 since it has a 21-million-coin maximum supply and a release timetable. Some cryptocurrencies have no defined emission rate. Therefore, units may be generated on demand. Encryption, Encryption is a method for encrypting data so that only authorized parties may access it. Encryption transforms the plaintext data into what seems to be random data. It necessitates the employment of a cryptographic key, which is a collection of mathematical values. The most secure encryption approach will use keys that are so complicated that it is exceedingly improbable that a third party could decode or crack theatoshext. In the realm of cryptocurrency, the password of a private key is often encrypted. End User License Agreement (EULA), End User License Agreement (EULA) acting as a contract between the software developer or publisher and the end-user, an end user license agreement grants the user a license to use the app and covers a series of important clauses that limit own obligations as the vendor. Ensemble Model, In ensemble models, multiple forecasting models are combined into one. They are combined in such a way, that the predictive performance of the ensemble is more robust and better than the individual forecasts. Usually, one takes a weighted average of the forecasts, whereby the weights themselves could also be learned. Combining forecasts with different approaches can be especially helpful. Enterprise Blockchain, Enterprise blockchain uses distributed ledger technology (DLT) for commercial reasons. While every organization may adopt blockchain, some sectors are more likely to profit than others, such as insurance or law businesses, or supply chain corporations. Most firms choose private blockchains. Private blockchains provide privacy, dependable transaction speeds, and minimal transaction costs, which public blockchains cannot. Blockchains are auditable, making firms compliant and transparent. Blockchain can help firms expand securely and effectively as they become global and digital.
cy market traders. It is a theory of technical analysis used to analyze price fluctuations in the financial market by examining persistent changes in investor psychology and attitude. It was discovered that stock markets, which were previously believed to operate randomly, trade in waves, which are recurring patterns of trading. It is believed that investors attempting to detect market trends are surfing a wave. ELM, → “Extreme Learning Machine“ EMA , → “Exponential Moving Average“ Email Spoofing, Email spoofing is used in spam and phishing campaigns to deceive consumers into believing a communication originated from a trusted person or institution. In spoofing attacks, the sender forges email headers so client software shows the false sender address. If they recognize the name, they may click on fraudulent sites, open virus attachments, submit sensitive data, or wire company finances. The way email systems are constructed allows for email spoofing. Since the early 1970s, spammers have utilized email spoofing to bypass email filters. The topic gained notoriety in the 1990s and is still a major cybersecurity concern today. Embodied Agents/Embodied Conversational Agents, In artificial intelligence, an embodied agent, also known as an interface agent, is an intelligent entity that interacts with its surroundings through a physical body inside that environment. Agents that are depicted graphically with a body, such as humans or cartoon animals, are sometimes referred to as embodied agents, even though their embodiment is virtual and not actual. A subfield of artificial intelligence focuses on equipping such creatures with the autonomy to interact with humans and the environment. Mobile robots are one type of agents with a physical body. Ananova and Microsoft Agent are examples of agents with graphical representations. Embodied conversational agents are embodied agents (often with a graphical user interface as opposed to a robotic body) that can engage in conversation with one another and with people using the same verbal and nonverbal methods that humans use (such as gesture, facial expression, and so forth). Emission, Emission is the rate of cryptocurrency release. At Bitcoin, every 10 minutes, a new block is added. When the Bitcoin started, miners were compensated 50 BTC for every
70
ERC-20 that it can be deciphered even if some blocks are missing or never received. RAID and erasure encoding are often confused for one another. In actuality, the two are fairly distinct. RAID is often implemented in servers and other big storage devices. It replicates data across numerous storage devices. The most important characteristics of erasure coding are scalability, dependability, cost-effectiveness, and speed. ERC, → “Ethereum Request for Comment“ ERC Standards, Ethereum specifications emphasize token interfaces. These standards guarantee smart contracts are composable, so a new project’s token is interoperable with decentralized exchanges. Ethereum token specifications include: ERC-20 (standard interface for fungible interchangeable tokens like voting tokens or virtual currency), ERC-721 (standard interface for non-fungible tokens like art or music), ERC-777 (add additional functionality to tokens, such as a mixer contract for transaction privacy or an emergency recover mechanism), ERC-1155 (enables efficient trading and transaction bundling, saving money of utility tokens and NFTs), and ERC-4626 (tokenized vault standard that optimizes and unifies yield-bearing vaults). ERC-1155, Due to their use of the Ethereum network, ERC-1155 tokens are safe, tradable, and resistant to hacking. They may be used to build fungible tokens, which provide monetary benefit on several platforms. Transactions might be grouped to reduce the cost of token transfer. To combine two worlds under a single contract, a token standard was developed. Tokens are the initial kind capable of performing deterministic smart contract functions when sent to an address. ERC-1155 looks to have huge usefulness and technological superiority, suggesting that it will progressively occupy more and more area. ERC-20, Ethereum blockchain-based ERC-20 coins. Like Bitcoin, they may be spent or sold for fiat and crypto. Fixed-supply assets may be held in an Ethereum wallet. During the 20172018 ICO craze, several ERC-20 coins were launched. Decentralized applications (dApps) rely on them. ERC-20 tokens are fungible, meaning they can be readily traded. This is comparable to websites only operating fully if HTTP compliant. ERC-20 tokens are used as in-game assets and loyalty points. ERC-20 tokens are popular because of their adaptability.
Enterprise Ethereum Alliance (EEA), Enterprise Ethereum Alliance (EEA) unites technological businesses, financial institutions, start-ups, and academics to promote Ethereum technology and drive global commercial prospects. It comprises of JPMorgan Chase, Microsoft, Intel, Accenture, EY, and BP. Through the association, members may exchange information and promote institutional Ethereum adoption. EEA’s operations focus on four pillars: understanding business needs, establishing standard specifications, expanding with the public Ethereum blockchain, and attaining worldwide interoperability via certification processes. The EEA has offices in China, France, and Japan. Epoch, In Artificial Intelligence (AI), an epoch is one training dataset loop. Neural network training usually requires several epochs. If neural networks are provided with training data in various patterns across several epochs, one would anticipate improved generalization since each epoch changes the dataset’s model parameters. The batch gradient descent is named after each epoch batch. Batch size is always an integer in the epoch number, generally 1 or more. A blockchain epoch is a specified time period. This time period specifies when particular blockchain network events will occur, such as when incentives will be given or when a new set of validators will be appointed to verify transactions. Every blockchain defines this timeframe differently. Equity, Equity is a company’s shareholder-owned value calculated by total assets minus total liabilities. Book value and market value are equity two different types of equity. Equity is normally reported at its market value, which may be higher or lower than its book value. With a company, investors in equity shares have limited liability. Equity shares offer the greater profit potential than other investments. Higher stock yields are related to capital gains, which are taxed less than other earnings in most nations. In crypto, investors may buy a cryptocurrency’s tokens/coins and stake them for ongoing earnings. Erasure Encoding, Erasure coding is a technique for dispersing information among several storage systems. Instead of putting data to storage in its whole, information is divided into smaller bits that may be reconstructed if necessary. The primary benefit of erasure coding is
71
ERC-223 puter-based analytical contract trigger a hook mechanism that facilitates account and contract communication. ERC-777 tokens are less likely to be caught in contracts than ERC-20 tokens and use the new ERC-820 standard, which permits contract meta-data registration for introspection. This allows backward compatibility and new features. ERC-777 allows anybody to add new functionality to tokens, such as a mixer contract for improved transaction secrecy or a private key recovery capability. ERC-827, ERC-827 is one of the several Ethereum network-developed token specifications. It enables users to execute smart contracts by passing data and tokens to them. It also permits tokens to be approved for expenditure by third-party entities on the blockchain. Since it is an extension of ERC 20, all the functionalities are same. ERC 827 is a superset of the ERC20 standard for tokens. While keeping compatibility with current tokens, it tackles some of the more critical concerns. This implies that it can be used to address issues than tokens being stranded in smart contracts. In addition to reaping the advantages of the new standard, users will also be able to continue using the previous standard. ERC 827 seems to be receiving more attention than ERC 223 recently. ERC-884, Each ERC-884 token represents a single share in a Delaware firm. The standard is intended for equity transactions, and the token’s owner must be whitelisted via a smart contract-integrated approach. To comply with securities regulations, token issuers must construct a private database off-chain. Companies in Delaware may now use blockchain technology to handle share registrations, as a result of new legislation. It must enable the company to generate the shareholder list required by Sections 219 and 220 of The Act, per regulatory requirements. Each ERC-884 coin must represent a unique, uncountable, fully paid-for share. To fulfill some Know Your Customer (KYC) requirements, implementing ERC-884 requires the usage of an off-chain database. ERC-948, ERC-948 is a new protocol intended specifically for transactions involving subscriptions. The opt-out functionality is available to users, and smart contracts may be designed to remove tokens from users being the most beneficial from a financial perspective. This concept will generate a multitude of new use cases. ERC-948 provides a very lucrative and alluring
ERC-223, Smart contracts underpin the ERC 223 token platform, which lets users to safely transfer tokens to a digital wallet. It was developed as a fix for the ERC-20 problem by a developer using the Reddit handle Dexaran. The ERC-223 token is a superset of the earlier introduced Ether-20 token. The ERC 223 transfer function has a parameter that verifies the destination address is a smart contract. If not, the transaction executes the token fallback function in the smart contract, which returns the token to the account of the sender. Since the modified transfer mechanism is compatible with smart contracts, no tokens are lost. ERC-4626, ERC-4626 is a standard designed to improve and standardize the technical aspects of yield-generating vaults. It offers a common API for tokenized yield-bearing vaults that represent shares of a single ERC-20 token as their underlying asset. ERC-4626 also specifies an optional extension for tokenized vaults leveraging ERC-20, providing fundamental functionality for token deposits, withdrawals, and balance reading. Using various tactics, lending markets, aggregators, and fundamentally interest-bearing tokens assist users in maximizing the return on their crypto tokens. By introducing more standard and resilient implementation patterns, ERC-4626 will reduce the integration effort and provide access to yield in a variety of applications with little developer effort. ERC-721, ERC-721 is Ethereum’s token standard for NFTs which are tokens with unique properties. A $10 note is fungible and if lent to a friend, one will probably not get the same one back. Non-fungible items include airline tickets and trade cards. One aircraft ticket may promise an economy fare to New York, while another guarantees a first-class trip to Paris. They cannot be switched like-for-like. ERC721 tokens apply this notion to the blockchain, immortalizing asset data. NFTs may be used to represent unique artwork digitally, with blockchain records proving ownership. This reduces counterfeiting. The Ethereum community believes ERC-721 might have many intriguing uses beyond CryptoKittie NFTs. Several competitor blockchains, including Binance Smart Chain, have announced comparable tokens. ERC-777, ERC-777 is Ethereum’s tokenization standard for ETH-compatible tokens. It helps remove uncertainty regarding decimals, minting, and burning. Tokens transferred to a com-
72
Ethereum Transaction Ether , Ether and Ethereum are almost interchangeable. Here are significant disparities. Ethereum is the blockchain platform whereas Ether is the second-largest coin. Ether thus is the Ethereum network’s power. It may be used as an exchange medium to purchase and sell products and services. It is also vital for developing decentralized Ethereum apps. Ether may be used to pay for transactions and computations. In the past, miners generated new currencies whenever they verified a new block of transactions, but Ethereum moved to a Proof-of-Stake system. Ether is available on most CEX. Ethereum, Ethereum is a decentralized, programmable, blockchain-based software platform with a cryptocurrency known as Ether (ETH) which is one of the top three cryptocurrencies by market capitalization in the world. Despite being open source and based on blockchain technology, it differs from bitcoin in two fundamental ways: developers may design decentralized applications and smart contracts can be written on the blockchain. Ethereum Improvement Proposal (EIP), Ethereum Improvement Proposal (EIP) is a paper describing Ethereum’s community standards. These include client APIs, basic protocol standards, code updates, and contract standards. Different EIPs exist: Standard Track for noncore developments, core modifications requiring a consensus fork, improvement to network protocol specifications, improvements in client standards and specifications including API/ RPC standards, application-level standards, and conventions (ERC), Meta change requests, and informational guidelines. After submitting an EIP, various procedures determine whether to incorporate revisions. Ethereum Request For Comment (ERC), An Ethereum Request for Comment (ERC) is comparable to Bitcoin Improvement Proposals (BIP) and a set of guidelines that regulate how data is structured and transported. These rules also specify what actions will be taken when a certain event occurs. New ERCs are established by submitting a proposal through EIP (Ethereum Improvement Proposal). The community evaluates these papers and provides its support or disagreement. Once it has received community approval, developers install the new ERC. Ethereum Transaction, Ethereum transactions are cryptographically signed instructions from accounts to change the Ethereum network
environment for subscription service providers and may attract even more consumer-facing businesses to blockchain technology. Escrow, Escrow accounts are used when there is concern over a party’s ability to fulfill the conditions of a transaction or contract. A third party holds funds until the legal documentation on an item has been completed, at which point the cash is released to the seller and the asset is transferred to the buyer. Additionally, escrow accounts are used in banking, intellectual property, mergers, and acquisitions, and, over the last decade, increasingly in cryptocurrency transactions. Escrow service providers charge a commission between 1 % and 2 %, which may be paid by the buyer, the seller, or both parties. E-Signature, Electronic signatures have become a popular substitute for physical ones. Electronic signatures must properly identify the signer, and the signer must be the exclusive owner of the private key for the signature. A digital signature is one of the most common alternatives to an e-signature. Digital signatures are distinct from electronic signatures, even though the former phrase is often used to refer to the latter technology. Unlike e-signatures, which are only digital representations of a physical signature, digital signatures use encryption to confirm their authenticity. As technology progresses and more applications become accessible, new types of electronic signatures are being offered today. Biometric signatures are a common sort of e-signature that relies on physically identifiable characteristics. ETF, → “Exchange Traded Fund“ ETH , → “Ethereum“ or “Ether“ Ethash, Ethash is a modified algorithm that removes the computational expense of its predecessor, Dagger-Hashimoto. The software utilizes a large dataset that is constantly generated and steadily grows over time. It is little enough to fit into the VRAM of a modern GPU. In Ethash, the network raises and lowers the threshold in order to regulate the rate at which blocks are mined. Ethash is a memory-intensive PoW algorithm designed to be ASIC-resistant to make mining more egalitarian. Frequently, miners increase the memory clock frequency of their GPUs to attain enormous improvements in Ethash hash rates. Custom-built PCs with six or more high-end GPUs are often required for the most cost-efficient mining farms.
73
Ethereum Virtual Machine (EVM) tract procedure or workflow. This may be quite useful for simplifying the user experience. For blockchains like as Ethereum, which are known for high gas prices and slower transaction speeds, a trigger may be programmed to send automatic warnings to users when the fee threshold is reached. Notification triggers may be established for trading when respective token prices exceed a certain threshold, making it effortless to take gains or mitigate losses. In terms of security, selected wallet addresses may be monitored, with triggers for suspicious activity, such as big asset transfers, sending warnings. EVM, → “Ethereum Virtual Machine“ Exchange Traded Fund (ETF), Exchange Traded Funds (ETFs) are baskets of securities such as stocks, bonds, commodities, and cryptocurrencies that trade as a single stock. ETFs and mutual funds both allow investors to diversify returns and combine asset types. ETF prices change as they are sold throughout the day. ETFs help diversify portfolios since they invest in several sectors. A single sector ETF is also possible. ETFs often follow the S&P 500 or FTSE 100. SPDR S&P 500 ETF Trust is popular. ETFs may also be actively managed, which implies a portfolio manager makes investing choices that do not always replicate the underlying index. ETFs offer tax benefits over mutual funds. When sold, an ETF incurs capital gains tax. ETF investors may also engage in short selling, which entails selling a stock they do not own and buying it back when its price falls. Exchange , An exchange connects the buyer and vendor. Exchanges may transmit digital assets to consumers’ wallets. Decentralized and centralized exchanges exist. A CEX acts as the intermediary to enable cryptocurrency transactions. DEXs allow peer-to-peer cryptocurrency trading and are not centralized. IDEX and Curve Finance are decentralized exchanges whereas Binance, Coinbase, and Kraken are CEX. Exclusive Rights, An exclusive right of exploitation is characterized by the fact that the acquirer may use the work to the exclusion of all other persons. As a rule, the author himself is also excluded from use. The scope of use is regulated in detail in the license agreement.
state. Simplest transaction is between ETH accounts. Using Ethereum’s consensus rules, the network decides if the transaction is legitimate, and if yes, it is added to the blockchain. The transaction message is an RLP-encoded array that specifies the recipient, value, data, gas limit, gas price, nonce and signature. Recipient is the account address the transaction is sent to. The data is optional arbitrary binary data that includes the contract’s bytecode. A transaction’s signature identifies and authenticates its sender. Ethereum Virtual Machine (EVM), Ethereum Virtual Machine (EVM) is a decentralized machine with millions of executable projects. It serves as Ethereum’s virtual computer. It handles execution and smart contract deployment on Ethereum. EVM adds more features to Blockchain to reduce problems on the distributed ledger. Using the EVM, every Ethereum node maintains blockchain consensus. EVM treats Externally Owned Accounts (EOA) and Contract Accounts equally. Private keys govern EOAs, whereas smart contracts hold contract balances in smart wallets. EVM functions as a decentralized master computer to accomplish blockchain activities. Etherscan , Etherscan is a website, block explorer, and analytics tool that enables free viewing and analysis of Ethereum network wallets, assets, balances, and transactions. Etherscan also makes it simple to engage with smart contracts and examine gas prices associated to Ethereum-based assets and transactions. ETS, → “Exponential Smoothing“ EUIPO, → “European Union Intellectual Property Office“ EULA, → “End User License Agreement“ European Union Intellectual Property Office (EUIPO), The EUIPO is the European Union Intellectual Property Office responsible for managing the EU trade mark and the registered Community design. We also work with the IP offices of the EU Member States and international partners to offer a similar registration experience for trademarks and designs across Europe and the world. Event Triggers, Event-driven automation employs certain triggers to initiate operations without human interaction. Once an event has been discovered, an automation tool may subsequently activate a predetermined smart con-
74
Farm/Farming Falling Knife, A falling knife refers to a quick decline in the value of an asset. When this occurs, savvy investors refrain from acquiring the asset until it hits its lowest point. This is because many assets recover rapidly when the falling knife hits its lowest point, commonly known as a whipsaw. Negative news surrounding an issuing company may often cause a falling knife pattern in an asset, followed by market-wide liquidation. In these instances, the market price of the stock typically rebounds when the issuer makes a positive follow-up announcement. If appropriately timed, a falling knife may provide enormous profits for investors. If investors do not purchase the stock in accordance with the trend, they run the danger of losing money. Falling Wedge, The falling wedge pattern is an important trend that suggests a future rising trend. It may be regarded as a continuation or reversal formation on the trendline, depending on its placement on the price chart. The dropping wedge might be compared to the calm before a storm, as it tells purchasers to regroup and attract fresh purchasing desires. A falling wedge is a key technical pattern signaling that the adjustment, or consolidation, has just been completed as the asset’s price has exited the wedge to the upside. As the trend line advances, the volume decreases and the trend lines converge. The first stage is to identify whether there exists an upswing or a downturn. Waiting for the breakout to commence is one method of checking the move. Fan Token, Fan tokens are a kind of cryptocurrency that entitles users to a variety of fan-related membership privileges at a club, such as a football team. It may include discounts, rewards, voting rights on kit designs and club decisions, and access to unique experiences provided by the sports team. Most fan tokens are accessible on Socios.com, however some, such as the Paris Saint-Germain Fan Token (PSG), are also available on CEX. The price of a fan token is dependent on club activity. An outcome of a match, transfer of a star player, or any other important event may quickly affect the price. Farm/Farming, Instead, then purchasing NFTs with cash, people may farm them by mining their tokens with their GPU. When doing this, their computers join other computers that are also mining on the blockchain. Also see “Yield Farming“
Exit Scam, An exit scam is when a cryptocurrency project vanishes with investors’ money during or after ICO. Whales might boost the price through advertising and promotions, then dump their coins. These phenomena are hard to see until they happen, like a black swan, but they happen more regularly. A startup establishes a cryptocurrency platform with a great idea, obtains cash from investors, operates for a short time, and then vanishes, leaving investors in a bind. Several projects recently used the rugpull method (another form of exit scam). Even some trusted by celebrities fall into this group. Exponential Moving Average (EMA), Exponential Moving Average (EMA) is a sort of moving average that lends more weight to current asset and cryptocurrency price data. Traders who want to respond to the most recent price fluctuations use this indicator. Typically, an EMA graph consists of three lines. EMA is more susceptible to price fluctuations and market reversals. The 8-day and 20-day exponential moving averages (EMAs) are more popular among day traders whereas the 50-day and 200-day EMAs are utilized by long-term investors. Indicators such as relative strength index (RSI), moving average convergence divergence (MACD), and on-balance volume (OBV) are other frequently used indicators. Exponential Smoothing (ETS), ETS models create forecasts through a weighted combination of the past values of the time series. The weights are calculated in such way, that more recent observations have a higher weight, and therefore play a greater role. Extreme Learning Machine (ELM), An ELM is a type of feedforward neural network, i. e., a NN with input, hidden and output layers, where the connections between nodes do not form any cycles. In this case, the weights are randomly assigned initially, and only the weights of the output layers are learned. FA, → “Fundamental Analysis“ Facebook Prophet, Additive regression model with piecewise modelling of trends and seasonality. Additional data and special events or holidays can also be integrated into the model. Fair Use, Fair use is a legal doctrine in the copyright systems of some common law countries that allows certain unauthorized uses of protected material if they are for public education and stimulation of intellectual production
75
FATF they deposit or withdraw funds and conduct transactions on a cryptocurrency exchange. Trading fees are sometimes assessed at a flat rate that increases or lowers as the trade’s value falls below or rises over a certain threshold. If a trade order is not quickly matched with a buyer or seller’s order in the order book, a maker fee will be assessed. For certain exchanges, these fees may be decreased by using the utility token of the platform. Additionally, platforms may provide VIP levels with special incentives and perks, such as lesser costs. Fees received are often invested in the expansion and development of exchange platforms. Fees , For each blockchain transaction or action, miners must be paid fees, which is either Gas or Gwei, with prices varying depending to network congestion. FHE, → “Fully Homomorphic Encryption“ Fiat, The definition of fiat in the dictionary is simply an authorized or arbitrary command. A government passes an order mandating that USD, GBP, INR, EUR, or any other international currency may be used to settle public and private obligations. Fiat currency is not backed by gold or silver, but by the governments that produce and distribute it. Cryptocurrency, unlike fiat money, is decentralized and no monetary authority or nation has authorized or had input on the currency’s distribution or usage. Fiat On-Ramp, On-ramp is a location where people may swap fiat money for cryptocurrencies. These platforms, called exchanges, base fiat-crypto transactions on market pricing. May obtain cryptocurrency and blockchain assets in three ways. First, by mining them by offering processing power to a blockchain network for coins or tokens. Second, by selling goods and services and accept cryptocurrencies as payment. The third route, the fiat on-ramp, enables acquiring cryptocurrencies using cash. One can visit an online exchange or crypto ATM to swap fiat dollars for cryptocurrency. On-ramps allow access to the whole cryptocurrency ecosystem. Then there are cryptocurrency off-ramps where one may convert cryptocurrencies to fiat cash and buy goods and services. Fiat-Pegged Cryptocurrency, Fiat-Pegged Cryptocurrency is a blockchain-issued coin, token, or asset connected to a government or bank-issued money. Stablecoins are fiat-pegged cryptocurrency. They were made to handle vol-
FATF, → “Financial Action Task Force“ FATF Travel Rule, The Financial Action Task Force (FATF) travel rule is a 2019 update to fight crypto money laundering and terrorist financing (AML/CFT) mandating that countries ensure their domestically operating virtual asset service providers (VASPs), such as crypto exchanges and custodial platforms, implement the necessary tools to facilitate personal information sharing with transaction counterparty VASPs for transactions over $1,000 USD. Name, account number, and details about where users transfer money are gathered. Proof of address, identification, birth date, and location are also required. VASPs and other financial institutions must communicate information under the same regulation. They are also responsible for ensuring that all participant information is correct and up-to-date. VASPs are financial institutions or cryptocurrency companies. Faucet, Faucet is a cryptocurrency award system that compensates holders for performing website activities. Viewing advertising or completing captchas are examples of chores. The incentive system was meant to encourage purchases of altcoins. After 2019’s bitcoin price rise, faucet payments dropped. Early Bitcoin faucets dispensed 5 BTC. Ethereum, Dogecoin, and Litecoin faucets followed. Most faucet payouts go to a user’s wallet or third-party wallet. Airdrops and bounties are alternative methods to earn cryptocurrency. FBGA, → “Field Programmable Gate Array“ FDV, → “Fully Diluted Value“ Federated Side Chain, A federated sidechain lets users move assets to and from a mainchain. A sidechain may mimic the XRP Ledger’s protocol or modify the consensus method, transaction types, and other regulations. This allows developers to integrate new features, such as native smart contracts that work smoothly with XRP and the XRP Ledger, while preserving the XRP Ledger’s lean and efficient feature set. Federated Sidechains enable developers to experiment and specialize on a sidechain that functions as its own blockchain. Each sidechain can be its own blockchain. They have a ledger and transactions like XRP. The federation mechanism lets XRP and tokens travel across sidechains. Fee Tiers, Fee tiers refer to the fee structure that sets the amount investors are paid when
76
Financial Crime Enforcement Network (FinCEN) canceled if not filled. A FOK order combines an all-or-none (AON) specification stating that it must be filled with an immediate-or-cancel (IOC) deadline. Finality, Finality is the assurance or promise that completed cryptocurrency transactions cannot be amended, undone, or canceled. Finality is used to assess the period one must wait for a reasonable assurance that blockchain-based crypto transactions cannot be reversed or altered. Due to the finality of blockchain technology transactions, they are referred to be immutable. The nature of the chain’s finality rate is determined by the length of time it takes a blockchain network to complete a transaction (latency). For instance, Bitcoin’s finality is around 60 minutes (6 confirmations, PoW), whereas BNB’s is just one second (1 confirmation, DPOS). Financial Action Task Force (FATF), The Financial Action Task Force (FATF), also known as Group d’action financière (GAFI), is an international body that establishes worldwide standards to fight money laundering and terrorism financing (AML/CFT). G7 members established the FATF in 1989. At its founding, there were 16 members, but as of 2021, there are 39. Following the 9/11 terrorist attacks, the FATF’s mission was broadened to encompass terrorist funding in 2001. The aim of the task force is to identify trends in money laundering, monitor national and international legislative, financial, and law enforcement activity, report on compliance, and provide suggestions and guidelines to fight money laundering. The FATF standards ensure that virtual assets are treated fairly, applying the same safeguards as the financial sector. Financial Crime Enforcement Network (FinCEN), The Financial Crimes Enforcement Network (FinCEN) is a US Treasury regulatory office and one of more than 100 worldwide FIUs that make up the Egmont Group. FinCEN must submit suspected criminal profits and terrorist funding, gathering, and analyzing financial transaction data to prevent money laundering, terrorism funding, and other financial crimes. FinCEN regulates under the Currency and Financial Transactions Reporting Act of 1970, or Bank Secrecy Act (BSA). FinCEN is responsible for applying, implementing, and enforcing these regulations at the Federal, State, local, and international levels.
atility. Stablecoins are tied to the euro, pound, or dollar. While fiat currencies may devalue, big currency fluctuations are rare. Tether is a fiat-backed cryptocurrency. Tether stated each unit was backed by the US dollar, which was a disputed assertion. The best cryptocurrency exchanges must retain fiat-backed reserves to defend against price volatility. Therefore, exchanges retain so many fiat-backed cryptocurrencies. Increasing liquidity is another reason exchanges hold fiat-backed cryptocurrencies. Fibonacci Retracement Level, Fibonacci ratios are a collection of important numbers (Fibonacci retracement levels) developed by Leonardo Fibonacci in 1170 AD. These range from 23.6 % to 78.6 %. Horizontal lines show support and resistance Fibonacci retracement levels. Each level is a percentage or ratio. It shows how far the price attempted to retrace. Fibonacci numbers include 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, etc. Every number in this series is the sum of the two before it and 1.618 times bigger. Technical traders utilize them to draw support lines, visualize resistance levels, and establish stop-loss and take-profit goals. For Fibonacci retracement to function, several traders must utilize the same Fib ratios, which will affect the asset’s price momentum. Since there is no logical justification behind this technical indicator, employing it alone is inaccurate. Instead, utilize relative strength index (RSI), Moving Average Convergence Divergence (MACD), on-balance volume (OBV), Aroon indicator, and stochastic oscillator. Field Programmable Gate Array (FPGA), A Field Programmable Gate Array (FPGA) is an integrated circuit that enable users or designers to reconfigure according to their needs after manufacture. It is a sort of programmable logic that combines software freedom with the hardware performance of an application-specific integrated circuit (ASIC). The FPGA setup may often be conducted remotely after it has been deployed in the final application. Such businesses as telecommunications, the military, aircraft, and banking utilize them. The technique is also used for mining cryptocurrency, tokens, and coins. FPGAs give a versatile alternative to non-reprogrammable general-purpose CPUs. FIFO, → “First In, First Out“ Fill Or Kill Order (FOK), Fill or Kill (FOK) is an order that is ordered to be executed immediately at the market or a preset price, or to be
77
Financial Instruments customer loyalty, but they must continue to change to avoid being overtaken by competitors. First movers have more time to accumulate and build technical skills than later entrants since they begin operations sooner. It is a huge advantage in the blockchain industry, given that crypto projects and crypto exchanges have restricted markets and customers. However, having the first product or service in a market does not guarantee the greatest profits. Later entrants might profit from these informed consumers and spend less on customer acquisition and training. Fish, A fish, or minnow, is an individual who owns negligible quantities of cryptocurrencies and is often at the mercy of whales who drive the market up and down. The activities of minnows are unlikely to have a large impact on market share; however, this may shift if a minnow’s holdings grow. Once they get larger, minnows may evolve into dolphins and eventually reach whale status. Bitcoin dolphins, for instance, are users that make orders of 1,000 BTC or more. It is crucial to understand that cryptocurrency whales set the tone for minnows’ future price predictions of cryptocurrencies. This may lead to a hazardous spiral. Flash Crash, A flash crash is a market scenario in which an asset’s price falls quickly, then recovers quickly. Flash crashes in cryptocurrencies may happen in hours or minutes. High-frequency trading caused several crypto market disasters. Selling pressures cause fast price movements and flash crashes in crypto markets. Stock and forex markets also experience flash crashes. The July 2015 NYSE flash stopped trade for almost three hours. Algorithm-focused trading programs produced the 2014 bond flash collapse, while spoofing caused the 2010 Dow chaos. Different cryptos cause flash crashes. In 2021, Bitcoin’s flash crash took $310 billion off the digital currency market, sparking $10 billion in BTC liquidations. Flash Loan, Flash loans are a sort of DeFi loan that are handled, acquired, and returned quickly and without collateral. Flash loans are an innovative solution provided by the Aave platform and made possible by the way data is stored on the Ethereum blockchain. With a flash loan, customers may borrow as much as desired without incurring any fees up front. A decentralized lender does not need collateral since the promise to repay the loan is enforced by the
Financial Instruments, Since the introduction of cryptocurrencies (such as Bitcoin, Ethereum, etc.), BaFin decided that cryptocurrencies as units of account constitute so-called financial instruments within the meaning of the German banking supervision regulations pursuant to Section 1 (11) No. 10 of the German Banking Act (KWG). Financial Transactions and Reports Analysis Centre (FINTRAC), The Financial Transactions and Reports Analysis Centre (FINTRAC) of Canada is independent of Canada’s police and other law enforcement authorities to which it may provide financial intelligence. The Centre is answerable to Parliament via the finance minister. FINTRAC was created in 2000 and operated under the Proceeds of Crime Money (Money Laundering) and Terrorist Financing Act (PCMLTFA) and its rules. Its objective is to identify and investigate money laundering and to provide financial information on suspected terrorism funding to law enforcement. Regulated organizations must report suspicious transactions, suspected terrorist property, big cash transactions, and outgoing or incoming international Electronic Fund Transfers (EFTs) of over $10,000 within 24 hours. FinCEN, → “Financial Crime Enforcement Network“ FINTRAC, → “Financial Transactions and Reports Analysis Centre“ First In, First Out (FIFO), First In, First Out (FIFO) is a mechanism the IRS advises if US taxpayers cannot identify a cryptocurrency’s unit owing to missing or unavailable information (see IRS Notice 24). Depending on the kind of cryptocurrency transaction, investors may owe capital gains and income tax. If someone makes a profit purchasing and selling crypto or received interest, they must pay taxes. Using FIFO, assets are sold in the same order that they were purchased. In Rev. Rul. 2019-24, the IRS recommends FIFO and Specific Identification to determine cost basis. The IRS bases tax on how long people keep the cryptocurrency before selling. Long-term capital gains reductions apply to assets held over a year. First-Mover Advantage (FMA), First-Mover Advantage refers to a business or organization that introduces a revolutionary product or service in order to achieve a competitive advantage. They often enjoy brand leadership and
78
Fork changes and rapidly reselling them for a profit after they start trading in the secondary market. Bitcoin flipping is a frequent business jargon. An investor buys Bitcoin in hope of selling it later at a better price. Bitcoin flipping might be beneficial amid severe volatility and price increases. After an ICO, crypto prices frequently surge compared to pre-ICO levels allowing for flipping. Floor Price, An NFT floor price is the lowest NFT price in a collection. The owner of an NFT in a certain project sets the floor price by listing the NFT for sale at a lower price than other vendors. The initial NFT floor price is set by the project developer, creator, or artist. NFT holders seek to offer their NFTs at a higher floor price on the secondary market to make profits. To determine the value of an NFT, see the NFT floor price chart, which lists NFT collections with floor prices. By this, one may compare which NFT collection has the highest and lowest floor price. Floor Sweep, A floor sweep occurs when all NFTs on a project’s floor are purchased. This might be a positive indicator of upcoming good news or that whales are circling a project prior to its launch. Or it might potentially be coordinated by an NFT collection’s community in order to increase the project’s base price. FMA, → “First-Mover Advantage“ FOK, → “Fill or Kill Order“ FOMO, Fear Of Missing Out (FOMO) is a word used to describe the worry people may have making trading choices if they do not move fast. The premise is that any delay might lead them to lose out on a possible opportunity. Some may change exchanges or withdraw their assets totally from a market due to fear of missing out (FOMO). Forecasting, Forecasting is the process of using past and present data to make predictions. After observing the event, one can then compare the forecast with what happened. Businesses use this method to plan their next activities and measures. Fork, In blockchain, a fork is when a blockchain diverges into two viable paths or when two or more blocks share the same block height. In general, different parties must utilize the same principles to preserve a blockchain’s history. Alternative chains may form when parties disagree. Some permanent forks
blockchain. Despite the speed of the transactions, flash loans are vulnerable to exploitation; the phrase flash loan assaults is often used to describe such abuses. DeFi systems might use decentralized price oracles such as Chainklink and Band Protocol to avoid such assaults. Flash Loan Attack, An assault against a smart contract designed to allow the supply of flash loans constitutes a flash loan attack. In such assaults, the bad actor creates a loan, utilizes the borrowed funds to arbitrage-purchase other assets, and then swiftly pays back the loan. This sort of harmful action is very intricate and tough to execute, but fraudsters have succeeded in numerous instances. PancakeBunny, a Binance Smart Chain-based yield farming aggregator, also underwent a flash loan assault in May 2021. When the flash loan hacker dumped their borrowed Bunny tokens on the market, the price fell. Flippening, The term describes when Ether (ETH) might become the world’s largest cryptocurrency. Bitcoin (BTC) as the first cryptocurrency had the largest market valuation and market share for a long time. The market capitalization of Bitcoin declined in early 2018. The assumption that Ethereum offers more freedom and the extra benefit of being able to construct smart contracts was a significant element in the anticipation that a flippening could occur. Flipper , A flipper is an investor who purchases a stock in order to quickly sell it for a profit, often during an initial public offering (IPO). Flipper may also refer to a person who purchases and resells houses or buildings for a rapid profit, often after undergoing renovations. Flipping, whether in stocks or real estate, is a highly speculative practice that authorities often frown upon. Flipper Token, The Flipper token is a cryptocurrency including a coin-flipping game with 50 % chance to win and 50 % chance to lose. With Flipper, people may gamble BNB for the opportunity to win twice as many tokens. The amusing aspect is that all BNB from the game are collected in a buyback wallet that gives long-term support for the chart when needed. Flipping, Flipping is a method (popularized by real estate investing) where people acquire something to resale for a profit later, generally quickly. Flipping in cryptocurrency refers to investing in tokens before they are posted on ex-
79
Fork (Blockchain) ticularly one who has invested in the same currency or project as oneself. Frictionless, Frictionless marketplaces are an ideal trade environment without fees or restrictions. Black-Scholes and other pricing models assume frictionless markets, which is significant since real-world applications have actual costs. Financial technology innovation is widening the scope of market activity and moving toward frictionless markets. E. g., Robinhood’s no-fee transactions reduce trading friction. As competition rises, trade costs fall, reducing friction costs. Besides trading expenses, investors must also include taxes while calculating friction costs. Front Running, Front running means putting a transaction in a queue knowing about a future one. Front running on a blockchain network occurs when a miner with knowledge of forthcoming trades makes an order to benefit from it. Front running occurs e. g., on the Ethereum blockchain when bots offer a higher gas price than a current deal, speeding up its processing. Full node operators, who monitor network activity and know unconfirmed transactions, may also front run. Sequencing and enhancing transaction secrecy reduce front running. FT, → “Fungible Token“ FUD, FUD is an abbreviation for Fear, Uncertainty, and Doubt. It is a tactic to impact the impression of particular cryptocurrencies or the cryptocurrency market by the dissemination of incorrect, deceptive, or misleading information. People who engage in these tactics are called FUDster. FUDster, A FUDster is someone who promotes FUD. FUDsters are the antithesis of Bitcoin, Ethereum, cryptocurrency, and Twitter proponents. These supposed adversaries include individuals such as Warren Buffet, economist Paul Krugman, and on occasion Elon Musk. Full Node, Nodes are computers that are connected to the Blockchain network. Nodes that validate all Cryptocurrency rules are referred to be full nodes. Bitcoin Core is the most common software implementation of full nodes; its newest version can be obtained on github. Fully Diluted Value (FDV), Fully Diluted Value (FDV) refers to a token’s market capitalization after all tokens have been issued. This statistic allows to calculate the future market cap
exist, but distributed system consensus issues might cause short-lived forks. Permanent forks (protocol modifications) have been used to introduce new functionality to a blockchain, but they may also be used to reverse the effects of hacking or avoid catastrophic network flaws, as with the bitcoin split in August 2010. Fork (Blockchain), A blockchain fork splits the network into two versions. Hard forks are network protocol changes that may create new digital currencies or blockchains. A soft fork is the backwards-compatible insertion of a new rule into the protocol. Fork (Software), Forking is popular and considered favorable in the open-source community with forking software developing new versions of a protocol, cryptocurrency, or blockchain in a project. Competing projects mean developers do not exchange code with successors possibly causing legitimacy, ownership, and direction issues. FPGA, → “Field-Programmable Gate Array“ Fractional Ownership, Fractional ownership distributes an asset’s cost across shareholders. The stockholders share use rights, revenue, priority access, and lower rates. This is similar to timeshare models. Every fraction of an NFT (or F-NFT) represents partial ownership of the original non-fungible token. Fractionalization can be seen as splitting an NFT into different parts. Fractional Stablecoins, Fractional stablecoins are partly backed by collateral and partially algorithmically stabilized. In general, the protocol mints more stablecoins than it has value to redeem them all against. To be used as a payment mechanism, they must be backed by fiat cash, cryptocurrency, or on-chain tokens. If a stablecoin is overcollateralized, the available stablecoins are burnt. Fraud Proof, The definition of fraud is wrongdoing performed with the intent to acquire an unlawful advantage by depriving the victim of a right. A single individual, a group of individuals, or an entire business may engage in fraudulent activity. In the field of blockchain, fraud proofs are a crucial technological mechanism for allowing the scalability of blockchains onchain. To scale public blockchains, fraud proofs and erasure codes are required. Fren, In the web3 environment, this term refers to a fellow crypto or NFT enthusiast, par-
80
Game Channels fungible because one ounce of gold in a gold bar is identical to an ounce in another gold bar. Fungible Tokens (FT), A token is fungible when its units are interchangeable, i. e., they are indistinguishable; for instance, when trading 1 BTC for another cryptocurrency, such as ETH, they both have the same relative worth at the moment they are traded. Futures, → “Future Contract“ Futures Contract, Futures contracts are legally binding agreements to exchange a certain asset, commodity, or cryptocurrency at a specified future price. In the realm of futures, expiry dates have a significant impact on the outcomes. Futures platforms offer leverage functionalities as traders only need a percentage of the total contract value while the rest is leveraged or borrowed. Futures contract might be physically settled or cash-paid at at the expiration date. GAFA, The acronym for “Google, Amazon, Facebook, and Apple.“ Gains, Gains are value increases, also often called profits. Gains come from selling a real or digital item for more than it cost to purchase. A trader who purchased Bitcoin at $10k and sold it for $18k made a $8k gain. The true benefit is determined by also subtracting the asset’s maintenance and transaction cost. Thus, if the investor paid a $1k transaction cost, the true gain is $7k. Other cost considerations include property, costs, and agent fees, maintenance costs, etc. In financial book keeping gains are in the credits area. These gains might also be unrealized when an asset’s price rises but the investor does not sell. Unrealized earnings in the cryptocurrency industry, for example, are often created by a volatile market where values might swing within a short period. Gains are usually taxed. In most countries, cryptocurrency gains are taxed as capital gains. Game Channels, To comprehend game channels, one must understand blockchain games. Blockchain games are decentralized and trustless. As more people join a game, storing files and data on the blockchain network may cause scalability issues. Most blockchain games do not provide this feature since they need to generate a transaction between each move, which is time-consuming. Game channels permit safe off-chain player transactions, may establish private channels that operate parallel to the
of a project. FDV also is the entire worth of all cryptocurrencies in a network at any one time. The FDV focuses on the future rather than the coins already in circulation. Compared to the conventional market capitalization statistic, a cryptocurrency’s FDV indicates what its market capitalization would be if all potential coins were created. Fully Homomorphic Encryption (FHE), Fully homomorphic encryption (FHE) permits calculations on encrypted data. Its purpose is to facilitate ciphertext calculations without intermediary decryption. This enables cloud computing and big data analytics. Heredity encryption also permits calculation on encrypted private data. FHE may store private data on third-party servers and yet enable computation while the server admins cannot see what private data was computed (assuming a secure FHE implementation). FHE is still new and financially unfeasible, therefore further study is needed before it may be widely used. Fundamental Analysis (FA), A technique in which the underlying worth of an asset is determined by analyzing its technology, team, growth potential, and other indicators. Some individuals do fundamental analysis as part of the value investing investment approach. Funding Payments, In cryptocurrency derivatives markets, funding payments are utilized for everlasting contracts. To lessen the price disparity between the perpetual and spot markets, derivatives exchanges use a method known as funding payments. These are automated payments between traders at predetermined intervals (e. g., every hour or eight hours) in which traders on the more popular side pay dealers on the less popular side. The funding rate effectively shows the cost of capital, the steepness of the futures curve, and the emotion of traders. Fungibility , Fungibility is a characteristic of products with interchangeable units. E. g., Bitcoin’s censorship resistance and privacy depend critically on its fungibility. Not fungible or unique items are not monetary commodities. Bitcoin and many other cryptocurrencies are infinitely divisible and thus highly fungible. Fungible, In the domain of cryptocurrencies, fungible refers to the capacity of a currency to keep a consistent value. This indicates that each unit of a (crypto)currency has the same value as every other unit. Gold is often regarded as
81
Game Theory is best compared to a large bank ledger (database) containing fundamental features such as account creation, transaction transmission, etc. It is a good method for determining the efficacy of the code and testing of smart contracts locally prior to deploying them on the blockchain. Gas, Gas represents the cost of transaction processing on the Ethereum network. It is consumed in units known as gwei, with one gwei equaling 0.000000001 ETH. The charge is paid in Ether (ETH), the native currency of the platform. The quantity of ETH paid in a single transaction is dependent on the number of resources necessary to complete a transaction on the EVM (Ethereum Virtual Machine) and the degree of congestion. Gas Fees, Amount paid to complete a transaction on the Ethereum blockchain especially for NFT in an analogy to gas fees paid to drive somewhere. This charge covers Ethereum miners’ computational work (computers running software). Supply and demand affect gas prices. It depends on how many individuals want to transact and how much they are ready to spend. When many individuals use Ethereum, they pay miners extra to do their work first, so gas prices may be seen as bribes to cut in line. Gas Limit, Gas limit is the most Ethereum users pay to complete a transaction. The limit relies on the intricacy of the blockchain activity or transaction speed. As a large ecosystem, the Ethereum platform sees many transactions. Thus, miners on the protocol prefer high-gaslimit transactions. Traders may want to use a greater gas limit, since unused gas is returned to the user’s account. A gas limit feature in smart contracts prevents overcharging for a transaction and avoid aborted and failed transactions. When a transaction fails, consumed gas is not repaid. The ETH Gas Station gives a preferred gas limit overview. As an example, MetaMask wallets allow setting a gas limit. Gas Price, The gas price is the amount of ETH required to be paid to miners for completing network transactions. The price of gas fluctuates significantly over time, increasing during times of strong demand and decreasing during times of low demand. Exorbitant gas costs have long been a key obstacle for customers and impede the scalability of the network. At the height of the 2020 DeFi boom, Uniswap customers paid up to $50 per transaction in gas costs. With the new proof-of-stake Ethereum
main chain (off-chain) and near-real-time. With gaming channels, a blockchain network can accommodate more games and dApps without slowing transactions and allow decentralized conflict resolution without a third-party or central authority. Thus, the time between movements is reduced, allowing participants to play in near-real-time. Game Theory, Game theory is one of the most famous fields in economics going back to the works of John von Neumann. Game theory enables researchers to analyze how individuals and organization react to certain circumstances and actions. The prisoner’s dilemma is one of the most renowned examples of game theory in action. Game theory may be used to understand digital asset markets. The Bitcoin market, for example, may be divided into two sorts of investors: holders and opportunists. One the one hand, all are working in their own self-interest, fighting for asymmetric benefits while on the other hand collaborating to increase BTC’s value. GameFi, GameFi combines decentralized gaming with money (DeFi). Andre Conje, the founder of DeFi, invented the phrase in 2020. GameFi combines blockchain technology, gaming, and decentralized financial products such non-fungible tokens, yield farming, borrowing and lending, and algorithmic stablecoins. Gaming has decreased the entrance barriers into the crypto realm and changed conventional gaming by allowing players to earn money while playing. In traditional games, in-game assets have no worth outside the game. Players spend money in these assets but do not control them. Blockchain, cryptocurrency, and DeFi devices change this paradigm. GameFi’s economic approach of gaining money while playing has given cryptocurrency a new use case. GameFi’s in-game currency may be exchanged for cryptocurrency and cash. Players may buy in-game NFTs and trade, rent, or sell them to make money. With around 1 million active players, GameFi has unveiled a new use for cryptocurrency to the public. Ganache, Ganache is sometimes referred to be a personal Blockchain, yet it is more akin to a Bitcoin/Ethereum emulator. It is a component of the Truffle Suite that simulates the blockchain in order to test applications. This enables users to verify that their code is compatible with actual blockchain transactions. Ganache
82
Geth prospective gems is difficult since they have no specific characteristics. Market size, volume, supply, and fundamentals must be considered while examining prospective gems. As more individuals find a gem, their trade volume rises. Only few people perceived Bitcoin as a gem when it was originally presented, but those who did were rewarded. Generative Art, Generative art is art created by an autonomous system. An autonomous system is a non-human system that can autonomously choose artwork aspects that would normally be decided by the artist. In some situations, the human creator claims the generating system embodies their creative concept, while in others, the system becomes the creator. Generative art commonly refers to algorithmic art and synthetic media, but artists may also use chemistry, biology, robotics, smart materials, manual randomization, mathematics, data mapping, symmetry, tiling, and more. Genesis Block, A genesis block is the first block (Block 0 or Block 1) in a blockchain and is normally hardcoded into the blockchain’s application software. Genesis blocks are important because they constitute the blockchain’s basis and frequently include hidden meanings. Bitcoin’s genesis block carries the now-famous line The Times 03/Jan/2009 Chancellor on verge of second bank rescue – a reference to worsening financial circumstances and the motivation for launching cryptocurrencies like Bitcoin and Ethereum. The Bitcoin genesis block is fascinating since the following block was timestamped six days later (the average time is 10 minutes). Geotagged NFT, Geotagging is the addition of accurate global location information, including specific coordinates (latitude and longitude), to digital commodities. With the advent of geotagged NFTs, art collectors may now own more than just the 3D representation of the artwork. It assigns geographical locations to NFTs of e. g., well-known street art from across the world. Geotagged NFTs show ownership while preserving the original artwork’s beauty. Artists may monetize their work by producing a digital reproduction of the original piece. Similarly, art aficionados may own their preferred works of art regardless of their location. Geth, Geth is one of Ethereum’s three primary code components. Geth lets developers establish accounts and change Ethereum network
2.0 network launches Ethereum’s gas issue is resolved. Gas Station Networks (GSN), GSN is a decentralized network of Ethereum relayers. It lets users construct decentralized apps (dApps) that offer transaction payment, so users do not require Ether or ETH to pay for gas, boosting user acquisition and experience. Instead of charging users, GSN relayers charge the receiver and contract. Originally established by TabooKey, the GSN now includes numerous Ethereum firms, protocols, and platforms that want to enroll people to Ethereum apps. Some GSNs enable users to pay the platform or receiver off-chain in advance using conventional ways like as credit card, with each GSN use subtracting from their platform balance. Even though it may seem like an expensive investment, GSNs continue to survive since their fees are still far less expensive than the capital necessary for conventional marketing, user acquisition, and onboarding new customers. Gas Wars, Are auctions for priority inclusion in blockchain transactions. Priority positions may be expensive when demand is strong. A gas war thus is a bidding battle for a crypto commodity between blockchain address transactions raising the gas fees with those who cannot afford the increase being excluded. Sometimes the gas battle earns more than the real asset. When the Time magazine offered 0.1 ETH NFTs in 2021, some customers were said to have paid four times as much on gas as for the NFTs. Gavin Wood, Gavin Wood co-founded Parity Technologies, a blockchain business that aspires to establish a new foundation for decentralized programs (dApps), and the Web3 Foundation, an internet decentralization advocacy organization. He was also Ethereum’s CTO alongside Vitalik Buterin (CTO) responsible for developing the first functional Ethereum implementation and designing and creating Solidity, Ethereum’s smart contract programming language. After leaving Ethereum in 2016, he focused on Polkadot, a multi-chain blockchain ecosystem that debuted in 2020 to assist developers create interoperable dApps. His goal is to integrate private and public blockchains to enable transactions across projects simpler despite network variations. Gems, Gems are cheap, low-cap cryptocurrencies or coins with great potential. Identifying
83
GitHub with other smart contracts enables corporate utilization. Gold-Backed Cryptocurrency, A gold-backed cryptocurrency is a derivate digital asset whose value is essentially supported by the gold price equivalent. Each gold-backed cryptocurrency specifies a single token as being worth a particular number of grams or troy ounces of gold, which must be held in the company’s reserves/ vaults or by a trusted custodian. Gold-backed tokens may be redeemed for gold cushioning it against price volatility. Most gold-backed cryptocurrencies are ERC-20 tokens. Golden Cross, When a slow-moving average is crossed by a quicker moving average, a golden cross is generated. The first stage signifies the end of the downtrend, the second stage occurs when the 50-day moving average crosses the 200-day moving average, and the third stage represents the uptrend. Other instances of golden crosses may be seen in the combination of 5-day and 15-day moving averages. Experienced traders recommend not using the golden cross as the only trading signal, but rather as a component of a strategy. Google Authenticator, Google Authenticator produces time-based one-time codes for mobile phones. Google Authenticator maintains account security by requesting a time-sensitive code from the app on a smartphone. Even with login credentials, a hacker cannot access an account without the phone. Google Authenticator’s two-factor authentication approach prevents the SIM card from being hijacked. Time-based security reduces additional user concerns. Google 2FA is recommended when opening a cryptocurrency exchange account or to secure wallets and tokens. Google Verification Code, Google verifies the identification by sending a brief numeric code via phone or email. If people establish a new Google account, change their password, or connect into a different computer or device, they may require a verification code. Google verification codes protect accounts from fraudsters and hackers. Governance, All cryptocurrency ventures need good governance. Cryptocurrencies have a liberal governance structure as decentralized blockchains. On-chain governance is a blockchain voting framework. With on-chain governance, a blockchain project’s voting and
code rapidly. It uses Google’s Go programming language to modify and change blockchain code. Google’s Go programming language is used to create the Ethereum network, and Go Ethereum is used to produce, edit, and alter Go code for the blockchain. Ethereum’s blockchain and protocol also use Python and C++. Geth makes running a complete Ethereum node easy and accessible. Geth’s user-friendly interface lets developers establish accounts and change Ethereum network code rapidly. As an opensource project, Geth lets developers fix flaws and enhance the Ethereum network. Developers get free read-and-write access to all Ethereum source codes on Github. Over 400 individuals have contributed to Ethereum’s blockchain code. GitHub, GitHub is a popular site for developers to submit code sequences. GitHub promotes collaborative collaboration and allows developers to work concurrently. Microsoft bought GitHub in 2012 after utilizing it to publish open-source products including Windows Calculator and Visual Studio. GitHub hosts several prominent blockchain projects. Users have used GitHub’s servers to mine cryptocurrency for free. Only registered users with an active GitHub account may edit. However, open-source GitHub projects are vulnerable to assaults. GM, If one just gets started in the web NFT, crypto, and 3.0 world, they may be wondering what GM stands for. It is simply shorthand for good morning. GMI, The abbreviation GMI for Going to Make It stands for the community support that helps make NFTs, cryptocurrencies, and the metaverse what they are. This abbreviation is often used by those who are attempting to think positively. Especially, when there is a ICO or sale or when a new NFT collection is out. Goguen Phase, The Goguen phase is the third and final phase of the Cardano platform. The purpose of this phase was to enable developers to build decentralized applications on top of Cardano. It has also made Cardano more approachable to wider audiences through dApp development which does not require prior technical knowledge. Plutus is Goguen’s greatest achievement as it leverages functional programming language Haskell to execute and build smart contracts. Its flexible syntax makes it accessible to all users. Its interoperability
84
Gwei to behavioral biases, consumers are lured to rising asset values. He said the impact is amplified by herd mentality, which encourages others to want rapid achievement. The notion says there is always a bigger idiot to sell to. Meme coins illustrate this hypothesis in the digital assets market. Doge and Shiba Inu are two famous meme currencies that have generated multi-millionaires and billionaires. As more examples of millionaires emerge, bigger idiots feel they may be next. But, some meme currencies, like the Squid Game coin based on a South Korean Netflix serial, are blatant scams. Green Candle, Technical analysis uses candles to depict and forecast stock prices. Green candles have varied meanings. First, compare the candle’s size to the last. If it is larger and higher than the preceding candle, bulls might have won and are driving the price upward. If this occurs consecutively (i. e., a series of huge green candles), a bull run has generally begun in the market. Also, on needs to c heck a green candle’s volume. If there is not much volume behind a green candle, it might be a retracement before another run down. Group Mining, Multiple persons or organizations pool their computing resources for group mining. Group miners share benefits and reduce security risks to mine more economically. In group mining, everyone pools their processing power (hash rate) and shares block rewards. A group miner’s payment is determined on his/ her proportionate processing power. Solving a mining challenge as ana individual first normally is like winning a mini-lottery whereas group mining guarantees all miners steady, determinable payouts. However, pool administrators take a portion of mined coins to operate the pool, therefore payment rates vary. They are further differentiates by their reward kinds (frequency and nature) and whether they hold transaction fees and payout solely block rewards, or whether they enable merged mining, where two cryptocurrencies with comparable hash types may be mined concurrently for higher profit. GSN, → “Gas Station Networks“ Gwei, Gwei is portmanteau and a tiny unit of Ether (ETH). A gwei (giga wei) is 1,000,000,000 wei, Ether’s smallest unit. One gwei is 10-9 ETH or in other words 1 ETH equals 1 billion gwei. Gwei is an easy method to compute miners’ gas expenses. Gwei’s
decision-making procedures are built in the chain. On-chain governance is better aligned with cryptocurrencies’ decentralization. Offchain governance is another cryptocurrency decision-making mechanism. This governance mechanism includes developers, miners, users, and corporate backers. They accept or deny revisions through email and social media. Both governance methods have pros and cons, but on-chain voting is gaining favor. Governance Token, Governance tokens enable holders to affect a protocol’s future. Governance token holders may propose new features and change the governance structure. Smart contracts instantly apply modifications made, verified, and voted on using on-chain governance tokens or the project’s maintenance staff applies the modifications or hires someone to. Governance tokens provide user control, which is consistent to the original bitcoin ideas of decentralization and democracy. Decentralized autonomous organizations (DAOs) allow users manage system development. Maker is an exemplary governance token (MKR) that lets its holders vote on the decentralized finance (DeFi) mechanism that DAI operates on. GPU , → “Graphical Processing Unit“ Graphical Processing Unit (GPU), It is a computer chip that produces e. g., 3D pictures on computers and is more typically known as a graphics card, but has proven effective for mining bitcoins. Graphics Card, → “Graphical Processing Unit“ Gray Swan Event, Gray swan events are expected but rare and have a domino effect. After it happens, explanations acknowledge its projected low likelihood but stress on human mistake in judgment. The coronavirus pandemic is one example. Although unlikely, such an incident is never impossible. Hacking a centralized exchange (CEX) is a crypto gray swan incident as nothing is 100 % safe, leaving hacking room. It is necessary to balance risk management with gray swan protection. Ignoring it may cost a lot. Contingencies may assist to tackle gray swan events with individuals and groups creating a crisis-response strategy. Greater Fool Theory, Professor Burton Malkiel initially proposed the greater fool hypothesis, which says investors may purchase overpriced equities and yet earn money. Due
85
Hacking will decline to 3.125 BTC each block. Halvenings make emission schedules more predictable since circulation time may be calculated. Nearly all non-premined coins have decreasing staking or mining incentives. New initiatives sometimes debut with the smallest possible supply to boost their initial value. Hard Cap, A hard cap is the restriction set by a blockchain’s code on the maximum supply of a cryptocurrency. A hard cap prevents further creation/circulation of its units. It is beneficial because it generates scarcity, which boosts token value. To avoid this restriction, a cryptocurrency must modify its specifications, generating a new one. The project’s community and crypto analytics websites closely monitor a hard cap. It may be adjusted by code flaws (like the Bitcoin 184M inflation problem, which violated the 21M limit before being repaired), by developers in unusual conditions, and by malevolent activity (providing in code for additional minting for illegal profits and extracting most value by earning extra tokens). Hard Fork (Blockchain), A hard fork is a scenario in which a chain splits into two chains with distinct parameters from the original chain. The histories of the two chains are distinct, and no behavior beyond the fork will affect the other. Hard forks may occur inadvertently owing to blockchain bugs/errors or on purpose e. g., due to disagreements in the cryptocurrency community. Hard Fork Combinator, Hard forks break a chain into parallel protocols and the new chains lose their prior history. After a hard fork, a hard fork combinator merges pre- and post-upgrade procedures to prevent disruptions or restarts. IOHK Foundation created a hard fork combinator for the Cardano (ADA) blockchain that enables various protocols to appear as one ledger so nodes do not have to update simultaneously. When Cardano upgraded from Byron to Shelley in July 2020, a botched hard fork would have destroyed Cardano’s wealth. With the combinator, the shift from Byron to Shelley was flawless. Hard Peg, A hard peg is an exchange rate regime in which the value of one currency is tied to another. The exchange rate between the Chinese Yuan and the US dollar was e. g., maintained at 8.28 per dollar. A hard peg restricts the amount of movement permitted in respect to the pegged currency. A benefit of hard pegs is that
nickname is atoshi“ after Claude Shannon, the founder of information theory. Ether (ETH) has several basic units, each named after a contributor to the project. 1 wei (named after crypto godfather Wei Dai). 1 kwei (kilo wei, is named baggage after Charles Babbage) is 103 wei. 1 mwei (mega wei) is named lovelace after Ada Lovelace. Nick Szabo‘s twei (tera wei) is 1012 wei and named szabo. 1 pwei (peta wei named finney after Hal Finney) = 1015 wei and, of course, 1 ETH is 1018 wei called buterin. Hacking, Hacking is the act of manipulating or compromising computing devices or systems. There are several types of hacking, some for the greater benefit and others for malicious reasons. Hackers have long wreaked havoc on the crypto business, stealing billions of dollars every year from exchanges, custodial services, and wallet software users. Mt. Gox (2014), Coincheck (2018), and Bitfinex (2017) are among the most famous crypto hacks in history (2019). Hal Finney, Hal Finney pioneered Bitcoin and received the first BTC transaction. Satoshi Nakamoto transferred 10 BTC to Hal Finney’s address after he tweeted Running bitcoin in 2009. Finney utilized and improved the Bitcoin protocol before Satoshi. Some in the crypto world believe Finney is the real Satoshi Nakamoto because a Dorian Nakamoto from his neighborhood inspired the alias. Andy Greenberg accepted Finney’s denial of being the Bitcoin creator when he produced their email communications and BTC wallet. Finney worked on encryption software for the PGP Corporation and the first remailer for Tor, an anonymous browser. Finney died of ALS on August 28, 2014, yet his work is still acknowledged as one of the IT industry’s most famous and influential innovators. Halving, A blockchain halving or halvening reduces block subsidies or transaction rewards by half. It slows the pace of supply entering circulation every moment, increasing scarcity by creating fewer coins/tokens. These occurrences are preprogrammed and known. Bitcoin payouts drop every four years. Since 2Q20, block rewards have dropped from 12.5 BTCs to 6.25 BTCs (900 BTCs daily). The incentives will diminish every four years until 2140, when the final Bitcoin is mined. 2020 was Bitcoin’s third halving, after 2016 and 2012. Each halving led to a price rise owing to scarcity and miner supply constraints. Bitcoin Cash and Litecoin also halved. In March 2024, Bitcoin mining payouts
86
Hedge Contract Hash Function, Any function used to convert data of variable size to data of a defined size. Hash Rate, Hash rate or hash power is the aggregate computational power of a certain cryptocurrency network or the computing power of a single mining equipment on that network. Any cryptocurrency that can be mined, such as Bitcoin (BTC), is maintained by its own network of miners. The hash rates of various devices, such as CPUs, GPUs, and ASICs, vary based on their processing capability. Hashed Timelock Contract (HTLC), A hashed timelock contract (HTLC) is a hashed timelocked escrow. The receiver or beneficiary must certify receipt by a certain date or timeframe. If not, the payer might request a refund. HTLC allows e. g., Bitcoin Lightning users to transact across linked channels. HTLC solves the problem of trust since neither side must trust it. Hashlocks and timelocks therefore decrease counterparty risk. Hashgraph Consensus Mechanism, Hashgraph is an upgraded version of the consensus process underlying a blockchain technology. To validate transactions, a hashgraph employs a protocol of node communication rather than the processing capacity of massive networks. When a user conducts a transaction, it is recorded in a block that is subsequently distributed over the blockchain. The primary distinction between a hashgraph and a blockchain is that a hashgraph interweaves blocks into the ledger, which then continue to exist forever. Hashing Power, → “Hash Rate“ HBTC, → “Huobi BTC“ Hedge Contract, The process of holding a position in one market to balance anticipated losses or profits in another market is known as hedging. It helps to avoid big losses by decreasing the likelihood that an unanticipated move would result in a loss that exceeds the initial investment. Additionally, hedging may be used to hedge against currency swings and other risks. A hedge contract is like a forward contract. It is an agreement between two parties to buy or sell an agreed quantity of a particular commodity at a set price on a given date in the future. Hedge contracts protect against price fluctuations. Businesses employ them as part of their risk management approach, as do commodity producers like farmers whose crops may lose value in a poor harvest. They facilitate the trading
they are straightforward and transparent: the amount of a (crypto)currency in circulation is known. Countries engage in currency pegging when they set the value of their currency to that of another nation. It may be useful in several ways, including the elimination of ambiguity over variations in the nation’s money supply. However, it might be difficult to maintain a hard peg in challenging economic situations. Hardware Security Module, A hardware security module (HSM) is a computer with one or more processor chips used to safeguard digital keys, encrypt data, and strengthen cryptographic authentications. HSMs secure data verification and transactions in organizations and must be certified according to the Federal Information Processing Standard (FIPS). It must employ bespoke hardware, a secure OS, encrypted data, and secure networking. General-purpose, transaction/payment, or cloud-based HSMs exist. The first category includes data protection and cryptocurrency wallets. Transaction/payment HSMs enable safeguard PIN technology and electronic financial transactions (ETF). Microsoft Azure and Google Cloud are exemplary providers of cloud-based HSM. Hardware Wallet, Hardware wallets resemble USB sticks and store cryptocurrencies. A hardware wallet contains public and private keys to monitor a user’s digital wealth on blockchains. The hardware wallet just offers access to the actual money, not storage. Hardware wallets are often referred to as cold wallets or cold storages. This cold storage protects against malicious software. Hardware wallets need a pin, a seed phrase, and physical protection. A hardware wallet permits pin resets through a seed phrase, which must be learned or securely stored after setup. Even with their strong security, they are simple to use since applications let non-tech-savvy consumers transfer payments. Trezor, Ledger, KeepKey, CoolWallet, Ngrave, and SafePal Hardware Wallets support various cryptocurrencies. Hash, Essentially, hash algorithms are the foundation of all cybersecurity methods. Through hashing, data of any size may be quickly encrypted and turned into a single, fixed-length hash string. Hashing is essential to the operation of blockchain projects, particularly cryptocurrencies. Without it, rapid record addition to the blockchain would not have been conceivable.
87
Hidden Cap ticipate in a dynamic mining pool. Honeyminer provides users their earnings directly after each session in Bitcoins. All rewards awaiting withdrawal are maintained in cold storage, which is one of Honeyminer’s key features. Hostage Byte Attack, A Hostage Byte Attack is a distributed denial of service (DdoS) attack launched against a user whose data was saved on a rogue storage node. If the user does not pay a ransom, the storage node refuses to release the user’s data. The attacker may even threaten to erase crucial data from the victim’s device if they do not pay. Strong authentication systems and access constraints are the optimal means of preventing a hostage byte assault. Hosted Wallet, A wallet administered by an external service provider. Hot Storage, The storing of private keys in an online repository, which enables cryptocurrencies to be accessed more quickly. Hot Wallet, A cryptocurrency wallet linked to the internet for hot storage of cryptoassets, in contrast to an offline, cold wallet with cold storage. Howey Test, The Howey Test determines whether an asset is a security for the US government. If an asset passes the Howey Test, disclosure and registration laws apply. The Howey Test comes from SEC v. W. J. Howey Co. In this court case, a Florida citrus plantation sold investment contracts without registering them with the SEC. The SEC won the court case and established the Howey Test to assess whether financial instruments are investment contracts and hence securities. The Howey Test is increasingly utilized to assess whether crypto assets are securities as the cryptocurrency sector evolves. All Howey-classified tokens must be SEC-registered. HTLC, → “Hashed Timelock Contract“ Huobi BTC (HBTC), Huobi BTC (HBTC) is an asset-backed token rigidly tied at a 1:1 ratio to Bitcoin. Users may anticipate transfer confirmation in five minutes, while it typically takes one hour for Bitcoin. Users may check its performance on Etherscan and check its transparency and verifiability. The goal of HBTC is to utilize BTC as a tool to facilitate the expansion of the DeFi ecosystem. Hybrid PoW/PoS, Hybrid proof-of-stake and hybrid proof-of-work methods permit both
of several commodities, including agriculture, metals, and crude oil. Hidden Cap, Hidden cap is an unknown restriction on the amount of capital a team chooses to raise from investors in an initial coin offering (ICO). The goal of a hidden cap is to level the playing field by allowing smaller investors to participate without major investors realizing the total cap and altering their investments accordingly. Hierarchical Deterministic Wallet (HD Wallet), A wallet that uses the Hierarchical Deterministic (HD) protocol to enable the formation of many crypto-wallets from a single master seed utilizing twelve mnemonic phrases. HIFO, → “Highest In, First Out“ Highest In, First Out (HIFO), With highest-in, first-out (HIFO) method, investors sell products or commodities with the greatest cost basis first. Depending on market trend, the consequences are like LIFO or FIFO. Selling the highest-cost basis coins first may lead to huge tax savings. HIFO may be used to minimize taxes since it leads to low capital gains and high capital losses. The IRS guideline says that everyone may utilize LIFO or HIFO if they have the following records: When each unit was bought. The basis and each unit’s fair market value when purchased. Each unit’s sale, exchange, or other disposition date and time. When a unit is sold, traded, or disposed of, its fair market value is the money or property received. HODL, → “Hold on for Dear Life“. Hodlers (HODL), A form of passive investing strategy in which an investment is held over an extended length of time, regardless of price or market fluctuations. The expression initially gained notoriety owing to a misspelling in a Bitcoin forum; it is now popularly used to mean Hold on for Dear Life. Honeyminer, Honeyminer is a cryptocurrency-mining program. It leverages GPU and CPU resources to mine the most lucrative cryptocurrencies, switching every 10 minutes. Honeyminer can mine several currencies after calculating the most profitable and easiest one. Honeyminer is not an open-source platform, hence its activities are not transparent. The program also lets users mine cryptocurrency on their own PCs or laptops. Users launch the program while their GPU is not in use to par-
88
Infinite Mint Attack ny) from altering, replacing, or falsifying data stored on the network. Immutable, Blockchain s are basically immutable. Before passing on data on a blockchain, all nodes must agree on its authenticity. In a typical database system, data may be corrupted or destroyed whereas all nodes on a blockchain must embrace any data updates with the data in addition being hashed. Therefore, blockchains are immutable and do not lose data. Immutability improves security, data integrity, auditability, and fraud avoidance. Impermanent Loss, Impermanent loss reflects liquidity providers’ transitory loss of cash due to trading pair volatility. This shows how much more money someone would have had if they had not provided liquidity. One asset may be a stablecoin like DAI, while the other may be ETH. Imagine a service has to provide equal liquidity in DAI and ETH, but ETH’s price rises. The price of ETH in the liquidity pool no longer reflects the actual world, creating an arbitrage opportunity. Other traders will purchase cheap ETH until the DAI to ETH ratio is balanced. A liquidity provider may have more DAI and less ETH after arbitrage. While impairment loss compares present asset value to what they would be worth in an exchange, permanent loss occurs when investors withdraw their liquidity. Infinite Approval, Programming smart contracts with infinite approval is often problematic. A smart contract may access a limitless number of tokens from a user’s wallet using this programming feature. Bancor’s smart contract was programmed this way with first-time users having to authorize the smart contract to withdraw an infinite number of tokens from their wallets. Its smart contracts featured a vulnerability that might have enabled a hacker to grab all the user-authorized tokens. Bancor’s programmers detected before bad actors stole the tokens and adjusted their systems to only request the required quantity. Infinite Mint Attack, An infinite mint attack happens when a hacker or unwelcome party mints too many tokens in a system, debasing their value. Attackers then dump all minted tokens on the market, crashing the price taking away millions of dollars in tokens quickly. Due to security breaches, hackers may exploit flaws and other coding vulnerabilities in blockchain systems. E. g., Cover protocol hackers exploited shield mining contracts to earn illicit crypto
consensus distribution mechanisms on the network. This strategy intends to combine the security of PoW consensus with the governance and energy efficiency of PoS. Hyperinflation, Hyperinflation is the quick, excessive, and out-of-control rise in overall prices within an economy or country. Inflation is the rate of increase in the cost of goods and services, while hyperinflation is an inflation rate that often exceeds 50 percent each month. It may be the result of an excessive money supply or an imbalance between aggregate demand and aggregate supply. Although hyperinflation is uncommon in Western economies, it has happened in China, Germany, Russia, Hungary, and Georgia. Hyperledger (Hyperledger Foundation), Linux Foundation’s Hyperledger is an umbrella project for open source blockchains and blockchain-related software. The Hyperledger Foundation intends to promote the widespread use of blockchain technology by businesses. One of the primary objectives of the project is to develop an enterprise-friendly blockchain-based ecosystem. As interest in blockchain technology increases, the foundation is extending its reach into new sectors and introducing several new use cases. I Owe You (IOU), An IOU is a document that explicitly outlines and acknowledges that there is an amount of debt owed between two parties. With the rise of cryptocurrencies, a new form of IOU has arisen: IOU tokens that allow traders to create tokens that represent debt and trade between different blockchains easily. An IOU token performs the same service as an IOU notice – it exists to denote a debt relationship between parties. IBO, → “Initial Bounty Offering“ ICE, → “Intercontinental Exchange“ ICO, → “Initial Coin Offering“ IDE , → “Integrated Development Environment“ IDO, → “Initial Dex Offering“ IFO, → “Initial Farm Offering“ IGO, → “Initial Game Offering“ Immutability, Immutability is one of Bitcoin and blockchain technology’s defining characteristics. Immutable transactions prevent any organization (such as a government or compa-
89
Inflation (DEX). IDOs may be built for cryptocurrencies, music albums, and even aether-powered warships. In an IDO, a project makes the first public launch of a token on a DEX in order to acquire capital from investors. Like conventional startups, DEX ventures get early funding from private investors. Initial DEX investors never control the project, unlike an IPO. IDOs feature quick liquidity, immediate trading, and cheaper listing expenses than ICOs and IEOs. Initial Exchange Offering, Initial exchange offers (IEOs) are fundraising events in which cryptocurrency startups raise capital via a trading platform. This contrasts with an initial coin offering (ICO), where interest is generated on the company’s website. The greatest benefit of IEOs is enhanced trust and openness. As the token sale is managed through a licensed cryptocurrency exchange, the likelihood of fraud is reduced. Despite of being more credible than ICOs, IEOs also normally incur higher costs for start-ups in return for the increased safety and visibility. Initial Farm Offering (IFO), Initial Farm Offering (IFO) is a style of financing that enables new DeFi ventures to generate funds via pre-sales events. IFO is the successor of the initial coin offering (ICO), a strategy used by cryptocurrency startups to generate funding via crowdsourcing. There are two typical forms of IFO occurrences: Unrestricted Sales (users may stake as much BNB and CAKE tokens as possible for a set fee) and basic Sale (a certain quantity of tokens may be wagered with no participation costs). To join an IFO, people must first create an account on one of the DEXs that supports this function. Initial Game Offering (IGO), Launchpads for Initial Game Offerings (IGOs) are a new trend in the crypto realm. The platform hosts gaming projects using NFTs or tokens as in-game cash and awards. Axie Infinity leads the group with sales of nearly $1.1 billion USD in 2021. Currently, two IGOs are active on the GameFi platform: $KABY Pool and Deathroad IGO. Investing in IGOs and via IGO launchpads is comparable to other investment choices. One must determine if the IGO platform has a solid reputation and plans to accommodate future large gaming ventures. A launchpad with a history of successful initiatives might be more likely to generate significant returns on most of its prospective endeavors.
payouts. The hacker exploited 40 quintillion Cover tokens, causing its price to drop by 97 %. The attacker sold 11,700 coins through 1inch and took $5 million. Multiple smart contract audits are the strongest defense against endless mint assaults, but even audits do not ensure protocol security. Inflation, A rise in prices and depreciation of money. Inflation is when a currency loses value over time, causing the price of products and services to increase. Due to its restricted supply, Bitcoin and other cryptocurrencies have modest, predictable inflation. In general, inflation raises interest rates and reduces liquidity. On the other hand, when interest rates are low, money is cheap, and liquidity is strong, more people invest in more speculative assets like cryptocurrencies or NFTs. Infringement, → “Copyright Infringement“ or “Trademark Infringement“ Initial Bounty Offering (IBO), Unlike initial coin offers, initial bounty offerings (IBOs) reward individuals with free or reduced tokens for their work. An IBO might include enthusiasts who devote their time and talent to a project by undertaking translation, marketing, business development, or human resources activities. This means they are emotionally involved in a project and more motivated to see it succeed, which may help develop a community. Those who obtain tokens may cash them out after they are listed on an exchange or hold on to them in hopes of a price increase. After an ICO, IBOs may be used to get code feedback or to promote the coin. In addition, bug bounties may reward coders who find blockchain issues. Zcash and Ethereum offer bounty schemes to reward blockchain developers. Initial Coin Offering (ICO), Initial Coin Offering (ICO) is a company’s effort to raise capital for a new software, service, token, or cryptocurrency. It is considered the cryptocurrency equivalent of initial public offerings (IPOs). Concerns that certain ICOs might be used by con artists and market manipulators have prompted criticism of some ICOs. Currently, there are around 9,300 cryptocurrencies on the market down from the all-time high of 10,400 in February 2022. Initial Dex Offering (IDO), Initial DEX Offerings (IDOs) are tokens that represent any asset type maintained on a decentralized exchange
90
Instamine slight variances exist: ITOs concentrate on delivering tokens with proven (or untested) intrinsic usefulness instead of funding a new coin. This might involve offering investors access to a platform through subscription, with token holders accessing unique ecosystem features. A lower-fee exchange is one example. ITOs also involve tokenization, not merely crowdsourcing. Despite being used interchangeably, coins and tokens are different in the crypto industry. Bitcoin, XRP, and Ethereum are coins with their own blockchains. Tokens function on an existing blockchain, and assets employ Ethereum’s ERC-20 standard. ICOs fell out of popularity in 2021 when projects were exposed as frauds and others dropped in value soon after debut. INO, → “Initial NFT Offering“ Input-Output Hong Kong (IOHK), IOHK is a software development business specializing in the creation of novel blockchain systems for financial services. IOHK is now a worldwide corporation with a remote staff of over 400 individuals from over 50 countries. Charles Hoskinson and Jeremy Wood are its founders. It is considered a blockchain research and development organization, giving commercial services to businesses interested in distributed ledgers, currency creation, and working in many sectors. Insider Trading, Insider trading is one of the most infamous violations for which investors may be punished on the stock market. For a deal, whether purchase or sell, to be called insider trading, the participant must be in knowledge of non-public, undisclosed, or private information. In the realm of cryptocurrencies, insider trading is also possible, although it is not as strictly controlled. For instance, if a Bitcoin whale announces his intention to sell a significant percentage of his holdings, this might be seen as a hint that the token’s price would decline. He will not, however, be convicted of insider trading. Instamine, In contrast to the progressive distribution of Bitcoin’s supply between now and 2140, instamining entails mining a significant fraction of a project’s total mineable coins or tokens in a compressed period. Consequently, the coins may be allocated rapidly and unevenly among investors. When a cryptocurrency undergoes an instamine phase, a high quantity of the digital asset is often made accessible early
Initial NFT Offering (INO), Initial NFT Offering (INO) is a novel method of cryptocurrency crowdfunding. INO entails presenting a collection of NFTs for sale on launchpads or markets. INOs have lower entry hurdles than releasing fungible tokens. This allows a greater variety of audiences to recognize both large and smallscale efforts. Owning a verifiably rare NFT of a collection creates a tight community as a limited-edition NFT is simpler to identify than a tiny fraction of a fungible token supply. NFTs have built-in ownership verification to prove ownership and holders may become project evangelist as some might see NFT ownerships as a bragging right, particularly when utilized as PFPs (profile pictures). Initial Public Offering (IPO), A company’s initial public offering (IPO) is one of its most significant developmental milestones. The initial public offering (IPO) occurs when a company goes public on a stock market and investors may acquire shares of the firm. While the advantages are apparent, a firm may only declare an IPO after passing a thorough Securities and Exchange Commission review (SEC). Prior to the announcement of an IPO, firms are deemed private, limiting the number of investors who may contribute to the company and hold shares. While being private is advantageous for smaller firms that do not want to be exposed to higher risk, initial public offerings (IPOs) are tremendously advantageous for developing organizations. Before pursuing an IPO, a firm should have a private value of around one billion dollars. Initial Stake Pool Offering (ISPO), ISPO is a new fundraising mechanism that provides more benefits than IDOs, ICOs, and other methods. Cardano’s ISPO model is unique as project developers may launch staking pools for ADA token holders. ISPOs are more secure than other financing choices as users give up ADA benefits for project-native awards. The staked ADA remains theirs and is stored in non-custodial personal wallets. Furthermore, there is no exclusivity period in an ISPO. Users not only maintain complete ownership of their assets, but also have the freedom to use their ADA as they see fit, whether it for unstaking, selling, trading, purchasing NFTs, or any other purpose. Initial Token Offering (ITO), ITOs and ICOs are frequently used interchangeably. Some
91
Instant Settlement Network Layer liquidation price is lower than the bankruptcy price. When developing, establishing, and maintaining a leveraged trading exchange, operators and protocol designers must carefully consider insurance fund health. Integrated Development Environment (IDE), An Integrated Creation Environment (IDE) is a tool that facilitates application development. Almost every IDE contains a text editor for composing and modifying source code. Some tools enable to drag and drop front-end components, but most offer a minimal interface that emphasizes syntax. Code completion tools locate and add common code components. These features reduce errors and save coders time. Compilers transform programming languages into binary code. Mobile app developers need a platform designed specifically for mobile app development. Android Studio and Xcode are Integrated Development Environments (IDEs) for mobile development on the Android and iOS platforms, respectively. A SaaS IDE may perform lengthy processes without using the processing capabilities of a local computer. Frequently, cloud-based IDEs are platform-agnostic, enabling connecting to a range of cloud service providers. Intellectual Property (IP), Intellectual property (IP) refers to creations of the mind, e. g., inventions, know-how, software, literary and artistic works, books, films, music, designs; symbols, names and images used in commerce. IP is protected in law by, for example, copyright, patents, and trademarks, which enable people to earn recognition and financial benefit from what they invent or create. By striking the right balance between the interests of innovators and the wider public interest, the IP system aims to foster an environment in which creativity and innovation can flourish. Treating IP rights as an asset might be advantageous as a firm expands. They could be sold, licensed, or assigned to partners to facilitate the expansion of income sources. Intelligent Automation, Intelligent automation systems are meant to replicate human decision-making, which enables them to execute complicated jobs and adapt to changing circumstances. They are capable of data analysis, decision making, and action taking based on predefined rules and algorithms. Intelligent automation systems may be incorporated into a variety of business processes and systems, such
on. Instamining should not be mistaken with pre-mining, despite the similarities between the two processes. Some researchers assert that instamining has been associated with fraudulent conduct, while others assert that it might result in unfair competition. Instant Settlement Network Layer, An instant settlement network lets people trade digital assets at scale anytime, anyplace, with real-time settlements. These settlement networks operate on and off-chain, lowering counter-party risks since participants use the same APIs and internet portals. Instant settlement networks resolve transactions in real-time, 24 hours a day, gross and without delay. Each transaction is settled one-by-one to avoid bunching. If the participant’s custody account has enough money, transactions are final, irreversible, and settled instantly. Instant settlement networks allow frictionless transfer of digital assets across blockchains, transforming conventional settling systems without middlemen. Institutional Investor, Institutional Investors are organizations or legal entities that engage in market transactions on behalf of their customers. In the last decade, institutional investors have significantly expanded their influence and market share. They currently account for over 70 % of the trade activity across most asset classes. Institutional investors are supposed to be more adept and skilled at navigating financial instruments than ordinary private investors. They concurrently administer numerous funds and serve as vehicles for pooled assets. The six main institutional investors are: insurance companies, mutual funds, hedge funds, banks, credit unions, and pension funds. Institutional investor may be limited by their tenets and may prioritize certain investments as e. g., Blackrock partially according to a company’s ESG approach. Insurance Fund, The insurance fund is crucial for cryptocurrency exchanges and protocols. It protects against contract loss in leveraged trading and pays traders who fail to keep their open positions from going bankrupt. Exchange fees, liquidation penalties, and other ways support insurance funds. Leveraged trading positions have liquidation prices and bankruptcy prices. If a position’s liquidation price exceeds its bankruptcy price, it is liquidated and a part of the excess margin is added to the insurance fund. The insurance fund pays the loss if the
92
Internet Layer less rates are fixed to the US dollar or another fiat currency at the time of deposit/borrowing. Intermediary/Middleman/Agent, Utilizing a financial intermediary/middleman/agent provides customers with several benefits, including higher liquidity and better security. Crypto exchanges, investment banks, financial consultants, credit unions, mutual funds, and investment trusts are all examples of intermediaries. Before utilizing an intermediary/middleman/ agent, traders should do their own research and choose platforms with a solid reputation. Internal Transaction, An internal transaction is the result of smart contract logic triggered by an external transaction, which is the transaction transferred from the externally owned accounts (EOAs) to the smart contract. Smart contracts are digital contracts that execute themselves and are business-automated. These transactions modify the state of the blockchain with a single contact possibly resulting in tens or even hundreds of internal transactions. Internal transactions are often maintained off-chain and lack a digital signature. Frequently, consumers are unaware when their address, money, or contract is implicated. International Private Law, Private international law and Intellectual Property Rights (IPR) are the set of legal principles which, in a situation involving relations with foreign legal systems, determine which private law is to be applied by domestic courts or authorities, unless intergovernmental agreements or treaties take precedence Internet Layer, Internet layer is the top layer of the TCP/IP protocol suite. In the OSI model, it corresponds to the network layer. It is responsible for the end-to-end transportation of data across linked networks, using IP addresses and routing information to guide packets to their intended destination. The internet layer delivers services to the transport layer, the layer underneath it. Since 1981, Internet Protocol version 4 (Ipv4) has been extensively used, although it is now suffering issues owing to address depletion. Ipv6 has been available since 1999, although it has still not yet been extensively embraced by Internet service providers. Often referred to as the network layer, the internet layer is responsible for logical addressing and routing. IP addresses are used to provide logical addressing. IP header has a 32-bit source address, a 32-bit destination address, a 16-bit type
as customer service, supply chain management, and finance, to increase productivity, decrease costs, and improve the customer experience. Robotic process automation (RPA), machine learning, natural language processing (NLP), computer vision, expert systems, conversational agents, and intelligent automation platforms are among the most popular types of intelligent automation. Intelligent automation is a useful tool for businesses seeking to automate their processes and enhance their competitiveness. It may assist companies and organizations in reducing expenses, increasing efficiency and production, and enhancing customer experience. Intercontinental Exchange (ICE), The Intercontinental Exchange (ICE) is among the largest owners and operators of financial and commodities markets. ICE was founded with the help of global corporations like as Total, Goldman Sachs, and Deutsche Bank. Initially, ICE concentrated on facilitating the trading of enterprises dealing with energy goods such as crude oil, natural gas, and emissions, but it rapidly broadened its services. In 2018, ICE stated it will create a subsidiary for cryptocurrency trading and Bitcoin-based futures contracts. The new startup, named Bakkt, provides an extensive variety of cryptocurrency-related capabilities. Thanks to a successful merger with VPC Impact Acquisition Holdings, Bakkt announced in 2021 that it will become a publicly listed business. The new firm will be listed under the name Bakkt Holdings, Inc. on the New York Stock Exchange, while ICE will maintain a 65 % economic stake in the corporation. Interest Rates, Interest rates are what a person or financial organization charges or earns for borrowing or investing/lending over time. Not just money, but even a vehicle, a home, or a cryptocurrency might incur interest rates. Credit-borrowers pay interest. This interest rate is commonly expressed as an annual percentage rate (APR), which is the yearly interest paid relative to the entire loan amount. Lenders and investors gain from interest rates as investment profits, such as savings account interest. Unlike conventional finance, cryptocurrency interest rates are more complicated. Due to the volatility of cryptocurrencies, the absolute value of interest might vary even if the APR or APY remains the same. The interest rate is based on the principle, or amount borrowed or deposited. If the principle grows, so will the interest, un-
93
Internet Memes Internet of Value (IoV), The Internet of Value (IoV) focuses on anything on the internet that has monetary value. It symbolizes the next phase of digital transformation, which intends to disrupt the financial system by reducing banks’ influence. IoV is the instantaneous, peer-to-peer transfer of assets that may be represented in monetary terms through the Internet without the need for intermediaries/middlemen/ agents. The embodiment of what is required to sustain Internet of Value is cryptocurrency and the blockchain technology for decentralized currencies. The blockchain does for the exchange of currency what the Internet does for the transmission of information. Internet Service Provider (ISP), Internet Service Providers (ISPs) supply end-users with internet connectivity. ISPs oversee traffic shaping, route optimization, and other related tasks. IPS might be tier 1, 2, or 3 depending on the free physical resources. Tier 1 has ample capacity and does not pay for internet traffic since they are on top. Tier 2 must pay the compensation via transit arrangements with tier 1. Last-mile providers are tier 3 ISPs. They have transit arrangements with a tier 2 ISP and offer internet services without investing in infrastructure. ISPs have existed since the internet began. They provide hosting, access, and info. Interoperability, Blockchain interoperability allows information to be shared across several blockchains. It also allows blockchains to transfer assets without a centralized, custodial exchange. Interoperability is vital to a blockchain’s development since it facilitates cross-platform transactions. More blockchain interoperability solutions are needed to better link Bitcoin and Ethereum. Wrapped tokens are a common alternative, with Wrapped Bitcoin (WBTC) being the most popular. Wrapped tokens need a trustworthy custodian to retain user payments or a safe mint/burn process to maintain crypto asset supply. As an example, AtomicDEX facilitates blockchain interoperability by atomic swaps, which are safe transfers of digital assets done through non-custodial wallets, building decentralized bridges across blockchains and protocols. InterPlanetary File System (IPFS), Due to its adaptability and security, the InterPlanetary File System (IPFS) is becoming an industry standard in blockchain initiatives. With the proliferation of non-fungible tokens (NFTs), IPFS
field, a 16-bit fragment flag, and other options fields. The headers might be Ipv4 or Ipv6. At this layer, the Internet Protocol Security (Ipsec) protocol has also been extensively adopted. Internet Memes, An internet meme uses visuals and words to make jokes or remark on happenings. Memes are digital versions of popular songs, images, and videos. The first viral meme was a computer-animated infant. It is impossible to locate anything crypto-related online without encountering a crypto meme. A crypto meme is a humorous picture that often takes the form of an image, video, or gif. Typically, these communications are directed for crypto fans and investors. Memes are also used by the cryptocurrency community to make fun of those who either do not believe in the potential of blockchain or invest in shitcoins to get wealthy soon. Consequently, a atoshi is a cryptocurrency based on internet jokes purely for entertainment purposes. Internet of Things (IoT), By connecting devices to the internet and training them to interact with one other, a linked network of information from devices – the so called Internet of Things (IoT) can be created. Such a network enables use cases in consumer electronics, healthcare, transportation, manufacturing, energy and environmental management, and other sectors. Analysts expect 75 billion IoT devices by 2025 e. g., connecting a self-driving car’s camera, radar, and Lidar sensors to other automobiles, road infrastructure, and wearable pedestrian devices will enable unparalleled road safety and autonomous driving without human involvement. While IoT and cryptocurrency are only loosely connected, several crypto initiatives concentrate on IoT. IOTA seeks to establish a blockchain that facilitates micro- and regular transactions at zero costs, enabling IoT devices to exchange data and money. Internet of Trust (IoTr), Internet of Trust (IoTr) offers services designed to aid in the formulation of security documentation and facilitate the usage of existing methods to satisfy market needs or legislation. Services include the creation of a set of requirements that a product, solution, or service must meet, as well as the technique used by laboratories to verify compliance. This results in, for instance, Protection Profiles, security standards, guidelines, test strategies, and attack catalogs.
94
Isolated Margin make money. Investments include equities, securities, bonds, mutual funds, and EFTs. These components also exist in the cryptospace. DeFi investors employ crypto-tied investment instruments to produce rewards. They are built exclusively of digital assets and called cryptocurrency funds. Traders may choose among various crypto-tied investment vehicles based on category risk, assets, regulations, and diversification. IOHK, → “Input-Output Hong Kong“ IoT, → “Internet of Things“ IoTr, → “Internet of Trust“ IOU, → “I owe you“ IoV, → “Internet of Value“ IP, → “Intellectual Property“ IP Address, IP addresses are numeric identifiers that are allocated to devices connected to the internet or a local network. These identifiers provide localized information and facilitate accessibility. Static and dynamic IP addresses are the two kinds of IP addresses. Dynamic IP addresses are not user-specific. Internet service providers provide unique identifiers to each connected device, which are reassigned when a device loses internet connectivity. This regular rotation of IP addresses makes it more difficult for hackers to compromise your network interface. Static IP addresses are used mostly by enterprises who operate their own servers and are consistent. Since the internet and crypto boom, the number of internet-connected gadgets has increased tremendously. IPFS, → “InterPlanetaryFileSystem“ IPO, → “Initial Public Offering“ Irregular Time Series Decomposition, The irregular component (or remainder) captures everything which is not included in either of the other components. It is the random fluctuation (non-systematic) in the time series, which cannot be explained by the other components. Isolated Margin, Isolated Margin refers to the margin balance associated with a single trading position. Isolated Margin mode lets traders control risk by limiting margin for selected trades. Each position’s allocated margin balance is adjustable. The Isolated Margin amount can be adjusted for open positions. Allocating more margin to an Isolated Margin trade helps avoid liquidation. After a trade has been opened, the
has become a crucial tool for NFT exchanges. IPFS employs a content addressing technique to identify the information requested by the user, which is one of its primary benefits. It focuses on relevant content keywords to get the desired information, rather than searching for the precise place in which it is stored. Because of its adaptability and security, IPFS is becoming an industry standard for blockchain applications. In-the-Money/Out-of-the-Money, In conventional investing on the stock market, options trading is one of the most often used methods that enables traders to wager on positions linked to a stock’s price. In-the-money (ITM) and out-of-the-money (OTM) are terms used to describe the type of position a trader takes in terms of the current price of an asset or cryptocurrency. While cryptocurrency trading differs greatly from conventional stock market trading, several trading techniques and tools are applicable to both markets. ITM and OTM are two of the most significant trading techniques, which is why they have been included in cryptocurrency trading. Intrinsic Value, In the realm of finance, assets have both a current value and an intrinsic value. The intrinsic value of an asset is not dependent on its previous performance, but rather on a complex collection of variables that may influence its long-term valuation. However, analysts and brokers possess complex algorithms to determine intrinsic values. In the realm of cryptocurrencies, it may be difficult to determine the intrinsic value of a new project, token, or coin. Invest, Investing is the practice of placing money in financial schemes, stocks, real estate, or business endeavors with the expectation of a profit. Investing is the activity of investing capital with the intention of receiving a return in the future. The acquisition of stocks, bonds, real estate, and, within the previous decade, cryptocurrencies constitute an investment. Some sell them quickly with modest improvements in value, while others hang on to them for extended periods of time with the hope that their value would eventually rise. Essentially, an investment may relate to any process that is employed to generate future revenue. Investment Vehicles (Crypto-tied), An investment vehicle is a product or asset used to
95
ISP tegral part of lightning applications, a network built on the Bitcoin blockchain, and the Raiden network, an Ethereum-based infrastructure. JOMO, → “Joy of Missing Out“. Joy of Missing Out, The opposite of Fear of missing out (FOMO) is Joy of missing out (JOMO). People not invested in cryptocurrency (no-coiners) use it to announce their delight at not being engaged in cryptocurrencies, especially after prices fall or a fake ICO is discovered. Jurisdiction, Jurisdiction regulates which authority (or court) is authorized and obligated for which sovereign action. Keylogger, Hackers utilize keyboard tracking software and hardware keyloggers to acquire victims’ sensitive information for personal benefit. Hardware keyloggers come in three types: Hidden camera keyloggers, USB keyloggers that distribute keystroke logger malware, and built-in or cabled keyboard keyloggers. Keyloggers potentially help to steal digital money by logging users’ secret crypto wallet keys or exchange passwords. Using a hardware wallet and two-factor authentication (2FA), which most major crypto exchanges provide, helps lessen this danger. In today’s world, keyloggers have evolved from surveillance tools employed by criminals or governments to a commercial market where anybody may buy a copy. Applications are e. g., system administrators to monitor staff, law enforcement to track offenders, or parents to monitor their children’s internet activity. Kimchi Premium, Kimchi premium is a phenomenon that occurs on South Korean cryptocurrency exchanges and causes the value of some cryptocurrencies or tokens to be greater than on other international platforms. The reason for this is that, as blockchain technology improves and more crypto currencies emerge, global exchanges struggle to keep up with massive surges of trading activity. Nonetheless, minor value disparities always exist in exchanges across the globe. To exploit this phenomenon, traders must acquire cryptocurrencies or tokens on an exchange outside of South Korea and then sell them on a Korean platform. Trading to exploit the kimchi premium is technically a sort of arbitrage. However, South Korean officials are keen about regulating cryptocurrency exchanges and eliminating irregularities.
margin mode cannot be changed. It is highly advised to check the margin mode settings before entering a position. Cross Margin is the default option on most trading systems since it is easier for beginners. Isolated Margin can be more useful for speculative bets that need stringent downside limits. ISP, → “Internet Service Provider“ ISPO, → “Initial Stake Pool Offering“ ITO, → “Initial Token Offering“ Jager, One Jager is the smallest Binance Coin unit (BNB) whereas one Satoshi is the smallest Bitcoin unit (BTC). According to the protocol of each cryptocurrency, most cryptocurrencies are divisible to a specified number of decimal places (set of rules) ranging from 0 (indivisible) to 8 or above. BNB has 8 decimals. The decimals refer to the number of digits that follow the decimal point thus 1 Jager = 0.00000001 BNB. The origin of the phrase Jager is the telegram handle of the former Binance Community Manager, Jager. Java, Java is a class-based, object-oriented programming language with few implementation requirements being a fast, safe, and dependable application development platform. It is extensively utilized in data centers, laptops, consoles, phones, and supercomputers. The Java platform contains an execution engine, a compiler, and a set of libraries to enable programmers design and execute Java applications efficiently. It is also used to produce Android apps, business software, mobile Java apps, big data analytics, hardware devices, and server-side technologies like Apache, Jboss, GlassFish, etc. Java was created for portable devices and set-top boxes as OAK. In 1995, in reaction to OAK’s failure, Sun Microsystems renamed the language Java and adapted it for Web development. Oracle purchased Sun Microsystems in 2009 and since then owns Java, MySQL, and Solaris. JavaScript, JavaScript (JS) is a programming language mostly used in the creation of online applications. It supports both functional and object-oriented programming paradigms. It is capable of just-in-time (JIT) compilation, which increases efficiency and conserves storage space. The cryptocurrency sector consists of a vast ecosystem of blockchain-based technologies and tokens. Even though it is a single-threaded language, JS is one of the few that can conduct parallel programming. It is an in-
96
Latency efficient, whereas Practical Byzantine Fault Tolerance (PBFT) needs synchronous consensus. Lagging Indicator, Lagging indicators change after the reference series does, i. e., after the time of interest. These are important, as they help confirm trends and turning points in coincident indicators. LAMBO, Lambo is the abbreviation for Lamborghini, an Italian automobile people reference when excited about cryptocurrency. When Lambo? was a typical question on early crypto forums to ask when prices will increase. In 2018 Peter Saddington, co-founder of VinWiki, acquired a Lamborghini for $115 due to the value increase of his cryptocurrency holdings. So, when cryptocurrency prices are poised to skyrocket, people joke and propagate the meme called When Lambo. Large Cap, Large cap tokens are cryptocurrencies worth $10 billion or more and with a significant community. Large cap enterprises normally have a lengthy history, making them a safer investment. Mid-cap projects are those worth $3 billion to $10 billion. Mid cap projects typically develop faster than big cap. As of the time of this glossary there are seven large caps: Bitcoin, Ether, Tether, USDC, Binance Coin, Binance USD, and XRP: Laser Eyes, Laser eyes is a Twitter joke that Bitcoin enthusiasts use to drive the price of Bitcoin to $100,000. The BTC high was $ 68,789 whereas the actual as of this writing is around $17,000. The beginnings of Bitcoin-related laser eyes may be traced to the #LaserRayUntil100 hashtag, which began in February 2021. This individual or group is optimistic about Bitcoin’s future and is likely to have diamond hands, suggesting they are solely interested in’accumulating more BTC and HODLing for the long run. Last In, First Out (LIFO), With last-in first-out (LIFO) in cryptocurrency, the last coins obtained will be the first ones sold. Depending on market circumstances, the optimal accounting approach may differ. Using LIFO during a time of increasing bitcoin prices would likely result in much lower overall taxed profits. In a time of declining pricing, FIFO will certainly provide superior tax outcomes. Latency, In technology, latency refers to the delay between an input and the output (IO). It
Klinger Oscillator, Developed by Stephen Klinger in 1977, the Klinger oscillator is used to predict long-term cash flow patterns while analyzing short-term fluctuations. It includes two lines: The green line shows the EMA average, whereas the blue line indicates the KVO line. The moving average of 13 periods is the traditional signal line for selecting whether to buy or sell. The indicator is based on the concept of an asset’s volume and how it influences both short-term and long-term price levels. As is the case with every other technical indication, it is essential to monitor the crossover. The Klinger Oscillator is a short-term trading strategy that mostly functions effectively on smaller time frame charts. Compared to other technical indicators, the formula for the Klinger volume indicator is quite complex. Before making a purchasing or selling choice in the financial markets, it is also wise to use a few additional indicators, such as MACD, RSI, and Aroon Indicator. Know Your Customer (KYC), Know Your Customer (KYC) is a critical component of anti-money laundering (AML) and anti-terrorist financing procedures. It is a typical technique to verify that platforms or traders have access to particular customer information. This includes documenting picture IDs, such as a passport or driver’s license. It is intended to prevent scams, fraud, corruption, or bribery. Cryptocurrency exchanges and services must comply with the KYC and AML rules of the nation in which they are located or domiciled. KYC, → “Know Your Customer“ Labelled Data, Labelled data consists of samples where the values of the variables which are to be predicted, are known. The label could be, for example, the change in stock price on a given day, which is dependent on a few features, e. g., inflation, company earnings, news. Supervised learning models can be applied to the data so that new unlabeled data (i. e., just the values of the features are known) can be presented to the model and a likely label can be predicted for that piece of unlabeled data. Lachesis, Lachesis is a distributed ledger and smart contract platform, like Ethereum. The technologies employed are totally open source and transparent. Lachesis is Fantom’s asynchronous byzantine fault-tolerant consensus mechanism (aBFT). Lachesis permits asynchronous consensus, which is quicker and more
97
Law of Accelerating Returns Sharding is popular for layer-1 scalability since instead of processing each transaction sequentially, sharding divides them into little shards that may be executed in parallel. Layer-1 solutions do not need any additional infrastructure. Layer 1 Protocols, A layer 1 network serves as the infrastructure upon which additional applications, protocols, and networks are built. The key feature of a public decentralized layer 1 network is its consensus process. Various consensus techniques provide varying degrees of speed, security, and throughput. For example, Bitcoin (BTC), Litecoin (LTC), and Ethereum (ETH) are Layer-1 blockchains. Layer 2, Layer 2 is a scaling mechanism that allows large transaction throughput while inheriting the blockchain’s security. Blockchains like Ethereum have gained popularity in recent years because they are programmable (smart contracts) and censorship resistant, allowing for a broad range of businesses and use cases. But, Ethereum can only handle 7 to 11 transactions per second, compared to Visa’s 20,000. As the blockchain becomes crowded, users strive to get their transactions completed more quickly. This promotes a bidding war for block space, driving up transaction costs. At times in 2021, sending one Ethereum token cost over $80. Layer 2 solutions have been introduced to relieve Ethereum’s congestion separating transactions from the blockchain, allowing hundreds per second. Zero-knowledge and optimistic rollups are layer 2 solutions. Layer 2 solutions like DeversiFi, StarkWare, Optimism, and Arbitrum derive their security from the Ethereum chain itself, unlike sidechains like Polygon. Layer 2 Protocols, A Layer-2 protocol is a third-party integration compatible with a Layer-1 blockchain. Layer 2 protocols, often known as network L2 protocols, are a set of communication protocols used by Layer 2 devices (such as network interface cards (NIC), switches, multiport bridges, etc.) to transport data in a wide area network or between two nodes in a local area network. LBP, → “Liquidity Bootstrapping Pool“ Leading Indicator, Leading indicators change before the reference series changes, i. e., before the time of interest. They provide information about the direction and/or magnitude of future values of the reference series, making them
exists at all levels of computing, from IO delay between the user and the computer to network latency when data and information flow from a computer to servers across the globe. Latency in cryptocurrency may relate to two distinct temporal delays. The first is the network latency of a blockchain, while the second is the exchange delay. Law of Accelerating Returns, The Law of Accelerating Returns is comparable to the concept of compound interest. It states that the pace of expansion of any technology with exponential growth accelerates with time. The term is related to the theories of Ray Kurzweil about technological singularity. He anticipates a time in the future when the rate of technological progress will be so fast and its influence so profound that human existence will be forever altered. The law of accelerating returns is a corollary to Moore’s Law, which predicts that computer power will double every two years on average. This realization has ramifications for economic policy, social structure, education, and other human endeavors. Numerous futurists are persuaded that we are on the approach of another paradigm shift that will result in far superior processing capability. Layer 0, Layer 0 is the basic protocol layer among all blockchain protocols, smoothly integrating with all other protocols to construct interwoven value chains and providing a more robust and advanced alternative to smart contracts. It acts as the root layer and enables cross-chain compatibility with all Layer 1 protocols as Bitcoin (BTC), Cardano (ADA), Ethereum (ETH), and others. Using the Layer 0 protocol, users can rapidly establish relay networks between several nodes, including Bitcoin and Ethereum. In addition to resolving the scalability issue, the Layer 0 protocol enables users to create blockchain-based companies and dApps, check data formats and sources, mint money, and implement custom business logic and KPIs. The Layer 0 protocol is composed of a series of state channels that check data according to user-defined functions. Layer 1 Blockchain, Layer 1 blockchains enhance the fundamental protocol to make the system more scalable. Consensus protocol modifications and sharding are frequent layer-1 solutions. Ethereum switched from proof-ofwork (PoW) to proof-of-stake, a speedier and less energy-intensive consensus process (PoS).
98
License are automatically rebalanced daily at 00:02:00 UTC or when the current market price fluctuates by 10 %. However, this is not applicable for all cryptocurrency exchanges as various exchanges have distinct sets of rebalancing regulations. Leveraged tokens independently handle risk. They automatically reinvest the profit in the underlying asset and sell a portion of it online when the price declines, so avoiding possible liquidation risk. However, leveraged Tokens are still high-risk investments. LFG, LFG refers to Let’s f*** go in the crypto or gaming community’s when something is pumping. Not coincidentally, these are also the initials of the Luna Foundation Guard, a group of investors that back the controversial stablecoin TerraUSD. Libp2p, libp2p is an open-source network stack that enables the development of contemporary, distributed applications. It offers a standardized set of tools for developing peerto-peer applications and services that operate seamlessly. Libp2p provides the basis for IPFS, as well as other applications that need a network stack. Protocol Labs initiated the libp2p project with the intent of developing a completely decentralized stack. It is an umbrella project that intends to unite the fragmented world of peer-to-peer protocols by offering developers with clear APIs and documentation for building distributed applications with ease. The libp2p architecture is composed of modular components that may be used separately or in conjunction with other modules. Collectively, these components provide an adaptable and extendable framework for developing and implementing decentralized protocols. Currently, libp2p just consists of networking layers, however there are several ongoing attempts to expand the stack into a fully-featured decentralized web stack. License , A copyright license gives a person or entity (licensee) the authorization to use a work from the copyright owner, usually in exchange for payment. Copyright licenses may be exclusive or non-exclusive, and the rights that come with them vary according to the specifics of each license. One of the most common copyright license situations is when an author licenses their publisher to publish, distribute, and sell their book. In return, the author receives compensation and/or royalties.
useful for a few people, such as investors or policymakers. Ledger, Ledgers are record-keeping systems, also in the cryptocurrency world. Ledgers track participant balances and transactions while the participants remain anonymous. Public ledgers were utilized even before digital assets, but they are more popular now. A blockchain is a distributed ledger that stores immutable financial transactions or blocks. Decentralized or distributed ledgers are not supervised by a central authority. Once a block is full with information about transactions, additional ones are added to the ledger, and full nodes keep a copy. They oversee the network, its users, and real transactions. Hackers, governments, and security organizations may follow the public records and information of blockchain network members. Legal Tender Currencies, A legal tender is a sort of currency that courts are compelled to accept as payment for any monetary obligation. In many nations, coins and banknotes are often considered legal tender whereas checks, credit cards, and other non-cash means of payment are typically not. For instance, vending machines and transportation personnel are not required to take the highest denomination currency. Legal tender must only be accepted for obligations that have already been committed, therefore a potential buyer cannot compel a purchase by just offering it. Leverage, Leverage refers to a trader’s position and profitability after receiving a loan. It is sometimes called a debt-to-assets ratio. Leverage increases investors’ market buying power. Assuming a trader’s stake was leveraged by 20 times, a $100 ETH position is now $2,000. The amount of leverage an investor may get depends on their trading platform, credit rating, collateral, digital asset, and possibly many more criteria. Some nations have moved to restrict leveraged margin trading out of concern for excessive losses of inexperienced consumers. Leveraged Tokens, Leveraged tokens are ERC-20 tokens that provide holders with leverage. Unlike typical trading techniques, utilizing these tokens instantly gives a leveraged position. These tokens provide ease since neither margin management nor an awareness of liquidation risk are required. The leverage can be both, fixed and variable. Typically, these tokens
99
License Agreement losses and terminate a trade before prices worsen. LINK (Chainlink), LINK is Chainlink’s utility token. Chainlink is a decentralized oracle network connecting smart contracts on its platform to real-world data. LINK is an ERC20 utility currency that Chainlink nodes use to give data to smart contracts (oracles are paid with LINK). The more data requests that a node processes, the more LINK it earns. There is a fixed quantity of 1 billion tokens for LINK. Liquid Market, A liquid market is a venue where all transactions are done easily and cheaply. All asset types, from real estate to oil and gas, need liquidity. The New York Stock Exchange, one of the largest stock exchanges, is an example of a liquid market. Liquidity in the crypto world is the capacity of a coin or token to be quickly exchanged into fiat currency or other cryptocurrencies. When a market is sufficiently liquid, it establishes a pricing equilibrium that is acceptable to all parties. Additionally, liquidity enables both buyers and sellers to swiftly conclude the deal, resulting in a narrower bid-ask spread. As more individuals and businesses embrace cryptocurrencies as a form of payment, the cryptocurrency liquidity increases. Liquid Staking, Liquid staking lets users stake and spend DeFi coins at the same time. This is made feasible by wrapping the staked tokens and giving users with wrapped tokens that represent a claim on the underlying collateral. The wrapped tokens are transferable and provide yield. Liquid staking enables users to stake and unstake their coins without a lockup time. It provides higher capital efficiency and enhanced liquidity on proof-of-stake blockchains, enabling users to concurrently reap the advantages of staking and DeFi. Using the same amount of cash, blockchain ecosystems may expand at a quicker rate with liquid staking. Multiple blockchains support liquid staking, including Ethereum, BNB Chain, Solana, Cosmos, and Fantom. Liquid Staking (Fantom), Fantom token (FTM) holders may participate in proof-ofstake and gain prizes. This technique uses Proof of Liquid Staking (PoLS). PoLS enables a single validator to stake tokens for numerous delegators. Delegators may pick which validator to stake with, allowing greater flexibility than typical Proof-of-Stake (PoS) algorithms.
License Agreement, A licensing agreement is a contract between two parties (the licensor and licensee) in which the licensor grants the licensee the right to use the brand name, trademark, patented technology, or ability to produce and sell goods owned by the licensor. In other words, a licensing agreement grants the licensee the ability to use intellectual property owned by the licensor. Licensing agreements are commonly used by the licensor to commercialize and monetize their intellectual property. LIFO, → “Last In, First Out“ Light Node, There are three different sorts of nodes: a miner node, a full node, and a light node. Light nodes are often downloaded wallets that are linked to full nodes in order to verify the blockchain’s data better. Light nodes are less in size and only store partial blockchain history. However, rather than storing the (partial) history of a blockchain, they often save a block header that attempts to support and query the volatility of earlier transactions. Lightning Network, The Lightning Network is a second layer payment protocol. It enables quick, scalable transactions between and among participating nodes and has been called Bitcoin’s scaling solution. The initial implementation of the Lightning Network was intended to alleviate pressure on the Bitcoin network and reduce transaction costs. Disadvantages are the costs, the possibility to hack the network, and the need to be constantly online. Limit Order, A limit order is an order to buy or sell a security at a predetermined price. By using a limit order, an investor may effectively promise to pay that amount or less, while the price itself is guaranteed. However, the filing of the order is not certain, and limit orders will not be executed until the security price matches the order requirements. If the asset fails to reach the targeted price, the order is not executed, and the investor may lose a trading opportunity. Limit Buy/Limit Sell, A purchase limit order allows investors to acquire an asset or cryptocurrency at a particular price, but the buying is not guaranteed. They protect investors from paying a greater price than anticipated, which is favorable especially in the unpredictable cryptocurrency markets. In contrast sell limits allow traders to sell assets or cryptocurrencies when the market price reaches a predetermined threshold. Stop orders are intended to reduce
100
Liveness makers for investors. They are compensated for holding assets to provide liquidity to the market and earn a profit through the spread between the asset bid and offer price. Liquidity Pool, Liquidity pools are smart contract-locked token pools that offer liquidity in decentralized exchanges. Liquidity pools are the junction of orders that produce price levels that determine whether an asset will move up or down. Decentralized exchanges employing automated market maker-based systems use liquidity pools. On such trading platforms, the conventional order book is replaced with pre-funded on-chain liquidity pools. Using liquidity pools instead of a buyer and a seller to exchange two assets for a fixed price leverages a pre-funded liquidity pool. If there is adequate liquidity, this facilitates transactions with little slippage even for illiquid trading pairs. Bancor, an Ethereum-based exchange, introduced such a mechanism originally, but Uniswap popularized it. Liquidity Provider, A liquidity provider is a user who deposits own crypto assets into a liquidity pool to support trade on the platform and receive passive revenue on such an investment. Because of this, liquidity providers are seen as trade facilitators and are compensated with transaction fees for the transactions they allowed. The amount paid to liquidity providers is proportional to the proportion of the liquidity pool they provide. Liquidity Provider Tokens (LP Tokens), LP tokens or liquidity provider tokens are issued to liquidity providers on a decentralized market (DEX). LP tokens are used to monitor individual contributions to the overall liquidity pool, as the percentage of LP tokens owned corresponds to the amount of liquidity in the overall pool. Popular DEXs like as Uniswap, Sushi, and PancakeSwap give LP tokens to their liquidity providers. As with any other token, the possession of LP tokens gives liquidity providers total control over their locked liquidity. Liveness, Liveness in distributed systems indicates that a protocol can transmit messages between nodes. Liveness is the assurance that all validators will agree on a certain value. Regularly, blockchains attempt to establish which transaction history is accurate, rather than the messages themselves. The accuracy of distributed systems is contingent on the sequencing of transactions. This is comprised of two com-
The validators pool liquid staking tokens for staking rewards (S-Reward). Fantom is a smart contract asynchronous network solving the scalability difficulties. Liquidation, Liquidation refers to the exchange of a cryptocurrency or asset for fiat money or its equivalent, such as Tether (USDT). Liquidation is either voluntary or involuntary. In a forced or involuntary liquidation, a deal is automatically converted when certain circumstances are met. In margin trading, a trader’s position is immediately liquidated if the margin requirements are not met. In contrast, voluntary liquidation simply is a trader deciding to cash out their crypto-asset for individual reasons. Liquidity, Liquidity relates to the ease with which a cryptocurrency may be converted into fiat money, and if this can be done without the asset’s value falling. Liquidity may also be used to determine whether exchanges provide immediate and slippage-free transactions between cash and cryptocurrencies. Typically, the real estate market is regarded to be illiquid. A market that lacks liquidity makes it harder for players to join and exit positions. If acceptance grows and virtual assets become more generally acknowledged as vehicles of exchange, the liquidity of cryptocurrencies is expected to expand further. Liquidity Bootstrapping Pool (LBP), Liquidity bootstrapping pools (LBPs) are also known as smart pools or customizable rights pools. A smart pool is simply a contract that maintains a pool of tokens intended for usage on an exchange. Unlike other shared pools, smart pool controllers have limited ability to alter the pool’s characteristics. Therefore, a smart pool is less untrustworthy than a shared pool, but does not need the same level of confidence as a private pool. A LBP is motivated mostly by the potential to create tokens with minimal capital requirements. To do this, a two-token pool consisting of a project token and a collateral token is created. LBPs are the future of funding for small initiatives with financial issues. Liquidity Mining, Is the process of participants providing cryptocurrencies to liquidity pools and being paid with fees and tokens depending on their proportion. These pools of money or tokens are available via decentralized exchanges (DEXs). In traditional finance (TradFi), brokerage houses and corporations act as market
101
Loan-to-Value (LTV) Ada Lovelace, a skilled mathematician born in 1815 and the first computer programmer, inspired the name Lovelace. In 1843, Charles Babbage requested Lovelace to translate a mathematician’s essay on his difference engine and analytical engine invention. Lovelace contributed annotations to her translation about how to code a computer to handle letters and symbols containing a Bernoulli machine algorithm. With this Ada Lovelace inspired the Cardano currency, ADA. Charles Hoskinson (one of IOHK’s co-founders) named the token ADA in honor of Ada Lovelace since she was the first person to notice that computers were capable of efficient working and algorithms. LTV, → “Loan-to-Value“ MA, → “Moving Average“ MaaS, → “Metaverse-as-a-Service“ or “Mining as a Service“ MACD, → “Moving Average Convergence Divergence“. Machine Learning (ML), A discipline which concentrates on creating algorithms and statistical techniques to give the computer program the ability to learn (e. g., to progressively improve its performance on a specific task) from data, without explicitly needing to program new features. These tasks usually involve predicting a certain outcome (e. g., revenue in each quarter), based on a set of features. ML can be categorized into supervised and unsupervised learning (see the associated definitions). Machine Learning (ML) algorithms are the backbone technology of most current AI systems, and are driving nearly all the value that is created through AI systems. However, these systems generally rely on large amounts of data to make good decisions, which can be hard to come by. Mainchain, Mainchain is the core blockchain architecture layer where all transactions are processed and concluded. The mainchain is hindered by block size restrictions, poor throughput, and inefficiency. Secondary layers are intermediates between the main chain and decentralized applications (dApps). They serve to increase the network’s scalability, efficiency, and scope. Mainnet, Mainnet is a standalone blockchain with its own technology and protocol. It is a live blockchain with its own currency or tokens, unlike a testnet or projects on Ethereum. Testnets are blockchain projects under progress
ponents: liveliness and security. Liveliness ensures that wonderful things will ultimately occur, implying that there is no deadline for their occurrence. Liveness is also the assurance that all validators will agree on a certain value. In contrast, safety is the assurance that nothing negative will occur. Loan-to-Value (LTV), Loan to value (LTV) indicates the amount of an asset or cryptocurrency that would be required as collateral for a loan. LTV is the ratio between the value of the loan and the value of the collateral. In conventional collateral-based lending, the LTV represents the investor’s risk. The higher the LTV, the greater the lender’s risk, and thus, the higher the borrower’s interest rate. In crypto-backed loans, the LTV guarantees timely full payback. Additionally, the user may get bigger loans at lower interest rates due to LTV. Depending on the chosen crypto platform a LTV can range anywhere between 5 % and 70 %. Location Swap, If two assets are identical in every way save their present storage location, then exchanging one token for another is a location swap indicating that the holder changed the physical place from which the asset may be redeemed. The actual products (the asset backing) are unaffected by the exchange as they remain in their current location. Only the claim to these assets, which is represented by a token, changes hands. A location swap makes sense in a global market because it may save transportation costs and prevent product shortages by maximizing the use of commodities that are already at the target site but are not required immediately by their present owner. Locktime, Locktime (or timelock) is a cryptocurrency restriction that guarantees transactions are locked until the given block height or time. Long, → “Long Position“ Longing/Long Position, Long positions occur when an investor acquires exposure to a digital asset with the assumption that prices will increase in the future, allowing the investor to sell the asset for a profit. Traders often opt to go long on digital assets as a result of significant events that bolster trust in blockchain and digital assets. However, in 2022 a long position proofed not to be the best choice as cryptocurrency value decrease by 80 %. Lovelace, 0.000001 ADA being one Lovelace, is the smallest unit of the Cardano coin (ADA).
102
Market Balances Margin Bear Position, Margin Bear Position refers to the position of a short investor who anticipates that the value of an asset will decline and seeks to benefit from this decline. Margin Bull Position, Margin Bull Position refers to the position of going long on an asset with the expectation that it would appreciate over time. Margin Call, When funds are running low, often owing to a poor deal, a margin call is issued. A trader might add funds to prevent closing a position. If additional money is not possible, the position must be closed. This may be done without trader approval. Traders can determine the precise amount an asset needs to decrease to trigger a margin call. Stop orders can decrease risks and avoid margin calls. They avoid significant losses during swings and volatility. Margin Trading, Inexperienced traders may get a margin call if the market goes against their transactions. Margin Bear is the term for a trader’s short position. Going long on margin is called margin bull. Margin trading allows cryptocurrency traders to acquire larger positions and purchase more cryptocurrencies. Margin-traders need a margin and a cash account. Market, Buyers and seller meet in a market to trade products, assets, or cryptocurrencies. The markets themselves determine the price by supply and demand. They have a higher liquidity the higher the number of buyers and sellers. In a completely competitive market, the opportunity to offer discounted or premium prices is limited. The equilibrium between supply and demand may be disturbed by additional factors. Among these variables are technological innovation and regulation. The foreign exchange market is the most liquid market in the world. The cryptocurrency market is seen as very volatile. Bitcoin, the first and leading cryptocurrency on the crypto market, has seen several periods of instability. Market Balances, Market balances are the remaining quantity of tokens or currencies on a decentralized exchange (DEX) after a transaction. In conventional finance, market orders are completed at the best available current price by a broker or trading exchange/app. In decentralized finance (DeFI), this may be done without an intermediary through a DEX, using liquidity pools on chain or via AMMs, minimizing inter-
that help programmers diagnose and test blockchain functionality. After this phase is completed, a project is typically launched on the mainnet. This means the blockchain is operational. Mainnet Swap, Mainnet swap is the process of migrating a cryptocurrency project from a third-party network to its home network. It happens when a project migrates from one blockchain to another or when its tokens are migrated from one chain to another. Users normally have the option of manually exchanging tokens or leaving them on the network. Maker Protocol (MakerDAO), The Maker Protocol is a blockchain-based decentralized credit system. It provides the fully-collateralized stablecoin Dai and uses a system of incentives and penalties to reduce volatility. Users place collateral into smart contracts that earn Dai proportional to the collateral’s worth. As a decentralized stablecoin, it is essential that the quantity of Dai in circulation is always kept at an optimal level. MakerDAO still is the longest-running Ethereum blockchain-based project. Malware/Malicious Software, Malware or malicious software refers to dangerous programs used by malevolent actors to gain unauthorized access to and/or compromise a computer, network, or server. Malware programs are divided into nine distinct categories with worms, viruses, and trojans being the most prevalent. Computer viruses are the most prevalent kind of malware due to their ability to modify and infect sensitive data on a computer. Due to their self-replicating nature, which makes them virtually hard to eradicate, worms are very damaging and difficult to combat. Trojans are often the hacker’s weapon of choice, which they install strategically on websites or deliver through malicious emails in order to get access to other people’s computer systems. Man-in-the-Middle Attack (MITM), A man-inthe-middle (MITM) attack is a broad name for a cyberattack in which an attacker inserts himself amid a communication between two parties in order to overhear, intercept, or manipulate traffic. MITM attacks are a strategy to steal login credentials or personal information such as a private key, eavesdrop on the target, damage communications, or corrupt data. Many cryptographic systems attempt to prevent mutual authentication, making detection of such attacks very challenging.
103
Market Capitalization (Market Cap/MCAP) pear. In comparison, a trade signal is a trigger to purchase or sell based on specified parameters. These signals may be utilized to rebalance a portfolio, switch sectors, or open new positions. Traders may construct trading signals using basic criteria like earnings releases and volume spikes, or complicated signals drawn from existing signals. Marketcap, → “Market Capitalization“. Markets in Crypto-Assets (MiCA) , Markets in Crypto-Assets (MiCA) is the key legislative proposal regulating the crypto sector in Europe, although it is not the only one within the European digital finance package. It is the first regulatory framework for the crypto-active industry on a global scale, as its approval imposes rules to be followed by all 27 member countries of the bloc. Marlowe, Marlowe is a financial contract programming language being designed by Input-Output Hong Kong (IOHK), the firm behind Cardano. Marlowe enables non-programmers to create financial contracts like derivatives, loans, and other agreements. It also facilitates formal verification of these contracts by programmers. It functions in a sandbox environment, enabling all types of developers to create smart contracts for Cardano. Currently, Marlowe operates on Cardano, but in the future, it can be used to create smart contracts on other blockchains as well. MARS, → “Multivariate Adaptive Regression Spline“ MAS, → “Monetary Authority of Singapore“ Masternodes, Masternodes are owned servers that anonymize transactions, clear transactions, and participate in governance and voting. Nodes generally validate blocks and transactions. Dash introduced masternodes in 2014 to reward owners of blockchain servers. It adds a second layer to Bitcoin’s blockchain to relieve nodes. As a second layer of Bitcoin’s blockchain, they seek to alleviate the load on nodes and execute the fundamental operations and extra functionality that nodes do. They are compensated for doing these activities. Masternodes were developed in reaction to the declining number of nodes. The payment masternodes get is comparable to PoW. Masternodes are becoming mor’ significant as they strive to minimize transaction processing time and avoid blockchain system congestion.
mediary costs. Users only need to connect their digital wallets (e. g., MetaMask) to the decentralized exchange, input the amount of an asset (i. e., $USDC) they wish to trade for another asset (i. e., $RIN), approve the transaction, pay the liquidity provider, pay the gas fee, and receive the amount determined by the market price. Market Capitalization (Market Cap/MCAP), Market cap shows the total worth of a cryptocurrency’s coins. It is used to measure the popularity and attractiveness of cryptos. Multiplying a coin’s price by its circulation yields its market cap. CoinMarketCap determines market cap using volume-weighted exchange prices. Thus, a market cap might be very volatile, like a cryptocurrency’s price. Cryptocurrencies with market caps above $10 billion are called large caps. Market Maker/Market Taker, A successful trade in any securities market needs the participation of two parties: a maker and a taker. A maker submits an order (to buy or sell at a specified price), and a taker accepts that order (to execute the buy or sell at the quoted price). Makers are crucial because they give liquidity and depth to markets in the hopes of profiting from the gap between bids and requests. Market participants need liquidity and promptness to initiate or exit positions. Early DEXs adhered to the conventional order book paradigm for market management, which showed all buy and sell orders for takers to execute. Market Order/Market Buy/Market Sell, A buy or sell of a cryptocurrency conducted on an exchange at the best price currently available. Limit orders and market orders are very different. Market orders are filled when interested buyers and sellers are present. Market orders are the most prevalent kind of orders. Moreover, they are reportedly to be cost-effective. Certain brokerages have a buy/sell button that enables market orders. Limit orders are used by (cryptocurrency) traders to purchase (crypto) assets when a certain price is attained. Market Signal, Market signals are inadvertent or passive information conveyed between market players. E. g., if a company offers bonds, it suggests it needs funds and wants keep control. A market signal may use technical indicators to indicate when to sell or purchase a product. Through signaling, market players create a dynamic market that may assist investors spot opportunities and indicate when they disap-
104
Mercenary Capital treated as commodities with fluctuating prices. Since its establishment in 2016 as a Reddit sub,/r/memeEconomy it has inspired many spinoffs. Memecoin, Memecoin is the cryptocurrency equivalent of memes and was created as a cheaper alternative to Bitcoin. The first atoshi, Dogecoin, was modeled after the popular Shiba Inu meme. Dogelon Mars, Shibainu, Floki Inu, and Samoyedcoin are examples of the most popular memecoins. Within a few months, atoshi established its position among the top 10 cryptocurrencies by market capitalization. Reddit exploded with atoshi conversations, particularly when millionaires began endorsing the cryptocurrency. Memecoins’ quicker minting and unrestricted coin purchase continue to attract more merchants. While the currency’s popularity continues to rise, memecoins are an easier way for novice investors to earn minor returns. Memorandum of Understanding (MoU), A Memorandum of Understanding (MoU) shows that all contract parties agree to go ahead. It gives crucial guidelines that may bring parties together. An MoU is also called a pre-agreement. MoUs are signed by governments and cryptocurrency platforms. They have also helped create blockchain legalization frameworks. Mempool, A mempool is a cryptocurrency node’s method for keeping information on unconfirmed transactions. It serves as a waiting area for transactions that have not yet been included in a block. In order to send a transaction to the miners, nodes must relay it to one another until it propagates across the whole network. There are the same number of mempools as nodes. Since not all nodes get the same transactions simultaneously, each node has its own representation of pending transactions, which explains why mempool sizes vary. Mercenary Capital, Mercenary capital refers to the opportunistic money given by investors wanting to profit from a platform’s shortterm incentive schemes. It is often short-lived or transient, since these investors frequently withdraw their funds when they discover more lucrative programs or when returns fall below their intended objectives. It is possible to adopt measures like as lengthier lock-in staking periods for greater rewards, but dealing with mercenary capital ultimately comes down to sound
Max Supply, Max supply estimates the maximum number of coins in a cryptocurrency’s lifespan. No additional coins or tokens will be issued or mined when the maximum supply is reached. Most cryptocurrencies have such a max supply. Maximum supply is a different concept from total supply. Bitcoin has a 21-million-coin maximum supply whereas Ether is one of the cryptocurrencies without a set supply. MCAP, → “Market Capitalization“ MCAP, → “Market Capitalization“. MCR, → “Minimum Collateralization Ratio“ Mean, The mean is the average of all the previous observations of a time series. A mean model simply forecasts this value for all future timesteps. Medium of Exchange, A medium of exchange is an instrument or system that facilitates the sale, purchase, or transfer of products. The means of exchange in contemporary economies is currency. The use of a medium of exchange will provide improved economic efficiency and lead to an increase in total trade activity. In a barter system, two parties exchange only when one possesses a product the other desires. Consider gold as an exchange medium. One could sell their laptop for gold and then buy a gaming PC with the gold. This gold example might be inefficient by modern standards, but it illustrates how a means of exchange may assist marketplace transactions. As a means of trade, money allows all market participants to be on a level playing field. Megahashes Per Second (MH/s), Hashes turn data into letters and integers of a specified length and speed up data storage and retrieval since they are shorter and simpler to discover. Miners are supposed to solve complex mathematical problems, some of which are exceedingly hard to solve manually. These computations are quantified in hash rates, such as MH/s, which is the performance speed of any mining gear. The quantity of hash power used by different coins varies. The impact of hash rates on cryptocurrency miners is direct. A greater hash rate improves the probability that a block will be mined. When the rate is at its peak, miners have a greater chance of receiving block rewards for successfully mined blocks. Meme Economy, Meme Economy is a satirical internet subculture in which memes are
105
Merkle Tree a native, blockchain-based money. Today, there are several metaverses that are referred to by various names and terminology. The term is derived from meta, which means beyond, and universe, which refers to all matter and space in existence. Therefore, the phrase metaverse extends beyond everything visible and known to exist. The notion of metaverse is also gaining acceptance among large technology organizations. It is distinguished by any or all the following attributes: persistence, real-time, economy, physical bridge, and open content. Metaverse-as-a-Service (MaaS), As-a-service refers to the delivery of technical goods and solutions via cloud-based services. Bit. Country is designed to provide the application framework and blockchain that anybody may use to create their own metaverse. Open protocols and decentralized platforms supply the service and infrastructure. Users may also construct customized economies, NFTs, and other incentive products for their communities. Metaverses, Two or more connected virtual universes/metaverses. In this context, NFTs mostly represent virtual land, but they may also take the shape of wearables and accessories to customize an avatar. Metcalfe’s Law, Metcalfe’s Law was initially stated by George Glider in 1993 for Ethernet. Metcalfe described Ethernet connections as the internet became more worldwide. Metcalfe’s Law states that the more users a network has, the more valuable it is to each user. Telephones illustrate this law. When few people had phones, possessing one was pointless. As more individuals got phones, not having one became costly since one missed out on the linked environment. Metcalfe’s Law also applies to digital assets. Blockchains, marketplaces, metaverse, and digital asset exchanges all fit Metcalfe’s Law’s description of large networks with discoverable devices communicating with each other. MEV, → “Miner Extractable Value“ MFI, → “Money Flow Index“ MH/s, → “Megahashes Per Second“ MiCA, → “Markets in Crypto-Assets“ Micro Cap, Micro-cap stocks are listed companies with $50 million to $300 million in market value. Micro-cap stocks are more volatile than big caps, making them riskier. Many have
tokenomics, superior goods, and strong community trust. Merkle Tree, In cryptography, a Merkle tree is a structure in which each leaf node is labeled with the hash of a data block and each non-leaf node is labeled with the cryptographic hash of its child nodes’ labels. Hash or Merkle trees provide efficient and safe verification of blockchain information, since each modification propagates upwards, allowing verification to be performed by just examining the top hash. Metadata , Metadata is data that offers information about other data, but not the data’s substance, such a message’s text, or a picture. Descriptive metadata describes titles, abstracts, authors, and keywords. Structural metadata describes how data containers are placed together, such as how pages are organized to make chapters. It specifies digital materials’ kinds, versions, connections, etc. Administrative metadata includes resource kind, permissions, and when and how it was generated. Reference metadata refers to statistical data’s substance and quality. Statistical metadata may describe processes that acquire, analyze, or create statistical data. Legal metadata identifies the originator, copyright holder, and public license, if available. MetaMask, MetaMask is a digital wallet that enables users to manage, send, and receive ERC-20 tokens and Ether. It functions as a plug-in for common web browsers like Chrome and Firefox. Additionally, MetaMask lets users communicate with smart contracts and decentralized apps. The program utilizes HD backup settings and is supported by a team of developers that constantly update its open-source code. Metatransaction, A metatransaction is analogous to a butler who conducts a transaction signed by a different party on behalf of the original signer. Metatransactions enable decentralized applications to save gas costs and chain token payments by including the signed transaction within the ordinary blockchain transaction. Metatransactions also enable a more seamless user experience. Metaverse, A metaverse is simply a digitally-existent other version of reality. In a metaverse, individuals interact to work, play, do business, and socialize with other people and elements. To purchase, sell, or exchange goods and services in the metaverse, it employs
106
Miner Extractable Value (MEV) its use as a store of value. A Bitcoin unit is divisible into microbitcoins (mBTC), millibitcoins (μBTC), and atoshi. BTC might be a smart investment choice if one expects to retain the mBTC, μBTC, or atoshi for as long as one would typically hold on to a house. Mimetic Theory, René Girard’s theory of mimetic desire examines how objects become attractive to people. Girard asserts that mimetic desire is a subconscious imitation of another’s desire in which one wants to participate. When applied to the realm of finance, the idea explains the fast price fluctuations of cryptocurrencies based on comments from people as e. g., Elon Musk, even though he had no direct power to affect Bitcoin prices. However, the mimetic theory fails to account for the possibility that individual liberty may trump a communal culture that values the object. Mineable, Some cryptocurrencies feature a mechanism that rewards miners with newly-minted cryptocurrencies for donating their hashing power to the creation of blocks. It is argued that such a cryptocurrency is mineable if it can create new coins via the process of confirmation. Other cryptocurrencies are created via other mechanisms such as yearly inflation, staking, etc. thus they are not minable. Minecraft, In Minecraft, users construct and destroy blocks in a 3D environment. The game has survival and creative modes. In survival mode, players must gather materials, create a shelter, and prepare their own meals. They can also engage with assaulting mobs. In creative mode, people are God-like. They have instant access to all blocks and no hunger bar. They cannot die and do not need to eat or defend naïve. This mode is for players who want to be creative with their resources, while survival mode is for those who want a challenge and want to test how long they can survive in the game. Survival mode’s tough mode is unique since in tough mode, if players die, they lose all their progress, and must start from zero again. Players can easily edit the game, which is probably one reason why it is still played today. Minecraft has two editions. The original is the Java edition. The second is the Bedrock edition designed in C++ that supports cross-play across consoles and PCs. Miner Extractable Value (MEV), MEV measures the profit a miner (or validator, sequencer, etc.) may gain by strategically including,
unproven items, no company history, assets, income, or activities, making them high-risk. Due to a lack of liquidity and a small shareholder base, they are also susceptible to significant price swings. Micro-cap coins offer the benefit of earning a lot of money in a short period of time, but there is also the danger of losing all the money if the crypto company chooses to leave the market, taking all the investment funds with it – also known as a rug pull. MicroBitcoin (uBTC), One millionth of a bitcoin, sometimes referred to as 0.000001 of a bitcoin. Often mistaken for a Bitcoin split. Micropayment, Essentially, a micropayment is a little internet transaction that may be as small as a fraction of a penny. Micropayments have been identified as a means of facilitating the instant online delivery of royalties, gratuities, pay-per-click advertising, smaller-scale freelancing employment, and cryptocurrency transactions. In the 1960s, futurist and philosopher Ted Nelson popularized the term micropayments for copyrights on content material. He had envisioned micropayments on the order of 10,000ths of a cent. There are many different methods in which micropayment systems function. Using micropayments becomes possible after a merchant or payment provider has created an account with a third-party micropayment provider that collects, saves, and distributes payments. Through a digital wallet handled by the provider, payments are saved until they accrue to a sufficient level, at which point they are transferred to the beneficiary. Microtransaction, A business model in which extremely tiny payments are accepted in return for common digital products and services, like ebook pages or game items. Mid Cap, Market cap measure for a cryptocurrency’s value. Multiplying the number of tokens by their price gives market capitalization. Mid-cap cryptocurrencies and tokens have a $1-$10 billion market cap. PolkaBridge, Litecoin, Monero, and Binance Coin are popular. Mid cap cryptos. Some mid-caps are still expanding their market or use cases, so they may increase further. MilliBitcoin, 1 Bitcoin is precisely equivalent to 1,000 μBTC. Bitcoins may be subdivided into almost unlimited values since they are not backed by a real substance like gold. Bitcoin’s acceptance has lately increased as a result of
107
Miners Mining, A rather ambiguous phrase for the process of validating transactions on a blockchain. While resolving the encryption difficulties, the computer power donor is rewarded with fresh fractions of the coin, token, or cryptocurrency. Mining Algorithm, Algorithms for mining cryptocurrencies are the rules that miners employ to generate new blocks. SHA-256 is a 256bit cryptographic hash algorithm developed by the National Security Agency of the US with SHA standing for secure hash algorithm. In 2016, Equihash, a memory-centric Proof of Work (PoW) algorithm, was introduced. Scrypt is a password-based key generation algorithm that significantly increases the security of passwords and is used in many cryptocurrencies, such as Litecoin and Dogecoin. Mining as a Service (MaaS), Mining-as-aservice for cryptocurrencies enables the purchase of computer power required to mine cryptocurrencies. Some cloud mining businesses also provide future delivery contracts for the currency one generates. In this manner, they may lock in a currency exchange rate and ensure their profits prior to assuming any risk. However, there is no assurance that the daily money promised by cloud mining firms will be received in whole or at all. Cryptocurrencies are very volatile, and their value may decrease without notice overnight. It has been known for cloud mining services to abruptly cease operations and leave the clients alone. Mining Contract, A contract for an investment in mining gear in which the hashing power of mining hardware is rented out for a period of time. The renter is not responsible for the hardware’s upkeep or power costs. Mining Difficulty, Mining difficulty indicates how difficult (and time-consuming) it is to obtain the proper hash for each block such as e. g., Bitcoin mining difficulty. The number of miners in the network affects the difficulty of mining new blocks over time. More miners make cryptocurrency mining harder. When a cryptocurrency grows popular, more computers join the P2P network. With more miners and computational power, the network’s hashpower grows. To maintain a cryptocurrency’s average block duration, the difficulty must be modified. Bitcoin’s mining difficulty is modified every 2,016 blocks.
excluding, or reordering transactions in blocks they create. Front running is when miners benefit by putting their transaction before other user’s, causing the users to fail and theirs to succeed. Miners also may restructure transactions at whim, utilizing their privileged knowledge to execute a deal first by taking advantage of trading opportunities signaled by user transactions. Along with front running, the most typical MEV attacks are back running, which refers to miners profiting from how user transactions influence market circumstances by posting their own transaction exactly behind the users. Sandwich attacks combine the two to benefit from user transactions. Miners can only execute these MEVs if they can order transactions inside a block. Miners, Miners are contributors to a blockchain who participate in the mining process. They might be professional miners, corporations with large-scale operations, or private enthusiasts who set up mining rigs in their homes or offices. Minimum Collateralization Ratio (MCR), The minimum collateralization ratio or collateral coverage ratio is one of the most crucial measures used by lenders to assess the amount of money they should give to a borrower. Minimum debt-to-collateral ratios are often established by lenders within an industry and may vary amongst lenders. For instance, in real estate Fannie Mae sets a minimum debt-to-collateral ratio at 36 % while Freddie Mac sets its minimum at 40 %. Thus, a good borrower should have a ratio of two to one or below. Minimum Viable Product (MVP), Not like in sports, a MVP is not the most valuable player. A minimum viable product (MVP) contains enough functionality to attract early-adopter clients and validate a product concept. In software and engineering, an MVP may assist the product team rapidly iterate and enhance the product due to agile development environments. A firm may opt to produce and deploy a minimal viable product because it wants to release a product fast, test the concept with actual users before committing a huge budget to the product’s complete development, or discover what connects with its target market and what does not. A MVP may reduce the time and money a firm spends on a failed product. MVPs also allows to gauge client interest in their product before it is completely developed.
108
Mnemonic Phrase Minnow, In English, a minnow may mean a little fish or an unimportant person or organization. In cryptocurrencies, a minnow has only few digital assets so when they purchase or sell crypto, it will not affect the market much. Some cryptocurrencies have low trading volumes and poor liquidity. Therefore, values might change drastically even after a small sale. Therefore, there is no clear limit until when somebody is a minnow. According to studies, most investors fit this description. As an example, most Bitcoin blockchain addresses have less than 0.1 BTC, but even collectively they only control 1 % of all circulating BTC. Minting Interval, Specifies how often assets may be created on a blockchain network. Some market places have their own terms and descriptions regarding minting intervals. Minting, Minting is a decentralized process that enables the generation of new tokens in cryptocurrencies. It may be a non-fungible token or a cryptocurrency coin. There are two methods for minting cryptocurrency. To mint cryptocurrency, mining and staking are used, however minting an NFT requires a distinct approach. The addition of NFTs to the blockchain allows producers to sell their images, movies, and digital 3D objects. Users require a cryptocurrency wallet to mint NFTs. Then, users register using their cryptocurrency wallet on an NFT marketplace, such as XBANQ or OpenSea, and construct their NFT by uploading their chosen file and paying in ETH for its development. After the transaction has been validated, a new NFT is created. MITM, → “Man-in-the-Middle Attack“ ML, → “Machine Learning“ MLM, → “Multi-level Marketing“ MLP, → “Multilayer Perceptron“ Mnemonic Phrase, Mnemonics in the realm of cryptocurrencies serve a crucial role in ensuring that funds are always secure. Typically, these phrases have 12 to 24 words. Each word inside the sentence is normally unconnected to the others. Wallet providers will often supply people with a mnemonic phrase when one establishes a new account, and it is one’s responsibility to write it down and preserve it in a secure location, preferably in an offline setting. Here, mnemonic phrases are also called seed phrases. If a hardware wallet is lost, stolen, or destroyed, mnemonic phrases become invalu-
Mining Farm, A mining farm is a typically room or warehouse full of computers that mine cryptocurrency. The farm might be a basement with many ASIC machines or a warehouse with GPUs and ASICs. Mining farms need massive power supply and cooling fans and are usually multi-person projects working in one building. If mining farms are in a cold region, the cost are less as they need less cooling power. In addition to using a substantial quantity of electricity, mining is a costly endeavor that necessitates the replacement of mining machines on a regular basis. Consequently, rather high initial investment and upfront capital is needed. Mining Pool, On some blockchains, like Bitcoin, miners compete to locate the next block. This implies miners need more processing power (and energy) to earn bitcoin payouts. In certain circumstances, a person lacks the necessary infrastructure to validate a block. Mining pools help by pooling resources to increases the success probability. By combining the processing power, they increase the chances of locating the next block and earning rewards. If a mining pool wins and receives a block reward, it is distributed among members according to the supplied processing power. Mining Reward, A mining reward, or block reward, is the amount of cryptocurrency one earns for mining a block. The block reward compensates miners that use equipment to discover the new blocks that will record the transaction as an eventual result of their mining efforts. Similar mechanisms exist for compensating miners with blocks of the corresponding blockchain for other cryptocurrencies. Typically, the winning miner will claim a block reward by including it as the block’s first transaction. Mining Rig, A mining rig has different meanings. It might be a single computer devoted to mining cryptocurrencies or even a large system with several graphics cards. As cryptocurrency knowledge grew, so did miners’ competition to find the next block and earn a reward. This makes mining difficult and requires powerful setups and regular update of the mining rig infrastructure and especially the graphics cards. Over the years, there has been an increase in competitiveness between gamers and cryptocurrency miners for graphics cards. Consequently, several manufacturers have made tweaks to their graphics cards that render them unsuitable for mining.
109
Mnemonics which provides a new layer of DAO features, such as the ability for Moloch DAOs to acquire and spend various tokens (instead of just one). Moloch V3, which is anticipated to increase the framework’s adaptability and extensibility, is presently under development. Monetary Authority of Singapore (MAS), The Monetary Authority of Singapore (MAS) is Singapore’s central bank and manages public debt, monetary policy, exchange rates, and banks and other financial institutions. The authority promotes price stability and financial security by maintaining foreign reserves, regulating inflation, and guaranteeing market stability. The MAS also controls conventional banks and tech firms that use new technology, such as digital currencies or blockchain-based trading platforms for cryptocurrencies. Singapore is a blockchain fintech haven as its policies foster cryptocurrencies and blockchain technology and stimulate innovation while safeguarding customers from fraudsters. Monetary Policy, Monetary policy is a set of activities that financial institutions (especially central banks) employ or implement to regulate the entire money supply. Ideally, these measures keep inflation and increasing prices in control and enhance employment. Central banks execute monetary policy using several means. They establish bank reserves to purchase and sell short-term bonds. They acquire and sell assets to grow and reduce money supply. Interest rate is another central bank instrument. Central banks have a monopoly on issuing money since they are authorized to control via monetary policy. By definition, a central bank does not issue cryptocurrency. Central banks may lose their monopoly if cryptocurrency adoption expands. Monetization Rights, In the context of intellectual property, monetization means converting one or more rights to a copyright, patent, trademark, NFT, or trade secret into a source of revenue. However, missteps can cause the permanent loss of rights and revenue. To monetize refers to the process of turning a non-revenue-generating item into cash. In many cases, monetization looks to novel methods of creating income from new sources, such as embedding ad revenues inside of social media video clips to pay content creators. Sometimes, monetization rights are transferred because of privatization (called commodification), when a
able as they are the second and last opportunity to reclaim otherwise-lost coins. Mnemonics, Mnemonics are tunes, abbreviations, and rhymes that aid memory. Mnemonic phrases are a set of 12 to 24 words formed when a new crypto wallet is established. This ensures crypto wallets are still accessible if the password is forgotten. Cryptocurrency uses two mnemonics. First, mnemonic phrase abbreviations include seed key, mnemonic seed, and recovery seed. When a new crypto wallet is created, users are urged to write down a 12-, 18-, or 24-word mnemonic phrase to prevents wallet lockouts. Using mnemonic phrases makes crypto wallets more secure and easy to store. Second, mnemonic passphrases are a two-factor authentication for crypto wallets that rely on mnemonic phrases. Mnemonic extensions are sometimes called seed extensions. Mobile Wallet, Mobile wallets are apps that store a user’s payment data, including crypto and financial APIs, on a mobile device. Mobile wallets contain secret keys in crypto and can store and transmit digital assets and currencies. These apps are available on Play Store and App Store. Mobile wallets do not store virtual money, just private keys to access them. Using private keys, people may transfer cryptocurrencies from their wallet to any blockchain address. Abra, Coinomi, Jaxx Liberty, Electrum, Exodus, and Mycelium are some of the most popular mobile crypto wallets. Mobile wallets are sometimes known as hot wallets because, unlike hardware wallets, they must be connected to the internet to function. As a result, they are considered less secure than cold wallets. Model, There are a lot of different models that might be used for predicting. How models acquire knowledge from data and how the predictions are made. Examples include statistical models like the autoregressive integrated moving average (ARIMA) model or deep learning models like long short-term memories (LSTMs). Moloch DAO, Moloch DAO may refer to a DAO that utilizes the framework or the Ethereum grant-giving DAO that built it. Moloch DAO design focuses on security, usability, and extension using a single smart contract per DAO via permissioned membership, weighted voting, and non-transferable governance authority. Since its inception, the Moloch DAO architecture has been updated to Moloch V2,
110
Money Transmitter Money Market, The money market refers to any assets or securities with maturities of one year or less that are traded at wholesale or retail levels. Short-term commercial paper, bankers’ acceptances, certificates of deposit, and repurchase agreements are typical examples of these securities. The money market is an essential component of the financial system because it offers liquidity in the case of a sudden shortage of cash. A shortage of liquidity may create a crisis scenario in which it is difficult for people to get short-term funding. Therefore, the money market plays a critical role in maintaining the health of the economy. Money Services Business (MSB), A money service business (MSB) is a nonbank financial firm that allows consumers to exchange currency, store value, and move funds. MSBs are subject to the Bank Secrecy Act (BSA), KYC, and AML laws, much as banks. MSBs are often those that provide check cashing, foreign currency exchange services, or the sale of money orders, travelers checks, or pre-paid access (previously stored value) goods for normally more than $1,000 per day, per customer, in one or more transactions. Money Transfer License (MTL), Money transmitters need a money transmitter license (MTL) to enable them to lawfully do business. Its objective is to assist the government in preventing crimes involving money, such as money laundering. In th US, the FinCEN (Financial Crimes Enforcement Network of the US Department of Treasury) issues an MTL. A money transmitter or money service business (MSB) is a business that engages in one or more of the following: currency exchange (both fiat and cryptocurrencies), check cashing, issuing or selling traveler’s checks or money orders, or check cashing. In the US, an MSB must have an MTL to participates in the cryptocurrency industry. In a few countries where the sale of cryptocurrency as a business is lawful, MSBs active in the crypto area are excused from obtaining a MTL. Money Transmitter, Money transmitters are also called money service companies (MSBs). Under US federal law, cryptocurrencies are a commodity, hence the FinCEN (Financial Crimes Enforcement Network of the US Department of Treasury) regulates it. FinCEN defines a money transmitter as anybody who transfers money. Therefore, all cryptocurren-
previously free or public asset is turned into a profit center—such as a public road being converted into a private tollway. The verb to monetize may also refer to liquidating an asset or object for cash. Money, Centrals banks such as the Federal Reserve in the US or European Central Bank (ECB) typically issue their own currency in forms of cash or electronic money. Money has three basic functions: store of value, means of exchange, and unit of account. If a currency’s or money’s value fluctuates too much or too fast, people stop trusting it and search for alternative methods to trade (like through bartering). Gold and silver were historically used as commodity money (think coins), but cigarettes and alcohol have also been utilized. Government-issued fiat money is legal tender. Fiat money is not backed by any tangible item, unlike gold or silver. Money Flow Index (MFI), The Money Flow Index (MFI) was developed by Avrum Soudack and Gene Quong to assess purchasing and selling momentum. An increase indicates good money flow and buying pressure, whereas a decrease indicates selling pressure. Positive and negative money flows are added to get a money flow ratio. The MFI runs from 0 to 100. It analyzes both volume and price to detect price extremes and reversals. MFI is a reliable indication, yet it may be deceptive. Before buying or selling, a trader should employ technical indicators like relative strength index (RSI), Moving Average Convergence Divergence (MACD), on-balance volume (OBV indicator), Aroon indicator, and stochastic oscillator. Money Laundering, Scammers, fraudsters, terrorists, drug dealer, and other criminals employ money laundering to hide their financial flows and profits. Money laundering originated in the 1930s to hide alcohol sales during the prohibition in the US. Using shell corporations, offshore banks, and other false fronts, money launderers conceal money from banks and authorities. Launderers may buy art and expensive things to avoid declaring their money. Many lawmakers throughout the globe classify cryptocurrency as money laundering. In 2021, Turkish President Recep Tayyip Erdogan prohibited crypto assets as a payment method, claiming crime and fraud. Also, North Macedonia, Bolivia, and Algeria have passed anti-cryptocurrency AML legislation to regulate and ban cryptocurrencies.
111
Moon Move (Programming Language), Initially, the Move programming language was utilized to create the Diem blockchain. It was developed by the Diem Association, a Meta-backed technology collaboration. It is a bytecode language that is executable. It implements intelligent contracts and personalized transactions. Move intends to address issues caused by other blockchain programming languages, such as Solidity. Specifically, it tries to avoid double-spending and allows digital asset holders to keep ownership information. Even though Diem was finally abandoned, Move is still in use today. Aptos and Sui are two existing blockchains that are currently based on Move. Move-to-Earn, Move-to-earn (M2E) is sometimes called a new idea, however already the Web 2.0 had multiple comparable concepts. M2E joins play-to-earn (P2E) and learn-to-earn (L2E) as blockchain-powered projects. M2E is a blockchain-native branch of the P2E paradigm that focuses on health and fitness and incentivizes physical activity (walking, running, dancing, exercising, etc.). Thus, M2E is Web 3.0’s first step toward encouraging metaverse users to live better lives in real life. With M2E users may earn cryptocurrencies, NFTs, and other digital assets by living healthily. As users, people hold in-app awards that they may swap for cryptocurrencies or fiat money (depending on the app’s terms and conditions). Most M2E applications include microtransactions, staking, and in-app tournaments and events to reward players. Notable initiatives advancing the general adoption of the M2E concept include Dotmoovs and OliveX from Polygon, Genopet and StepN from Solana, and Wirtual from the Binance Chain platform. Moving Average (MA), The Moving Average (MA) indicator assists traders in understanding the true trend and smoothing out price variations. The principle of the MA is to calculate an asset’s average closing price over X periods. Mas assist in price analysis for traders as market analysts use the MA to evaluate the support and resistance of an asset by analyzing its market movements. The MA offers a clear picture of the price activity, which investors may use to evaluate if a possible bullish or bearish run is imminent. There are four types of Mas: simple or arithmetic, smoothed, exponential, and weighted.
cy-related firms are considered money transmitters and thus fall under the Bank Secrecy Act (BSA). These regulations apply to payment processors, cryptocurrency exchanges, Bitcoin ATMs, and certain wallet providers. Moon, Moon is a popular word on Crypto Twitter, often accompanied with rocket emojis. Since Bitcoin’s early days, the moon has conveyed people’s feelings on cryptocurrency. If a digital asset is going to the moon, the proponent predicts enormous price gains. Moon may also be a verb in this context. As a result, someone can remark their favorite altcoin is mooning. Like other crypto terminology, it can be hard to trace a word’s origin. It is probable that moon became a widespread word around 2017, when Bitcoin crossed $20,000 for the first time in its lengthy history. Moore’s Law, Moore’s Law states that the number of transistors in a microchip doubles every two years, halving computing costs. Intel co-founder Gordon E. Moore made this observation in 1965, which later became known as Moore’s Law. In the decades after the first observation, Moore’s Law drove the semiconductor industry’s long-term planning and R&D objectives. Moore’s Law has been a catalyst for technological and societal transformation, along with the productivity and economic development that have characterized the late 20th and early 21st centuries. The rule indicates that as the transistors on integrated circ’naïvets get more efficient, chips, computers, devices, and processing power will all become smaller, quicker, and cheaper over time. Motoko Programming Language (DFINITY), Motoko is a new, general-purpose programming language designed specifically for the decentralized internet. It is meant to be safe and user-friendly for developers. Teams of developers with varied skill sets will be able to build a new generation of decentralized apps using Motoko. Motoko’s robust parity typing and verifiable security assurances allow programmers to construct sophisticated systems without introducing exploitable flaws. Additionally, it can implement and compose smart contracts. Motoko was created as an experiment in language design to see what a contemporary programming language might look like if it could use the Internet Computer’s unique security model and decentralized architecture. MoU, → “Memorandum of Understanding“
112
Multi-Party Computation as-a-Service are no cycles between nodes. In this case, all network weights are optimized during training. Multi-Level Marketing, Multi-level marketing (MLM), is a controversial marketing strategy for the sale of products or services in which the revenue is generated by a non-salaried workforce selling the company’s products or services, while the earnings of the participants are generated by a pyramid-shaped or binary compensation commission system. It is also known as network marketing or pyramid selling. In multilevel marketing, members are often compensated from two possible income sources. The first is based on a sales commission for directly selling the product or service, while the second is based on sales made by other sellers that the participant has recruited. Salespeople who have been recruited, are referred to as one’s downline. Therefore, MLM salespeople are expected to sell items directly to customers, but they are also paid to recruit additional salespeople to join the company’s distribution system as downline distributors. Multi-Party Computation, Multi-party computation (MPC) is a cryptographic system that spreads computing activities between many parties, with no entity able to see the data of the others. Frequently, data scientists utilize MPCs to jointly analyze data without ever sharing them. MPC is a study field in the blockchain world with a specialized implementation confined to protecting the privacy of parties inside a system, where all participants can reach a mutually desired outcome without disclosing personal or private information. MPC employs a well-established blockchain concept known as additive secret sharing, which is essentially the partition and distribution of a secret across a set of independent, consenting participants. Multi-Party Computation as-a-Service, To address privacy-related issues while preserving the principles of blockchain technology, teams began researching the notion of multi-party computation (MPC) to provide additional privacy layers to the data utilized by blockchain network services. Currently, only a few of organizations have been able to effectively combine MPC and blockchain technology, providing consumers and service providers with the desired characteristics of both ecosystems. A ground-up MPC solution requires time, effort, and resources. MPC-as-a-service has therefore arisen as an unique alternative for businesses
Moving Average Convergence Divergence (MACD), Moving Average Convergence Divergence (MACD) is a technical analysis tool that reveals the link between two price moving averages as part of a trend-following momentum indicator. To do the computation, the 26-day exponential moving average (EMA) is subtracted from the 12-day EMA. MACD was established in the 1970s by Gerald Appel and is used by cryptocurrency traders to evaluate market momentum, identify probable entry, and exit opportunities, as well as price behavior. MPC, → “Multi-Party computation“ MSB, → “Money Services Business“ Mt. Gox, Mt. Gox was a cryptocurrency exchange that debuted in July 2010. It rapidly became the largest Bitcoin trading platform in the world. It is anticipated that within three years, this platform processed over 70 % of all Bitcoin transactions. Mt. Gox’s destiny took a drastic change in February 2014 as hackers had stolen more than 850,000 bitcoins. Approximately 200,000 Bitcoins were found in an old wallet a month after the website’s closure., but other attempts to locate the remaining missing bitcoins have proved fruitless. As a result of the Mt. Gox disaster, a sizeable portion of Bitcoin’s total quantity was lost irretrievably. It also resulted in significantly increased monitoring of cryptocurrency exchanges and fueled the growth of decentralized alternatives in which investors maintain permanent possession of their money. MTL, → “Money Transfer License“ Multi-Coin Wallet, Users need crypto wallets to store their funds off exchanges. For crypto beginners, there are wallets that contain one crypto asset or a few based on one blockchain network. Many wallets nowadays only support Ethereum-based coins/tokens and are not real multi-coin wallets. Additional advantages of a multi-coin wallet include the ability to store thousands of crypto assets in a single spot and receive passive rewards through staking or active user incentives. AtomicDEX is an exemplary multi-coin wallet with a decentralized exchange that enables blockchain interoperability. Multilayer Perceptron (MLP), A Multilayer Perceptron (MLP) is a sort of feedforward neural network, that is, a neural network with input, hidden, and output layers in which there
113
Multipool Mining Mutlicollinearity, Multicollinearity occurs when two or more predictor variables are strongly correlated with one another. High correlations between predictor variables essentially means that the variables contain the same information. As a result, the variables cannot be distinguished by the model, which hampers interpretation, as it is not clear which variable causes the effect. Therefore, although multicollinearity does not decrease the accuracy, it should be avoided. Mutual Credit Line, Mutual credit lines are credit lines granted to members of a mutual credit network and denominated in the network’s mutual credit currency. Each member gets a credit that may be used to purchase goods or services from other members. Members reimburse their shared credit limits by selling to any other network member. Each network may decide how it will offer credit lines, such as by using standard credit ratings, bank account information, or non-traditional techniques, such as qualitative indicators of trust. Mutual credit lines make credit available to everyone by spreading the risk of default across the whole closed system. Mutual credit decentralizes the provision of credit and releases liquidity in resource-rich but cash-poor communities in order to produce value creation, boost exchanges, and stimulate economic activity. MVP, → “Minimum Viable Product“ My Story (VeChain), My Story is an efficient method for combating the $50 billion counterfeit luxury goods market. By touching an NFC-enabled smartphone on an RFID tag or scanning a QR code on a hangtag, My Story enables customers to confirm the legitimacy of their purchases directing them to a landing page with all the item’s details, including its path from manufacture to retail location. My Story gives marketers with a unique identity for each physical item that stores verified product information on the VeChain blockchain. The platform is based on the blockchain technology that underpins Bitcoin, Ethereum, and other cryptocurrencies with VeChain being intended to be used for the monitoring and administration of items during their entire lifecycle. It basically functions as a digital ledger that traces the progression of a product from its point of origin through its many phases to its eventual destination.
(and people) seeking end-to-end privacy for their blockchain services. The MPC-as-a-Service concept allows organizations and individuals to grow their activities as required by providing a selection of pay-per-use pricing methods. Multipool Mining, Multipools mining swaps between many pools and cryptocurrencies and continually determines which currency is the most lucrative to mine at any given time. In the formula that estimates profitability, the block time and the exchange price are two crucial variables. To prevent the need for several wallets for all potential mineable currencies, multipools may immediately convert the generated currency to a widely accepted coin (for example bitcoin). Because the most lucrative coins are mined and then exchanged for the targeted coin, it is feasible to obtain more coins in the intended currency using this strategy than by mining the intended currency alone. This strategy also creates demand for the desired currency, hence boosting or maintaining its value. Multisignature (Multi-Sig), To transfer money from a wallet, one needs to create and sign a transaction. By signing a transaction, one digitally confirms that he/she owns the money, has the key to control them, and authorizes the transaction. A single signature cryptocurrency wallet usually only needs one signature to sign a transaction. Multisignature wallets need several signatures to sign a transaction. Shared multisignature wallets are called co-payers. Depending on the wallet type, the number of signatures necessary to sign a transaction is usually smaller or equal to the number of copayers. All copayers may view the wallet’s money and transactions. If one of the recovery phrases of the wallet is lost, there may not be enough copayers to sign a transaction, and without enough copayers, one cannot use the wallet’s money. This increases security, but also danger. Multivariate Adaptive Regression Spline (MARS), Non-parametric regression model that may accommodate nonlinearities by fitting the data using piecewise linear functions. Multivariate Regression, Model of regression with several outcome variables. Nota bene: if there are additional numerous descriptive variables, this is often specified and referred to as multivariate multiple regression.
114
Neural Network Network, A network refers to all the nodes committed to helping the operation of a blockchain at any given moment in time. Network Latency, Network latency is the time a data packet takes to travel from one point to another. This might be an absolute or relative time. This covers both the actual distance traveled by the data and the time required to analyze it. The acceptable level of delay depends on what is done online. Gaming and video chatting have more stringent latency requirements than email and online surfing. Experts in information technology estimate that 50 milliseconds, or one-tenth of a second, is the maximum delay that the human brain can tolerate. The latency of a network is measured in milliseconds (ms). Regarding blockchain and cryptocurrencies, network latency is a very important element. The objective should be to maximize throughput while minimizing delay. Network-Enhanced Virtual Machine (NEVM), The network-enhanced virtual machine (NEVM) was developed by Syscoin (SYS) and Blockchain Foundry. It combines the programmability of Ethereum and EVM-compatible smart contracts with Bitcoin’s security and gives Bitcoin smart contract features combining Bitcoin’s merge-mining hash rates, security model, UTXO efficiency, and interoperability with Ethereum’s smart contracts into a decentralized financial computing platform. The protocol delivers regulatory compliance for digital assets, hyper-secure transactions that can scale to accommodate millions of users simultaneously, and compliant toolkits for Web3, DeFi, Metaverse, and NFT applications without sacrificing decentralization and security. Neural Network, A neural network is a collection of algorithms that attempts to identify underlying links in a piece of data by emulating the way the human brain works. In this context, neural networks refer to either biological or artificial systems of neurons. Neural networks can adapt to changing inputs, allowing them to provide the optimal output without requiring a reevaluation of the output criteria. The notion of neural networks, which has its origins in artificial intelligence, is gaining rapid traction in the creation of trading systems. Financial applications of neural networks include time-series forecasting, algorithmic trading, securities categorization, credit risk modeling, and the
Naïve, A naïve model simply takes the last value of the time series for all future forecasts. National Institute of Standards and Technology (NIST), The National Institute of Standards and Technology (NIST) is a non-regulatory agency under the Department of Commerce. Its purpose is to promote measuring science, standards, and technology in order to increase productivity, facilitate commerce, and enhance quality of life. NIST fulfills its goal via its labs, which perform research to develop the technical infrastructure of the US. Natural Language Processing (NLP), Natural language processing (NLP) is the subfield of computer science and more specifically, the subfield of artificial intelligence (AI) focusing on providing computers the capacity to comprehend written and spoken language in a manner like that of humans. Combining computational linguistics (rule-based modeling of human language) with statistical, machine learning, and deep learning models is what NLP is. Together, these technologies allow computers to analyze human language as text or audio data and comprehend its entire meaning, including the speaker’s or writer’s purpose and emotion. NLP is the driving force behind computer systems that translate text from one language to another, react to spoken instructions, and swiftly summarize vast amounts of information— even in real time. Moste people have already engaged with NLP through voice-activated GPS systems, digital assistants, speech-to-text dictation software, customer service chatbots, and other consumer conveniences. NLP also plays an increasing role in corporate solutions that optimize company operations, boost staff productivity, and simplify mission-critical business procedures. Negative Volume Index (NVI), The Negative Volume Index (NVI) monitors price fluctuations and identifies time periods in which trade volume declined from a certain point in time. Paul Dysart created NVI in the 1930s, making it one of the oldest indicators in the financial industry. The NVI is based on the notion that a rising trend is one that persists even while trade volume drops. The hypothesis is that uninformed traders are responsible for the high trading volume. Moreover, on days with low trading activity, knowledgeable traders (also known as smart money) are rather active.
115
Newb University study showed similarities in Satoshi and Szabo’s behaviors and phrasings. However, community members disagree on whether Szabo created Bitcoin. But Szabo has rejected this assertion, emailing a journalist, Thanks for letting me know. You mistook me for Satoshi, but I am accustomed to it. Nifty Gateway, Nifty Gateway is a blockchain-exclusive NFT platform. It mixes crypto-technology with valuable artworks to produce tradable assets with financial potential. Nifty Gateway lets people purchase and trade NFTs, sometimes called Nifties. Gemini LLC, a cryptocurrency exchange, and New York trust firm, owns Nifty Gateway. Nifty Gateways itself was formed by the twins Duncan and Griffin Cock Foster before it was bought by Gemini. Nifty Gateway also takes NFT deposits, and one may apply to sell his/her own artwork on the platform. Before being approved, one must complete a questionnaire and interview. NIST, → “National Institute of Standards and Technology“ NLP, → “Natural Language Processing“ No-Coiner, No-coiners do not hold digital or cryptocurrencies and believe that cryptocurrencies have no value or will fail. Some dictionaries, like Urban Dictionary, emphasize their attitude over their coinlessness. No-coiner typically express their anger or aggravation by constantly reminding others that BTC and the cryptocurrency sector are scams or bubbles. Despite proof that cryptos have use cases, no-coiners exclusively perceive criminal application. Node, A node stores a blockchain’s data and allows all communication (transactions) to travel via it. It works on PCs and servers. Interconnected nodes can easily share data. To work correctly, they must be updated regularly. Nodes vary in data storage and processing power. They must also check the authenticity of blocks by a chain’s signatures and approve or reject them. Common nodes simply store, transmit, and verify network activity, not blocks. Running a node needs an internet connection, a computer, and technical knowledge. Offline or inactive proof-of-work (PoW) nodes are not punished whereas in proof-of-stake (PoS), an offline node is punished. If a node falls, it must re-synchronize with the blockchain before continuing. With more nodes, a network becomes more secure and more decentralized. A high
creation of bespoke indicators and price derivatives. Newb, Typically, a newbie is someone who lacks expertise in a certain area. There are several similar terms that signify the same thing as newb, such as newbie, novice, and nub. A newb might include someone who is new to the realm of video games or cryptocurrency. This is comparable to the term freshman in college, which refers to a first-year student who is uncertain about what lies ahead. NFA, Like “Do your own research,“ NFA stands for “Not financial advice“. NFT, → “Non-fungible Token“ NFT Marketing Campaign, NFT marketing campaigns promote crypto art on NFT markets, blockchain groups, and social media channels. But also, traditional marketing channels such as e. g., billboards, ads, TV commercials, sponsoring, mailings etc. may be used. NFT Use Case, NFT use case describes how corporations or people use NFTs. NFTs can represent ownership of digital assets like artwork, paintings, photography, music, videos, or tickets. This minimizes intellectual property piracy and guarantee authors getting paid. NFTs may also denote ownership of automobiles or real estate opening new opportunities to commercialize these assets by creating a new market. NFTs may also provide product or service ownership for businesses. Businesses might generate additional money by selling NFTs from their products or brands. NFTs may even symbolize loyalty points or prizes for products or services to help firms engage and retain consumers. Nick Szabo, Nick Szabo invented Bit Gold, one of Bitcoin’s antecedents. Szabo devised smart contracts, which he defined as highly advanced contract law and e-commerce protocol standards throughout the internet. Smart contracts became a basis of Ethereum, the second-largest cryptocurrency. Some researchers think Szabo is Bitcoin’s creator Satoshi Nakamoto. According to certain publications, Szabo and Satoshi reached out to a similar number of individuals for criticism and guidance on their project, which some analysts believe circumstantial evidence that they are the same. Some report that Szabo and Satoshi offer comparable justifications for why Bitcoin must have value and similar writing styles. In addition, an Aston
116
Non-Fungible Assets tion by sending the identical nonce number to his own wallet. Users may adjust the gas price and resend a transaction with the same nonce number if it gets stuck. This transaction has a better chance of being verified as the nonce number is the same but the cost has been increased. Some wallets do both automatically. Non-Commercial Use, Non-Commercial licenses may limit non-commercial uses and use cases that are principally intended for or oriented toward monetary recompense or commercial gain. Non-Custodial, Non-custodial refers to a service in which the cash or assets are never held by a platform or third party throughout a transaction or service term. Instead, the whole operation (which is often of an economic nature) takes place through trustless smart contracts – the intricate self-executing sequence of code that powers blockchain networks. In contrast, custodial services hold an investor’s cash or assets for safekeeping, management, etc. Non-custodial services are seen as the example for decentralization and independence from intermediaries/middlemen/agents. Non-Custodial Wallet, With a non-custodial wallet, users have exclusive control over private keys, which manage the cryptocurrency and serve as proof that the assets belong to them. As there is no third party while using a non-custodial wallet, people are completely responsible for not losing the private keys and must take own steps to safeguard their assets. With a custodial wallet, the private keys are in the custody of a third party. Currently, the majority of custodial wallets are web-based exchange wallets. Non-Exclusive Rights, In the case of a simple right of exploitation, not only the person who has acquired the right of exploitation may use the work, but also the author himself and, if applicable, third parties. Non-Fungible Assets, Fungibility, or whether something is unique or not, is a crucial aspect of the identification of a digital asset. In the crypto realm, non-fungible refers to a unique, non-divisible entity (e. g., a NFT). The term token refers to a unique, non-divisible digital entity. Non-fungible assets (NFAs) vary from non-fungible tokens (NFTs) in two significant aspects. First, no entity other than the issuer is permitted to own units of this asset. Second,
number of nodes ensures that, in the case of network assaults, a sufficient number will remain to assure network continuity. Node.js, Node.js is an open-source, cross-platform runtime environment (RTE) and framework for running web applications outside the client’s browser. A RTE is a set of Web APIs and a parsing engine for JavaScript that a developer may use to write code. Node.js is a server-side programming language that is mostly used for event-driven servers such as ordinary websites and back-end API services, while it was designed with a push-based, real-time architecture in mind. Node.js is one of the JS engines used by every browser. Walmart, NASA, and Netflix employ node.js because it is much quicker due to its usage of single threads. Nominators, Nominators are one of the two principal participants in a blockchain network using the nominated proof-of-stake (NpoS) consensus method. In conventional proof-ofstake (PoS) networks, the power of an entity mining or verifying network transactions is entirely dependent on the quantity of the network tokens it has. NpoS is mostly associated with substrate-based blockchains like as Polkadot and Kusama. Nominators are likewise token holders, but do not actively participate in consensus processes. Instead, they utilize their financial support (in the form of tokens they hold) to nominate the validators of their choice for active seats. They, like validators, must adhere to the protocol’s norms or suffer repercussions. Nonce, Nonce is a technique to sequence and separate Ethereum blockchain and smart contract transactions. It is a non-repeated number used in cryptography to secure communication. An Ethereum wallet may quickly broadcast several transactions to the mainnet. To select which transaction is handled first, a method is needed, otherwise conflicting account balance transfers might create issues. If a broadcasted transaction has nonce value 2, it must be executed before 3. Higher-nonce-value transactions cannot be included in Ethereum mainnet blocks unless the ones preceding them are cleared and resolved on-chain. If a transaction with a low nonce value gets stuck (due to gas), all subsequent transactions with higher nonce values will also be stuck. The Ethereum network employs nonce for transaction cancellation and speeding. A user may cancel a transac-
117
Non-Fungible Token (NFT) video cameras and online apps. Blockchain services cannot yet directly replace notary services, as stated by the law, but they can already enhance the whole process regarding proof of existence and ownership, transfer, and storage. From country to country and state to state, notarization on blockchain could be either accepted or denied. Notice and Take Down, Notice and take down is a process operated by online hosts in response to court orders or allegations that content is illegal or infringing based on see the Digital Millennium Copyright Act 1998 and the Electronic Commerce Directive 2000. As a prerequisite for keeping limited liability, internet providers must promptly delete or prevent access to allegedly unlawful material when alerted of its presence. The internet service provider must also take appropriate action against repeated infringers, such as terminating their online accounts. Therefore, online service providers may include terms in their user service agreements that empower them to cancel or deactivate user accounts in the event of repeated copyright violations. Notice and Stay Down, According to the concept, the operator of an online marketplace must – in addition to a notice and take down – not only restrict material promptly if alerted of an obvious violation, but also prevent the same content from being accessible on the site in the future again. Suggestions for a notice and stay down law have been made in the US by pro-copyright lobbyists, and constitute Article 17 of the EU’s Directive on Copyright in the Digital Single Market. Nuclear NFTs, This is unrelated to the popular collection of nuclear geeks’ NFTs. Nuclear NFTs are very rare items and collectibles with over 1,000 owners. They represent their own project and cannot be exchanged without the agreement of all owners on the list. NVI, → “Negative Volume Index“ OBV, → “On-Balance Volume“ OC, → “Over-Collateralization“ OCC, → “Office of the Comptroller of the Currency“ OCO, → “One Cancels the Other Order“ Odysee, Odysee is a video platform and app allowing users to post and share videos with-
the identity of the entity connected to the asset cannot be altered. Therefore, NFAs vary from NFTs in terms of who may possess them (one approved entity) and in that they can represent many items. This is a game-changer for many firms. For example, customers may now be provided storage certificates without the possibility of manipulation. Non-Fungible Token (NFT), Traditionally, cryptocurrencies like Bitcoin are fungible, meaning they are interchangeable without additional examination. Traditional currencies like the USD also have fungibility. Tokens may not be fungible when used as digital proof-of-ownership of underlying assets. NFTs may be used to represent digital art. CryptoKitties, a famous Ethereum-based blockchain game, enabled players to trade cartoon cats by swapping tokens. Tokenization of real-world assets like artwork, photography, music, videos, pictures, real estate, stocks, commodities, etc. makes them transferable digitally. In this scenario, tokens represent unique, non-fungible tokens. A token may become non-fungible due to prior action, e. g., if certain Bitcoins – fungible by default — are used to pay for unlawful items or finance criminal activities and are marked criminal, they become less- or non-fungible, since exchanges and other service providers are unlikely to accept them. Noob , → also “Newb“ for a person who is unfamiliar with blockchain technology and cryptocurrencies. Notarization on Blockchain, Notarization is the official fraud-deterrent process that assures the parties of a transaction that a document is authentic, and can be trusted. A notary public guarantees the legitimacy of any signature affixed to a document during notarization. Notaries serve as official witnesses to the veracity of signatures attached to legal attestation documents. Blockchains excel in recording tamper-proof, time-stamped records and many real-world situations need timely proofs. Copyright requires to verify who made, discussed, or thought about anything first. This may be a song, writing, film, artwork, photography, innovation, or anything else of value. Another example is supply chain transparency, which aims to allow all shippers to trace shipments, inspect loading and unloading, and create an electronic bill of lading. Today, some US states already allow online notarization of documents using
118
Offline Storage uals started searching for an alternative, which led to the creation of the off-chain transaction with an improved second-layer solution that occurs outside of the main blockchain. With the use of these second-layer protocols, it is possible to bypass the problems encountered during an on-chain transaction by permitting a cheaper and quicker procedure. The second layer refers to the projects and protocols that are constructed on top of a basic blockchain in order to enhance the technology and user experience. Office of the Comptroller of the Currency (OCC), The Office of the Comptroller (OCC) is a US government agency. It is a treasury branch established in 1863 to oversee and control all US national banks, federal savings organizations, federal branches, and foreign bank agencies. The OCC, whose authority derives from the Bank Secrecy Act (BSA) of the US, periodically issues bulletins and advisories to ensure the consistent application of the BSA’s anti-money laundering (AML) regulations. Under the direction of ex-Coinbase CEO Brian Brooks, the OCC made headlines in 2020 with several progressive digital asset reforms and measures to explain its crypto policy and assist US banks in offering custodial services to their clients. Michael Hsu, the new Acting Comptroller of the OCC, said in May 2021 to revisit Brooks’ measures in what seems to be a more pessimistic appraisal of cryptocurrencies. Off-Ledger Currency, A off-ledger currency is a currency that does not live on blockchain or other distributed ledgers as e. g., all national currencies. Even though an off-ledger currency is not designed expressly for a blockchain, it may be utilized in one due to its functionality and widespread acceptability. For example, Ripple’s Ripplenet and Stellar’s blockchain may be able to transfer and convert off-ledger currencies globally using their own bridge currencies, XRP and XLM. Fiat currency is an example of an off-ledger currency since central banks issue it outside of blockchain networks. The US dollar (USD) is a notable example of an off-ledger currency, which is used globally due to its value and is often maintained as reserve currency by most financial institutions. Unlike an on-ledger money, it is issued without restrictions and is centrally managed. Offline Storage, Offline storage refers to the storing of an account’s private keys and its associated money on an offline device, which
out paying hosting costs using blockchain and BitTorrent technology. Being decentralized and censorship-resistant, there are no servers, algorithms, or people to ban content. The Odysee app lets people establish their own channel, submit videos, and subscribe to others. Channels and hashtags let viewers browse global content. Some people have described Odysee as the new YouTube for the far-right. OFAC, → “US Office of Foreign Assets Control“ Off-Chain, On-chain transactions are available to all network and blockchain users and are reflected on the distributed ledger. Off-chain transactions happen outside a blockchain. A transaction without ledger verification does not require miners. Off-chain transactions are instantaneous as no mining occurs. This process is faster, cheaper, and even more anonymous. Blockchain networks may reflect on-chain transactions on distributed ledgers with miners confirming the transactions by verifying the ledger. In the end, all transactions are recorded on-chain. Off-Chain Governance, Off-chain governance on public blockchains mirrors real-world politics. Various interest groups strive to seize control of the system by playing collaborative games to gain support. No code binds these groups to specific behaviors; instead, they assess what is in their best interests based on other stakeholders’ choices. Because choices are not legally binding, developers and miners have the most impact. Off-Chain Metadata, The off-chain metadata ecosystem offers a mechanism for associating data with asset IDs created during asset minting. This might be to give the asset a friendlier name or to provide a more thorough description or simply enrich the information on an asset in the metadata. Off-Chain Transaction, An off-chain transaction is an event that occurs outside of the primary blockchain, as opposed to an on-chain transaction in which crypto tokens are transmitted and received inside a blockchain network. It is a solution to the sluggish and expensive issues that customers have when doing on-chain transactions. Regardless of the currency one chooses to play with, blockchain technology has made it possible to transfer money anywhere around the globe. Consequently, individ-
119
Offshore Account a new currency by adding unique code to a blockchain that already exists, such as Bitcoin or Ethereum. As a result, they do not need to create the code from scratch. On-Balance Volume (OBV), On-balance volume (OBV) is a technique for predicting price fluctuations of an asset by using the variable of volume change. OBV is a compounding indicator that increases volume on up days and decreases volume on down days in order to measure the buying and selling pressure. According to the OBV principle, when an asset’s price finishes higher than its prior close, the 24-hour volume is considered up-volume. In contrast, the full day’s volume is considered ‘down-volume’ when the asset’s closing price is lower than its prior closing price. Like other volume-based indicators such as the Klinger oscillator, the money flow index, and the negative volume index, OBV will only work on marketplaces with exchange volume. OBV was developed by Joseph Granville. According to him, volume dictates how financial markets function, and price fluctuations are mostly determined by volume. Granville felt that if the market volume of an asset has a sudden rise, the asset’s price would ultimately experience a massive spike (either upwards or downwards). On-Chain, A blockchain system is simply a network containing a distributed ledger, which can be thought of as a shared database. Onchain transactions are those that are recorded on the blockchain and shared with all participants. Every time a new transaction is executed, a new block must be added to the blockchain, and consensus procedures must be adhered to for the transaction to be deemed genuine. Onchain transactions are those that occur on a blockchain and are reflected on both the public and distributed ledgers. Transactions that have been approved and authenticated by miners or authenticators are considered on-chain. When there are a significant number of transactions that need to be verified, delays may occur. On-Chain Governance, In blockchain governance, on-chain governance enables users to vote directly on changes to the underlying protocol. The responsibility of overseeing protocol updates, upgrades, and bug patches is given to the community as opposed to a centralized entity. The two sorts of choices that comprise blockchain governance are first the rules underpinning the protocol, which is the code, and
does not maintain a steady and continuous internet connection. This is done to prevent theft or abuse of user cash resulting from unauthorized and/or malicious access to the device. Offline storage guarantees that attackers cannot access the device, making it theoretically impossible for them to steal important financial data. Offline storage devices nevertheless connect briefly to the network when a transaction is performed disconnecting immediately after completion. This makes it very difficult, if not impossible, to assault the device during this brief interval. Hardware wallets like as Ledger, Trezor, and KeepKey are typical examples of offline storage devices, as are CDs, USBs, offline PCs, etc. Offshore Account, An offshore account provides for the sending and receiving of payments, the holding of funds, and the establishment of savings and investment accounts in at least one foreign currency, and occasionally several foreign currencies. Debit and credit cards are also often linked to offshore bank accounts. Hongkong, Panama, The Cayman Islands, The Channel Islands, the Isle of Man, Switzerland, and Singapore are among of the most well-known locales that provide non-resident and thus offshore accounts. Typically, a person or business will retain an offshore account due to the financial and legal benefits it offers, including but not limited to: strong privacy, including bank secrecy, minimal or no corporate taxes through tax havens, and protection from local political or financial instability. While the word derives from the Channel Islands being offshore from the UK, it has now acquired a broader meaning. Offshore banking has been linked to the black markets, organized crime, tax evasion, and money laundering. Offshore banking does not, however, prevent assets from being liable to personal income tax on interest. OHM Fork, Because blockchain technology is based on open-source protocols, anybody may examine the blockchain’s code, understand how it was produced, and consider methods to enhance it. If one arrives at a good concept and strategy, he or she may supply appropriate answers or establish a new cryptocurrency. In essence, this is what the term OHM Fork refers to. The process of adding new code to the OlympusDAO database, resulting in several blockchain variations. Users may establish
120
Open/Close tions and more functionality on-the-fly. When a user shuts them down or disconnects, they may become offline. Encryption and other security methods secure online storage devices and servers. Examples are browser-based wallets like MetaMask, mobile wallets like Enjin and Trust Wallet, and PC/Laptop-based wallets like Coinomi and Coinspot. Ontorand Consensus Engine (Ontology), Ontology Consensus Engine (Ontology or OCE) uses VBFT (Verifiable Byzantine Fault Tolerance). VBFT combines proof of stake, randomness, and fault tolerance with near-infinite scalability, security, and speed. Ontology blockchain is a distributed trust cooperation platform that connects multiple blockchains, improves business application performance, and allows mainstream consumers to access public blockchains without knowing their technical implementations. It is more powerful than standard two-party protocols like Diffie-Hellman and delivers the same degree of security with fewer steps. Open Source, Open source describes software or code that is open for examination, replication, and change. Open-source software enables users to use, analyze, edit, adapt, and distribute it without limitations. It also allows end-users to use the software or program without facing a lawsuit or other liability from the creators. Open source is not always completely costfree, as developers might charge for consulting and troubleshooting. Most crypto projects and codes are open source, so they can be readily reviewed, validated, and updated. Open source has also attracted developers, who may build new projects by changing current ones and adding new features. The open-source attitude of crypto has enabled an explosion of innovation not witnessed since the internet’s inception. Open/Close, Open/close may refer to the price at which a security or cryptocurrency opens and closes, for example at the start and end of the day. Traditional financial markets have set trading hours. Therefore, these phrases are more helpful there. In software development, open/close refers to extending software pieces (functions, modules, etc.) without changing source code. The code allows flexibility but restricts essential changes. This avoids the need to totally rewrite software for new needs. Blockchain development depends on the open/close concept, which allows for
second the incentive structure for the network, which is the economics. Due to a blockchain’s decentralized nature, governance might be challenging. On-chain governance is particularly advantageous in dispersed cloud-based systems, where agility is required to guarantee appropriate resource allocation. On-Chain Metadata, When an NFT is stored on-chain, the complete NFT, including the picture and all its information aka metadata, exists on a blockchain. In contrast, NFTs that are kept off-chain are stored partially or entirely outside of the blockchain are off-chain. On-chain storage is ideal since it enables users to validate all aspects of the NFT. However, relatively few NFT projects use this storage mechanism. One Cancels the Other Order (OCO), One cancels the other (OCO) order is an exchange order whose execution cancels the other, thus the name. An OCO therefore is a conditional order, similar to limit and stop loss orders, where buy or sell actions are automatically implemented when a trading price threshold is achieved or surpassed. Once one is executed for satisfying requirements, the other is null. It is a complicated trading method used by professionals to profit from rising prices or minimize losses in a falling market. OCO orders help traders in unpredictable markets. On-Ledger Currency, On-ledger money is blockchain-based currency. All cryptocurrencies use a shared distributed ledger (a single copy of the same database). On-ledger currencies might in the future replace off-ledger or fiat currencies. They are open, transparent (transactions and balances are visible to everyone), pseudo-anonymous (no direct user identification), need continual and incentive computing power (or other consensus process requirements), hard to counterfeit, and decentralized. They may be categorized by supply, public/private database, consensus process, community, use, liquidity, emission rate, wallet support, and other factors. Online Storage, Online storage is storing a crypto account’s private keys and money on a device or server with a permanent internet connection. Online storage devices provide simple access and convenience, but they can allow attackers to steal important information. Their user-friendly interface makes them popular with new users. Compared to offline storage devices, they provide quicker opera-
121
OpenSea tects smart contracts and users against external data feed manipulation. Other oracle solutions are only as secure as their data input. Optimistic Rollup, An optimistic rollup uses off-chain computing to record layer 2 transactions trustlessly. Periodically, the system releases a Merkle root of rollup transactions to update the main blockchain’s state. Before updating the state, external validators examine the Merkle roots. During the dispute period, if an inconsistency occurs, the validator can publish a fraud proof to roll back the system to its previous valid state. Positive rollups have a longer withdrawal time than zero knowledge rollups for layer 2 users. Optimistic rollups are more generalist than zero knowledge equivalents and can support smart contracts like the underlying blockchain. Apps may be launched considerably more easily with the rollup’s native smart contract functionality. Option, An option is a financial arrangement that lets its holder purchase or sell an asset without committing. Options have strike prices and expiry dates. They can trade stocks, cryptocurrencies, indices, and ETFs. American-style options allow holders to purchase or sell before expiry. European-style options enable holders to exercise only upon expiry. Call and put relate to buying and selling options. A call signal tells an option holder when and how to acquire an asset. Options are risky financial vehicles, but offer significant benefits over spot trading as they help investors allocate cash effectively, boosting profits. Due to lower financial obligations, they are less hazardous than futures and other financial products. Options Market, The options market is public. It lets traders purchase or sell at a defined price and time. Call/put options and strike prices are the market basics. An option holder’s desire to liquidate called a striking price. A trader must also comprehend Greeks. Greeks show options trading dangers. The delta symbol represents a monitored asset’s price change per dollar. Theta indicates a movement in an option’s price over time. An option’s time decay. Gamma is another choices symbol. It compares an option’s differential to a monitored asset’s price. Vega and rho are also utilized. Oracle Manipulation, Oracle manipulation, or oracle price manipulation, is a popular DeFi exploit that leads to system failure, theft, and other problems. Oracles are third-party service
capability extensions without severe modifications. OpenSea , OpenSea is a decentralized peerto-peer marketplace for buying, selling, and exchanging digital commodities/NFTs, from gaming items to collectibles and art. OpenSea bills itself as the biggest digital products marketplace, with over 200 categories. OpenSea enables exchanging digital art, decentralized domain names, trading cards, virtual worlds, digital collectibles, and more. The marketplace uses smart contracts while consumers keep their things in wallets. But, as long as the NFTs are in the user’s wallet, they may be advertised on OpenSea and other marketplaces. OpenSea collects 2.5 % of the purchase price of every NFT traded allowing over 200 payment choices, including DAI, USDC, REVV, SAND, MANA, wBTC, MEME, and more. Opera Mainnet (Fantom), Fantom’s mainnet, Opera, premiered in December 2019, making it a new blockchain. Open-source Opera allows staking and governance. Fantom’s Lachesis consensus combines Proof-of-Stake with asynchronous byzantine fault tolerance (aBFT) for faster, cheaper, and more secure transactions. Fantom transactions are instant compared to Bitcoin’s 15-minute blockchain transactions. Lachesis helps Fantom balance blockchain speed, security, and decentralization. Lachesis uses aBFT to allow nodes to autonomously construct blocks. Operating System (OS), An operating system (OS) manages a computer’s resources connecting applications to a computer’s hardware. Oss manage processes, memory, and files and denote virtual memory. Operating systems must also prevent unwanted access to files. Well known OS are e. g., Microsoft Windows, macOS, Chrome OS, Linux, Android, or Apple iOS. Optimistic Oracle, An optimistic oracle integrates real-world data with decentralized systems (e. g., blockchains) and accepts the data as true if it is not challenged within a specific duration. The optimistic approach varies from a price-feed oracle, which streams prices onchain without error prevention. Positive oracles may be utilized differently from price-feed oracles due to their construction. Besides asset prices, they may supply arbitrary data and longtail information requests. Since inaccurate data may be challenged, the optimistic oracle pro-
122
Over-Collateralization (OC) version offers better scalability and security than its predecessor. The protocol enables users to operate a node and randomly mint new blocks, making it more secure and simpler for developers to utilize. The main chain of Ouroboros Praos consists of epochs (groups of blocks), and each epoch has slots (opportunities to mint blocks). The duration of each epoch is proportional to the network’s total number of stake pools. Having pool operators (who operate stake pools) as part of the system has the primary benefit of making the network more accessible. However, with Ouroboros Praos, pools are not required to have a leader. Instead, they may divide tasks across all accounts in the pool. This implies that computing effort may be distributed among numerous accounts rather of just one, hence reducing the burden on each account. Ouroboros Genesis and Ouroboros Classic are the other two variants of the Ouroboros algorithm. Overbought, Overbought is when the price of a cryptocurrency climbs over time due to continued investments without a reasonable justification when usually selling follows oversupply. Technical analysis (TA) is employed in the digital currency ecosystem to detect whether an asset is overbought and when the trend will reverse. Fundamental analysis, which examines industry and macroeconomic data, may potentially identify an overbought position. Technical formulas used to identify overbought conditions include RSI, stochastic, and Williams%R. RSI values are between 0 and 100, with anything above 70 indicating overbought. The stochastic compares the current asset price to its peak and lowest values over a defined period with 80 or more out of 100 means it is pricey. Over-Collateralization (OC), Over-collateralization (OC) means providing more collateral than needed to cover default losses. It is used to mitigate risk by pledging an asset whose worth surpasses the loan’s. Over-collateralized stablecoins have a high reserve of cryptocurrency tokens to issue less stablecoins which reduces price volatility. However, collateralizing stablecoins as they gain popularity is not necessarily efficient since idle collateral might be employed elsewhere. Stablecoins may issue additional coins when the price rises and purchase them off the market when the price drops. This algorithmic supply manipulation eliminates the need for a collateral.
providers that feed blockchains with external or real-world data like prices, weather, and statistics. Price feeds are the most abused oracle data, allowing attackers to steal millions from DeFi systems. Oracles get pricing information in two ways. One is to obtain price data from exchange APIs. Oracles may also calculate by contacting decentralized exchanges (DEXs). Both systems have benefits, downsides, and manipulation possibilities. In the Harvest Finance attack, the perpetrator used oracle manipulation to breach a flash loan, reversing his transaction, and departing at a higher price. Oracles, Oracles are entities that connect data from the actual world to decentralized networks. The sent data may include price feeds, payments, temperature from a sensor, football game results, etc. Oracles are categorized according to their data sources (software/hardware) and the information flow between them and their sources (incoming/outgoing). Order Book, An order book is computerized record of a (cryptocurrency) exchange’s buyand-sell activities and displays purchase and sell orders for a certain asset. Electronic order books use a matching engine to automatically fulfill buy and sell orders. It features buyer and seller sections. Tables, line charts, and bar charts show buyer-seller interaction. The order book lists highest bid and lowest ask prices first. Orphan, → “Orphaned Block“ Orphaned Block, A legitimate block that is not part of the main blockchain is an orphan. Also known as a stale or detached block. There are several potential causes of orphaned blocks. Internet latency, the length of a blockchain, block size, and the speed of the node hosting the blockchain are among the most important. These variables result in two blocks having the same timestamp, which causes the main blockchain to reject one block and accept the other. One of the two blocks will then be an orphan despite being exact (the shorter chain). By factoring in the propagation delay and block duration, blockchain developers limit the number of orphans. OS, → “Operating System“ OTC, → “Over-the-Counter“ Ouroboros Praos, IOHK’s second proof-ofstake (PoS) protocol is called Ouroboros Praos. Praos means self-sufficient since this protocol
123
Overfitting blockchain for USDC on the BNB Chain, or vice versa. The primary advantage of blockchain bridges is that they make it simpler for customers to transfer their crypto balances to a different blockchain. Then, once on a different blockchain, the user may access numerous decentralized apps (dApps), some of which may be available exclusively on that blockchain. P2P DEX, Peer-to-peer decentralized exchange (P2P DEX) users may immediately trade with one other using non-custodial wallets, unlike AMM DEXs (PancakeSwap or Uniswap). They do not need to worry about temporary loss or smart contract abuses. They provide better anonymity since users do not have to register or supply personal information. P2P Trading, P2P trading is the transfer of digital data from one user to another (less any transaction costs). P2P trading platforms include e. g., AtomicDEX for cryptocurrencies and XBANQ, Nifty, or OpenSea for NFTs. Pair, A pair combines two cryptocurrencies for exchange trading. A dash or slash separates a pair of coins, so BTC/ETH is a Bitcoin/Ether pair. Traders may purchase Bitcoin with Ether or sell Bitcoin for Ether using this pair. Fiat-supporting exchanges may have crypto/fiat pairings. The first currency is the base, the second is the quote. Thus, a pair shows how much of the quote currency is required to buy one unit of the base coin. Bitcoin, Ethereum, and Tether (USDT) are most exchanges’ base cryptocurrencies and US dollar and EUR for fiat currencies. Choosing a trading pair with insufficient liquidity or volume may delay or prevent order fulfillment. Paper Hands, Paper hands is crypto slang for investors that sell too quickly out of risk aversion or loss aversion. They are said to crumple or fold like paper at the slightest strain and sell assets before allowing them to recover. Paper Trading, Paper trading or simulated trading is the activity of mimicking trading without the use of actual money by using a virtual transactional environment. Paper trading may be conducted using a variety of apps and software, as well as classic paper-based accounting techniques. Paper trading is primarily used to assess real-world trading procedures, expectations, and results without incurring risk. In addition, since the trading scenarios are entirely hypothetical, they may be used to
Overfitting, Overfitting happens when a model fits the training data too tightly and memorizes the noise, resulting in worse performance on unknown data. Models tend to overfit due to their complexity (e. g., because they have too many parameters). Simple models often generalize better, since they concentrate on the data’s strong and consistent correlations. Finding the best model entails finding the ideal balance between bias and variance, which is often quite challenging. Oversold, Oversold means a cryptocurrency market is below its genuine worth. Analysts use numerous techniques to determine if an asset, security, or cryptocurrency is oversold. RSI and Bollinger bands are common oversold indicators. RSI employs a momentum oscillator to measure price fluctuations. Bollinger bands have a bottom, middle, and top. Oversold happens when values go higher than the central band. Fundamental analysis (FA) may also show oversold conditions. Over-the-Counter (OTC), Over-the-counter (OTC), often also termed off-exchange trading, is a transaction made via intermediaries outside of a typical trading platform. OTC is favored by private traders because it often involves enormous transactions and provides more price freedom than exchanges. Over-the-Counter (OTC) Trading, As opposed to a centralized exchange, securities are traded over-the-counter via a broker-dealer network. Since OTC prices are not announced publicly until after a deal has been done, a trade between two parties may occur without others being aware of the price at the time of the transaction. Despite its benefits, OTC trading has more counterparty risks and may be afflicted by insufficient liquidity when large trading sums are involved. P&D, → “Pump and Dump Scheme“ P&L, → “Profit and Loss Statement“ P2P, → “Peer-to-Peer“ P2P Bridge, A P2P bridge is a feature of decentralized exchanges (DEX) that allows two users to trade the same coin across two blockchain protocols without a third-party. P2P bridges promote blockchain interoperability by facilitating P2P trade, without blockchain validation costs (i. e., gas fees) or platform transaction fees. A bridge enables a trader, for instance, to exchange USDC on the Ethereum
124
Payee nication but do not participate actively in the proposing and voting procedures. If different participation keys are stored in a single participation node, the node may represent several users. Passive Income, Passive income is money earned through investments without the earner’s active participation. With the expansion of the crypto and decentralized finance (DeFi) sectors, more opportunities are emerging for passive income investors. Lending, staking, and yield farming are prevalent strategies in DeFi for generating passive revenue. Staking is a means for users to gain additional benefits while contributing to the security and decentralization of the network. Yield farming is another prevalent strategy in DeFi for generating a passive income. Password Manager, With so many passwords to remember, many internet users utilize a password manager. A password manager encrypts and saves a user’s credentials for easy access. A web browser may already contain a password manager, but one may also download one. Password managers may render users susceptible to losing access to all accounts, hence many demand 2FA for further security. If someone steals or phishes the master key (password to the password management), they may access all of the user’s passwords and login information. Paul Le Roux, Paul Le Roux is a cryptographer, international crime kingpin, and former DEA informant. Adopted by a young couple who subsequently migrated to South Africa, he was born in Zimbabwe. The Liberian police and DEA agents captured him during a cocaine and methamphetamine transaction with a Colombian cartel (composed of undercover DEA agents). In the US, he was sentenced to 25 years in jail for his crimes with RX Limited and his worldwide criminal enterprises. Even though he had become a murderer and worldwide criminal leader, many believe that his talent in coding and encryption makes him possibly be Satoshi Nakamoto, Bitcoin’s creator. Payee, A payee is a recipient of goods or services. Payers pay payees via cash, cheque, or other means. The payers afterwards get goods, products, or services. Payees might be many parties in a transaction or just one individual. In each transaction, there is always a party who provides products or services and a party that
any financial asset, including indices, currencies, stocks, bonds, futures, margin products, and even cryptocurrency. Beginner traders may invest a specific quantity of virtual assets and leverage them against the market data offered. In this manner, individuals can get reliable results, try numerous trading methods, measure their moods, and practice risk management prior to committing real capital. The most popular paper trading platforms are Swim, Think, and Jstock. Paper Wallet, Paper wallets feature printed or handwritten keys. The decline in popularity of paper wallets is attributable to advancements in cryptocurrency storage technologies. Despite offline features such as cold storage devices, paper wallets offer various risks as e. g., even printing a file on paper may create a digital trail that hackers might exploit. Parachain, Parachains are application-based blockchains that operate in parallel inside the Polkadot network. Parachains are linked to Polkadot in a hub and spoke topology, enabling developers to establish other, independently functional networks powered by the main chain. Substrate, a new-generation blockchain framework with web3 capability, is used to construct parachains. Each parachain is linked to the main chain by the Relay Chain, allowing them to operate independently without damaging the network. A parachain may have its own functionality, token, governance system, and other properties. Each parachain may still utilize the Polkadot network’s security and validator mechanism since it is connected via Relay Chain. Parachains do not need their own validator community. Since a parachain’s economics might vary from Polkadot’s, they can establish separate transaction fees. Participation Node, Nodes are network-connected, IP-addressed electrical devices. Who has access to a distributed ledger is not governed by a central authority therefore anybody may run such a node. Participation nodes, one of the most powerful nodes in Algorand, contribute to the Alog consensus process by verifying and introducing new blocks. Participation keys are used to sign consensus protocol messages and are stored. Each network member must stake ALGO and produce a valid participation key in order to become a participation node. Participation nodes are controlled by relay nodes, which facilitate inter-node commu-
125
Peer-to-Peer (P2P) Algorithmic stablecoins retain their peg via collateralization and smart contract algorithms that contract and extend supply dependent on market circumstances. Pegged Currency, A currency peg is used to stabilize a currency by tying its value to another, more stable currency at a specified ratio. Pegged currency helps governments create credibility and discipline in monetary policy, particularly in poor and fragile nations. Non-pegged countries are subject to external influence, leading to trade imbalances where automatic exchange rate adjustment may be problematic. Stablecoins are the latest pegged cryptocurrency. Stablecoins are backed by real-world assets like fiat cash. Stablecoins may ease liquidity difficulties on cryptocurrency exchanges and pave the way for new financial services like loans and insurance in the cryptocurrency ecosystem. Period Mean, The period mean is the average of all observations in a specific time period. A forecasting model can always predict this value. Permanent Records, The Ethereum blockchain maintains digital collectibles indefinitely, thus the crypto collectibles will never vanish until manually erased them from the ledger. Permissioned Ledger, Permissioned ledgers are closed-source distributed ledger technology (DLT) variants where participants are known and authorization is needed before network use or activity validation. This distinguishes them from open public networks like Bitcoin and Ethereum blockchains, which do not need authorization. Permissioned ledgers are better for organizations or consortiums that need private, non-public information. Permissioned ledgers differ from centralized databases by having different contributors and no single point of failure. All data is verified via encryption and digital signatures, unlike centralized databases. Permissioned ledgers may be built on public networks, but are designed and executed differently. Semi-centralized permissioned ledgers need consent from all permitted parties and their decentralization, transparency, anonymity, security, and censorship-resistance varies. R3, B3i, and Hyperledger are examples of permissioned ledgers. Permissionless, A system is considered permissionless if it lacks gatekeepers and censors.
receives them. In banking, the payee must have an operational, good-standing account through which the payer may send payments unless the transaction is in cash. The promissory note promises to pay a set amount to the payee. Peer-to-Peer (P2P), P2P is a distributed network in which computer systems exchange data or activities. A central server is not needed to handle such communication and all peers have the same rights. A P2P system just requires an internet connection and software (or protocol). In the absence of a central server, peers or nodes make their resources accessible to the network. P2P is important for blockchain and cryptocurrency, but P2P is not necessarily blockchain-based. E. g., BitTorrent was not blockchain-based before Tron’s takeover, but it remains one of the biggest P2P networks. Peer-to-Peer (P2P) Lending, Peer-to-peer lending bypasses the intermediaries/middlemen/agents in conventional banking systems. In P2P lending, investors loan money to approved borrowers. A P2P platform might determine the interest rates and parameters for the loan arrangement, and after both parties agree, the transaction is accomplished. Like conventional P2P loans, blockchain loans need fiat or digital currency collateral. This technology automatically executes smart contracts based on loan conditions, enabling trustless transactions between parties. Because the lender’s name is usually hidden, there is no creditworthiness review or prior history to consider. Crypto P2P lending systems are becoming more popular as these services are offered 24/7 and are more efficient than conventional banking as no KYC is required. Thus, lenders and borrowers may engage completely anonymously, which was hitherto impossible. Peg, A peg is a fixed exchange rate between two assets. Pegs enable foreign currencies to be swapped for the base currency at a predetermined rate. Pegs increase commerce between countries, limit expansion risks, and stabilize macroeconomic activity. Peg also refers to a cryptocurrency token’s target price. Stablecoins are cryptocurrency assets that keep their value over time. E. g., USDT, DAI, and FRAX are $1-pegged stablecoins. Changing the token supply will adjust each token’s price until it meets the desired peg. Collateralized stablecoins like USDT and DAI are produced and burnt using other digital assets as collateral.
126
Platform transparently mirror the targeted website, enabling the attacker to view everything as the victim navigates the site and even traverse additional security barriers alongside the victim. Phishing is by far the most prevalent cyberattack in 2020, with the FBI’s Internet Crime Complaint Centre registering nearly twice as many phishing instances as any other sort of computer crime. There are several forms of phishing, including email (spear, whale, and CEO phishing), phone, SMS, page, and calendar phishing. Phone Phishing, Phone phishing is the practice of utilizing fake phone calls to extract money or sensitive information from victims. Phone phishing includes impersonating trustworthy organizations or persons. Attackers would phone unsuspecting victims and offer extended warranties, antivirus software, charity contributions, or free vacations. They ask for credit card numbers and other financial details. Hackers may also use fear and threats to get money. They prey on vulnerable individuals like immigrants, threatening imprisonment, penalties, or deportation if they do not pay taxes or a specified amount of money. Phone phishing schemes may use ultimatums or urgent warnings to scare victims. Physical Bitcoins, A material Bitcoin is a physical token with a complex design, a public key, and a private key. Most individuals who produce physical bitcoins utilize 3D printers. The designs vary since they are not generated by a centralized body but rather by hobbyists. Some coins are coated with metal, while others utilize pure silver or gold. The value of the coin resides in its reverse, which carries the private key for the bitcoins itself. PKI, → “Public-Key Infrastructure“ Platform, A computer platform or digital platform is an execution environment for a piece of software. It might be the hardware, the operating system (OS), a web browser and its accompanying application programming interfaces, or other underlying software, so long as the computer code is run with it. The abstraction layers of computing platforms include computer architecture, operating system, and runtime libraries. On a computing platform applications are executed. In the crypto world, platform refers to the blockchain on which tokens are created. It may also refer to a cryptocurrency
Basically, all blockchains are permissionless, since no entity may prohibit anybody else from utilizing it. In contrast, permissioned systems feature an entity that restricts who and/or how the system may be utilized. Permissionless blockchains guarantee that no one is subject to discrimination or censorship, and that everyone has an equal chance to participate. This contrasts with permissioned networks as Facebook, YouTube, Twitter, TikTok, or business blockchains, where a central entity may limit or censor network members or certain activities/ transactions. Perpetual Contracts, A sort of derivative, perpetual contracts enable traders to bet on the price of an asset. Like futures, a leveraged position is opened using tokens as collateral. Futures contracts are resolved after a predetermined time period, while perpetual contracts have no expiry date or settlement date, allowing traders to retain a contract indefinitely. As the expiration date approaches for typical futures contracts, the contract’s price increasingly approaches the spot market price of the underlying asset. Due to the lack of an expiration date, perpetual contracts contain a premium known as a funding payment, which is paid between traders to atoshin the price in line with the current market. Personal Data, Personal information is any information about a distinct or identifiable live person. Personal data also includes all kinds of information that, when combined, might lead to the identification of a certain individual. PFP, PFP is an acronym in texting and social media. It means both picture for proof and profile pic. This type of non-fungible token is gaining popularity as many holders are incorporating them into their social media profiles. Numerous of the most popular NFT collections in the world, such as Bored Apes and Doodles, are PFPs. NFTs are somewhere in between collectibles and generative art. PGP, → “Pretty Good Privacy“ Phishing, Phishing is a sort of social engineering in which an attacker sends a false (e. g., faked, phony, or otherwise misleading) communication to deceive a person into divulging important information to the attacker or to install harmful software on the victim’s infrastructure, such as ransomware. Phishing attempts have gotten more complex and often
127
Player Payout Politeia (Decred), Politeia is a decentralized governance framework for Decred. It enables users to post suggestions, debate them, and vote on them. Proposed modifications to the Decred project are submitted to Politeia in the form of a proposal. This might range from a modification to the consensus rules to money for a development project or marketing campaign. Voting on proposals is open to any user who has staked DCR at the time of the vote. In Politeia, stakeholders decided to transition from Bitcoin’s informal governance style to a more formal one. Polygon, Polygon is a coin (MATIC) and a technology platform that connects and scales blockchain networks. Polygon launched in 2017 as Matic Network. The Polygon uses the Ethereum blockchain and links Ethereum-based projects. Polygon can boost a blockchain project’s flexibility, scalability, and sovereignty while maintaining the Ethereum blockchain’s security, interoperability, and structure. MATIC is an Ethereum-based ERC-20 token used to govern, secure, and pay network transaction fees. Ponzi Scheme, A Ponzi scheme is a fraudulent investment plan in which current investors are paid with monies gathered from new investors. Organizers of Ponzi schemes often guarantee large returns on investments with little or no risk. In most Ponzi schemes, however, the fraudsters do not even invest the funds. Bernie Madoff was a Wall Street broker whose wealth management firm was a Ponzi scheme that robbed billions of dollars from investors over two decades. The FTX fraud may potentially also be considered a Ponzi scheme. PoRep, → “Proof-of-Replication“ Portfolio, The phrase is derived from the Italian word for a container meant to transport loose papers (portafoglio). I t is a collection of diverse financial assets held by investors. This collection may also include gold, equities, funds, derivatives, real estate, cash equivalents, cryptocurrencies, NFTs, tokens, coins, and bonds, among other assets. Portfolio Tracking, Tracking a portfolio is one of the guiding principles for any successful investor. Portfolio tracking is the approach for investors who seek to correctly (and immediately) monitor the performance of a set of investments over time. With portfolio track-
exchange on which cryptocurrencies may be traded. Player Payout, Player payouts automatically compensate online gamers following tournaments in E-sports. The blockchain network and smart contract technologies guarantee that cryptocurrency payments are immediate. E-sports is a billion-dollar sector and one of the fastest-growing. E-sports competitions are large, worldwide events with often millions of participants and followers. Tournament organizers may automate winnings distribution using smart contracts and DEXs. This assists all parties to avoid excessive transaction costs and encourage more organizers and participants to join Play2Earn (P2E). Smart contracts automate these transactions depending on pre-defined, possibly performance-based criteria. Play-to-Earn (P2E) games, Play-to-earn (P2E) games provide players the opportunity to win and acquire assets that may afterwards be transferred to the real world. On the blockchain, these tokenized digital assets might be coins, Tokens, NFTs, cryptocurrencies, accessories, etc. Axie Infinity is an excellent example of a P2E game since it allows players to breed and earn Axies using in-game tokens. People in the Philippines have reportedly made around $2,000 per month by playing AxIE Infinity as a pastime. Plutus (Cardano), Plutus is a powerful programming language that enables Cardano developers to build smart contracts. It is built on the Haskell programming language. Using Plutus and Haskell, developers may construct dApps (decentralized apps) and then execute them safely and effectively on the blockchain. This ensures that if people provide the same input data to their contract, it will always provide the same outcome. Haskell has been used for many years to create essential financial software such as the Barclays trading platform and the Bloomberg interface. PND, → “Pump and Dump“ PoA , → “Proof-of-Authority“ POAP, → “Proof of Attendance Protocol“ PoB, → “Proof-of-Burn“ PoD, → “Proof-of-Developer“ PoH, → “Proof-of-History“ PoIM, → “Proof-of-Immutability“
128
Price Impact Pre-IDO, A pre-IDO lets everyone contribute in prospective DeFi initiatives, unlike a presale. IDOs are one approach to generate project financing, but market conditions affect the token price. Pre-IDOs provide democratized investor access and pricing advantages over IDOs. Investors gain quick liquidity after a lockup period. Pre-Mine, Pre-mining is the production of a particular quantity of a digital currency prior to its release to the public. In the realm of cryptocurrencies, pre-mining is analogous to the practice of selling employees a part in a business before its first public offering (IPO). In the case of a digital currency, the coins produced previously are placed aside prior to the introduction of the currency to create value for their owners once they become transferable. In most instances, these first coins will be distributed to ICO investors, developers, and team members who contributed to the creation of the currency. Pre-mining is not be mistaken for Premine, a cryptocurrency with the currency symbol PMC. Pre-Sale, Before an ICO, some crypto companies sell tokens to interested parties at a set price. This might benefit investors and the development team if the digital currency is successful. The project’s developers get much-needed funding, while investors purchase a cryptocurrency, token, or coin with high future value. Developers may launch a pre-mine to build excitement before the ICO and boost the asset’s price when it becomes public. Pretty Good Privacy (PGP), Pretty Good Privacy (PGP) is an encryption application that offers data transmission with cryptographic privacy and authentication. PGP is used to sign, encrypt, and decrypt texts, e-mails, files, directories, and whole disk partitions, as well as to strengthen the security of e-mail exchanges. In 1991, Phil Zimmermann created PGP. PGP and comparable applications encrypt and decode data according to the OpenPGP standard (RFC 4880), an open standard for PGP encryption software. PGP encryption employs a sequential mix of hashing, data compression, symmetric-key cryptography, and ultimately public-key cryptography; each phase employs one of a few approved algorithms. Each public key is associated with a particular username or email address. Price Impact, Price impact describes the relationship between an incoming order and the
ing, investors may monitor investments such as equities, mutual funds, tokens, coins, and cryptocurrencies from a centralized dashboard. Portfolio monitoring, whether via an Excel spreadsheet or a sophisticated software, gives a more complete perspective of how assets have been allocated, the condition of current assets, and the profitability and losses of the portfolio as a whole. PoS, → “Proof-of-Stake“ Position Size, Position sizing relates to the size of a position inside a certain portfolio, or the quantity of dollars or euros that an investor will trade. Investors use position size to calculate how many units of a securities they may acquire, therefore controlling risk and optimizing returns. Most individual investors risk no more than 2 % of their investment capital on a single transaction, but fund managers often risk less than this amount. PoSt , → “Proof-of-Spacetime“ Post-Mine/Post-Mining, Post-mining is the process by which developers produce new coins after the launch of a cryptocurrency but before public mining is available. This enables the team to generate new currencies without external competition. This may occur between the snapshot date — such as when token balances are calculated so a freshly generated currency can be sold or traded on exchanges — and the time when the code for mining new currencies is made available to the public. PoT, → “Proof-of-Time“ PoV, → “Proof-of-Validation“ PoW, → “Proof-of-Work“ PpoS, → “Pure Proof of Stake“ Prediction Market, A prediction market is a platform based on the guessing about the outcomes of events across a broad range of businesses. In predictions, as opposed to ordinary markets where individuals speculate on the price of an object, investors may bet on the outcomes of events such as elections, athletic events, and contests. Prediction markets have recently shown ludicrous forecasts, such as the color of the suit worn by the US president during a speech or the number of coronavirus cases. Many contemporary prediction markets employ blockchain technology to provide various incentives to entice individuals to speculate on forecasts.
129
Privacy by Design ledger is typically limited to authorized people. These accounts may include capital, wages, cryptocurrencies, tokens, NFTs, drawings, etc. Procedural Programming, Typically, procedural programming is the first paradigm a developer learns. Procedural programming divides the program into procedures, also known as routines or functions, which consist of a list of activities to be performed. In contrast to object-oriented programming, procedural programming focuses mostly on functions instead of objects. The concept of procedurally-oriented programming is based on algorithms. Haskell, C, Pascal, Fortran, and BASIC are some examples of procedurally-oriented programming languages. Profit and Loss (P&L) Statement, Profit and loss (P&L) statements are sometimes also called income statements, operating statements, earnings statements, and statements of operations. The P&L indicates income, costs, profits, and losses. It shows how much profit a firm makes or loses, helping one make investment and business choices. First, costs of goods sold (COGS) – being production and sales expenses – are subtracted from total net sales to determine the P&L. In a second step, operating expenditures include administrative wages, office supplies, rent, and utilities are subtracted leading to net income before taxes, interest, and exceptional costs (if any). Programmability, Programmability distinguishes a computer from other electrical devices being a device’s ability to obey programmed instructions. The crypto sector has discussed ways to generate digital, programmable money. Programmable money in the digital environment, particularly cryptocurrency, means increased flexibility and the ability to define new rules. These determine when, when, and how value is traded. Such new rules might allow diverse functionality and automated use-cases, such as smart contracts to handle smart device payments or improve company procedures. Programmability in this regard may reinvent how humans and devices interact. Proof-of-Attendance Protocol (POAP), Proof of Attendance Protocol (POAP) is a company that uses Ethereum’s ERC-721 NFT protocol to provide people a unique, non-fungible blockchain-based identification. POAP identifies persons, not transactions or value, using blockchain, which underlies digital assets and
price change of the traded item. Buy trades raise an asset’s price by emptying the lowest sell orders in the order book; selling transactions do the converse. The price movement caused by transactions relies on the trading pair’s liquidity. More liquid trading pairs will have less price influence. Traders must consider the influence of their deal on the asset price, particularly on illiquid marketplaces or while making large trades. Because of their market influence, their second purchase trade will be more costly. Privacy by Design, Privacy by Design is equivalent to data protection by technological design. This is based on the belief that data protection in data processing methods is adhered to most effectively when built into the technology from the start. Privacy Policy, The policy on data privacy of a company is usually documented in writing specifying how the business manages data processing. It provides evidence of the steps done to ensure data privacy compliance. It outlines, among other things, the technological and organizational measures for personal data protection safeguarding. Private Blockchain, Only one organization controls a private blockchain meaning the public cannot join. Private blockchain systems all need an authorization mechanism to identify users and are usually built for company internal networks. Private blockchains are therefore not decentralized and might contain laws that public platforms do not. For example, all nodes may need to follow particular standards to maintain smooth processing. As fewer individuals have access privacy and discretion are higher. Private blockchains are best used inside an organization’s internal system. Private Key, A private key is a string of alphanumeric characters that is formed when a crypto wallet address is created and acts as its password or access code. Whoever has access to a private key has complete control over the wallet associated with it, access to the assets stored within, and the ability to sell, move, and exchange assets. Using hardware wallets to store cryptocurrencies offline is an effective method of protection. Private Ledger, A private ledger is a ledger used to record the director’s accounts or other highly sensitive accounts. Access to the private
130
Proof-of-Spacetime (PoSt) Hermez (HEZ) Network uses proof-of-donation as coordinators compete for the privilege to process transaction batches using HEZ while 40 % of each successful bid is given to Gitcoin to support Ethereum public goods, 30 % is burnt, and 30 % is redistributed to the network. Proof-of-History (PoH), Proof-of-history (PoH) is a technique for embedding time itself into the blockchain in an effort to lessen network node burden. PoH combines eth proof-of-history with Tower Byzantine Fault Tolerance (Tower BFT), a security mechanism that enables users to stake tokens in order to vote on the veracity of a PoH hash. In order to identify the passage of time, historical events are now turned into a hash that can only be created by preceding events. This way of establishing the time is almost instantaneous, making e. g., the Solana blockchain very scalable. Proof-of-Immutability (PoIM), Proof-of-Immutability (PoIM) is a blockchain system that stores metadata in a distant hash vault using a sophisticated hash-based technique. PoIM enables network members to verify the veracity of one another’s data (by confirming its immutability) at any moment without breaching the privacy of the party being inspected. It is anticipated that inter-parallel chain communication will be built to meet the trust and data privacy protection needs for permissioned and permissionless networks. Proof-of-Replication (PoRep), Proof-of-replication (PoRep) is how a atoshi (or other) storage miner ensures they have a unique copy of network data. PoRep enables a prover to demonstrate they are utilizing space to keep data replicas. PoRep also makes the prover’s data readily retrievable. In a PoRep network, users desire to store as much data as possible to get network incentives. However, PoRep ignores the fact that duplicated data must be sent whenever a new node is added to the redundancy pool, which might utilize bandwidth. Proof-of-Spacetime (PoSt), Proof-of-spacetime (PoSt) is how atoshi storage miners confirm they are storing unique data for the network. PoSt is like a proof-of-capacity in that network members must be financially motivated to engage honestly and not be motivated to destroy the coins or network. PoSt requests network members prove they have been physically storing data for a while. Randomly picked miners will have their data verified. According
non-fungible tokens. Event attendees may validate their presence using POAP’s on-chain digital badges with each badge being unique and non-replicable. It gives indisputable evidence that someone attended an event. Future employers are more inclined to believe and appreciate knowledge if one attended Harvard or have a great career track record. More and more event planners therefore utilize POAP. Proof-of-Authority (PoA), Proof-of-authority (PoA) enables significantly quicker transactions via the use of a Byzantine Fault Tolerance (BFT) algorithm using identification as the stake. PoA is a sort of consensus mechanism designed for businesses or private groups who want to establish their own blockchains. Existing public blockchains, such as Etherscan and Cardano, may serve as models for these networks’ designs and ways of operation. Proof-of-Burn (PoB), Proof-of-burn (PoB) is a blockchain consensus technique with low energy use to validate transactions. Decentralized systems use PoB to burn money to attain consensus destroying coins forever. PoB employs virtual mining machines to verify transactions, unlike PoW-based decentralized networks like Bitcoin. PoB miners burn coins to advertise their network participation and mine. On PoB networks, sending coins to an eater address burns them. Burning coins thus shows a miner’s virtual mining power. As with PoW, more mining power speeds up block discovery. The miner earns more. Unlike PoB, coins stored in PoS systems are not completely deleted; holders may still access and trade them. Proof-of-Developer (PoD), Proof-of-developer (PoD) is a protocol that aims to link a blockchain project with its actual developer or developers. PoD began in 2014, when crypto investors incurred losses due to pump-anddump schemes as coin creators or unscrupulous investors fraudulently boosted the value of coins in the digital currency market. The PoD system saves the names, nationalities, social media handles, and personal email addresses of developers. Proof-of-Donation, Proof-of-donation integrates charity contributions into blockchains facilitating a smart contract-triggered payments to a charity. The gift might go to a charity’s wallet or a DAO-controlled fund. Proof-of-donation modifies proof-of-burn to add charity and sustainability to blockchain transfers. The
131
Proof-of-Stake (PoS) block. PoW makes blockchain tampering harder since each change would require editing all blocks. Protocol, Set of rules that defines network interactions, typically involving consensus, transaction validation, and network participation on a blockchain. Protocol Layer, The three layers of a blockchain are the application layer, the contract layer, and the protocol layer. The protocol layer of the blockchain serves as the network’s basis. This layer may be extended by developers so that they can build new rules for their blockchain networks and design new transactions and smart contracts that adhere to the rules of their blockchains. The protocol layer therefore is a collection of rules and designs that may transmit value from one address to another, record transactions in a ledger, produce new blocks, or transactions, in the chain, and establish an agreement on which transactions are legitimate among network members. The protocol layer determines whether the rules for adding information to a blockchain are simple or complicated. Pseudonymous, Using a fictitious identity or name, such as e. g., Satoshi Nakamoto for a still not fully confirmed person or Robert Galbraith of J. K. Rowling while writing, blogging, commenting, or publishing. Public Address, A public address is the cryptographic hash of a public key, which enables its usage as a payment request address and receive crypto assets. The creation of cryptocurrency public addresses is free, and there is an infinite supply of them. The public key and private key are essential components for ensuring the security of crypto assets. A public address consists of a string of numbers and characters, often accompanied by a QR code. Public Blockchain, A public blockchain is a decentralized platform that anyone may join, write, and read on. In a blockchain, transaction data is recorded in blocks. Once verified, publicly viewable platform data on public blockchains cannot be changed. A public blockchain provides more transparency than private networks and is more decentralized since anybody may join. However, many public blockchains have slow transaction rates and scalability difficulties.
to Tal Moran and Ilan Orlov, the real cost of storage is proportional to storage capacity and time consumed. Proof-of-Stake (PoS), Proof-of-Stake (PoS) validates blockchain transactions and eliminates duplicate counting. When a currency or token is used for many transactions, double counting may happen. PoS was developed to replace Proof-of-Work (PoW) for Bitcoin transactions. Many academics think PoS is more energy-efficient and secure than PoW. In a centralized setting, like a bank supervising fiat money, double counting is simple to identify. Proof-of-Stake requires miners with more money in the system to validate more blocks. PoS structures are less susceptible to cyberattacks since the way the system prioritizes rewards disincentives miners from attacking. Proof-of-Time (PoT), Proof-of-Time (PoT) is a decentralized consensus mechanism that selects validators based on their ranking scores and fixed stake. The program provides each validator a rating score based on its past performance (time). A fixed stake is a staking technique in which all validators stake the same number of tokens in order to participate in the consensus process. PoT consensus utilizes the verifiable delay function (VDF) to pseudorandomly choose block proposers (time electors) and confirmation nodes (time nodes). Proof-of-Validation (PoV), Proof-of-validation (PoV) is a proof-of-stake (PoS) consensus process that uses staked validator nodes. Each node in a PoV system stores the transaction sequence in blockchain blocks. A user’s public key and the crypto token that the node possesses can identify all user accounts. A user may then stake coins in validator nodes. The quantity of tokens staked in each validator determines its node count. A new block is confirmed when two-thirds of the network’s validators commit to it. PoV protocols can be Byzantine fault-tolerant, but only if one-third or fewer of the network’s nodes are compromised. Proof-of-Work (PoW), Cryptocurrencies are decentralized, unlike fiat money, which is governed by a bank. Proof-of-Work (PoW) allows cryptocurrencies to operate without a government or enterprise. This consensus process prevents duplicate spending, or using a currency or token more than once. It is how blockchains add new blocks and verify transactions. When a miner completes PoW, the network accepts a
132
Pure Proof-of-Stake (PpoS) include PKI, which enhances the security of network users’ online traffic. It is often used to protect the safety of linked devices and to secure internal communications in companies. In the digital world, the PKI technology is also related with cryptographic keys that encrypt and service authorized users and devices. To confirm that a certain key belongs to a particular person or device, the PKI enlists an additional trusted party to validate the authentication using digital signatures. PKI is crucial because it entails encryption and identity verification, which facilitates dependable, secure internet communication. PKI is implemented using two primary systems: certificates and keys. Pump, In cryptocurrency trading, the term pump refers to rapid increase in the price of a digital asset, often at a quicker rate or with bigger fluctuations than usual. Social media news, such as Twitter, are often at the core of producing a great deal of talk about a cryptocurrency, so helping to pump the price of an asset. The crypto market has been pumped by actors, celebrities, social media influencers, professional sports, and tweets from Elon Musk. Pumping may also have a negative meaning, referring to the conduct of social media influencers who pump up a currency or token in order to urge their followers to purchase it, so contributing to its price increase. Unfortunately, pumps are often followed by dumps, in which an influencer or whale sells an inflated currency for a massive profit, forming a pump and dump (P&D) scheme. Pump and Dump (P&D) Scheme, As cryptocurrencies have gained popularity, so have pump and dump (P&D) schemes. P&D schemes target a certain coin or cryptocurrency and artificially drive demand up. Their goal is to increase the coin’s price, mostly with low-volume coins. As the targeted coin’s price rises, numerous traders flock to it, further pushing demand and price. The coordinated activity is repeated in the other direction, when organizers quit the market after a price objective is accomplished. The outcome is a rapid decrease in the currency’s price, resulting to enormous losses for traders who did not know about the scam and acquired the coin with unreasonable expectations. P&D traders often collaborate via Discord and Telegram. Pure Proof-of-Stake (PpoS), Algorand is a blockchain system based on pure proof-of-
Public Domain, Public domains’ work may be reproduced and used without authorization. In general, a work is regarded to be in the public domain if it is ineligible for copyright protection or if its copyright has expired. Public Key, A public key is a string of alphanumeric characters used to encrypt plaintext. A public key is used in P2P transactions without revealing private key composition, providing a cryptographic function that permits safe and secure asset and information exchange without a third party. A user’s public key allows him to transact with anybody. All private keys, which are used to access crypto money, have an asymmetric public key. This assures no one can get a user’s private key from their public key. Private keys encrypt transactions to prevent illegal access to assets, whereas public keys decode private keys to permit access. In cryptocurrency, a public key lets people receive tokens and a private key proves they possess the token. Public Sale, In the realm of blockchain, a public sale is when a company/project makes its tokens/coins accessible to the general public, typically prior to the token being listed on cryptocurrency exchanges. I t has become common for blockchain firms to sell tokens or coins before launching the platform or app with the funds earned. This phenomenon is known as an ICO, and it is a next generation crowdfunding. Generally, a ICO has three phases: private sale, pre-sale, and public sale. The ICO crowd sale, also known as the public sale, is the most crucial step on the path to success, hence it is pushed and atoshcized more broadly. Since it is one of the last phases of the token sale, it is possible to minimize the disadvantages and dangers that may arise during a private sale. Public-Key Cryptography, Public-key cryptography uses a private and public key. Keys are used to jumble and randomize data. Messages can only be decrypted with the right key. Public-key cryptography offers great data security since the decryption key cannot be determined from the algorithm and encryption key. Users do not have to expose their private keys, reducing the chance of thieves finding them during transmission. Public-Key Infrastructure (PKI), A public-key infrastructure (PKI) is a system that contains tools for generating public keys for encryption, ensuring the security of data transported over the internet. Most web browsers
133
Put Option QR Codes may be used by scammers to access cryptocurrency wallets. Qtum, Qtum is an open-source blockchain project that tries to combine Bitcoin’s stability with Ethereum’s adaptability. Combining Bitcoin Core, proof-of-stake (PoS) consensus, and the Ethereum Virtual Machine (EVM) constitutes the protocol. It incorporates a Decentralized Governance Protocol (DGP) that assures the blockchain continues to operate even if a few nodes fail. Quant Zone (FTX Exchange), Quant Zone is a new form of leveraged trading product on the now bankrupt FTX exchange. These FTX-exclusive products offered crypto traders a new opportunity to construct easy-to-implement, configurable automated trading strategies. Triggers and actions are the basis of Quant Zone rules. Typical triggers include price, volume, and volatility. Quant Zone rules executed every 15 seconds. Quantity, This indicates the volume or number of a certain item or asset that is accessible. Quantum Bit (Qubit), Qubits (quantum bits) are a data unit used in quantum computing. A qubit may hold either a 0, 1 or their superposition. In a quantum computer, qubits may simultaneously exist in numerous states (superposition). The use of superposition to represent information has several benefits over conventional computers. The number of qubits required to create a quantum computer increases exponentially with the algorithm’s complexity. All of Qubit is computations are performed in a non-linear manner, and all its qubits are entangled with one another. In only one ten-thousandth of a second, the qubit may, for instance, test all potential passwords simultaneously. Quantum Computing, Quantum computing uses quantum physics to generate novel computer methods. Qubits are quantum computing’s fundamental unit of information. Adding transistors will not increase power linearly like with older computers. Quantum computing uses superposition and entanglement to perform functions tenfold faster than regular computers while using less energy. In the 1980s, it was revealed that quantum algorithms may solve some computer problems better than conventional ones. Quantum computing might help finance, defense, AI, big data, etc.
stake that provides scalability, security, and decentralization. It was created by MIT professor and Turing Award recipient Silvio Micali. The fundamental advantage of it is that it makes mining accessible to persons who may not have the financial means to engage in conventional mining. There are two sorts of platform participants: users and nodes. Users conduct transactions on the Algorand platform by sending and receiving tokens. Nodes contribute to the network by processing and securing transactions. Put Option, Put option values increases when asset prices fall as they short the underlying asset meaning a hypothetical buying back of an asset or security later. They are usually utilized for hedging when expecting on price declines. The put buyer may sell an asset at the strike price at a certain time. Crypto put options allow a sell position in an underlying asset, like regular put options. Pyramid Scheme, Pyramid schemes are getrich-quick scams that enrich the organization’s leaders. Pyramid system does not necessarily need a product. The scam may target those looking to earn money and only charging them to enroll or participate. The pyramid system is constructed so that the top people or leaders earn money while the bottom loses. Pyramid schemes are one of the oldest frauds, but their predatory and deceptive methods keep them current. Pyramid schemes should not to be confused with ponzi schemes (investment and account) or multi-level-marketing (a legal business structure for selling a product for a commission). QR Code, QR codes (short for quick response codes) are matrix barcodes introduced by Denso Wave in 1994. Barcodes are a square grid of black squares on a white backdrop with fiducial markers forming machine-readable labels that provide product information. QR codes frequently include a location, identifier, or tracker for a website or app and employ numeric, alphanumeric, byte/binary, and kanji encoding modes to store data effectively. QR codes may also be used to exchange cryptocurrency wallet addresses. Long cryptocurrency wallet addresses are hard to remember, thus QR generators transforms cryptocurrency wallet addresses into a QR Code that can be scanned to transmit or receive crypto payments. A QR code label may specify the amount and recipient.
134
Rarible and 1Hive’s Dandelion Org, as exit. In Moloch DAO, any member may rage-quit at any moment, unless they have voted yes on a current proposal. Rage-quit assures that all DAO members keep complete custody over their portion of the treasury’s assets, even while those funds might be collectively used to further the DAO’s goal. This feature shields minority members against majority overpowering. Raiden Network, Raiden Network is an Ethereum scaling layer enabling rapid, cheap transactions. The network uses ERC-20 tokens. Raiden uses digital signatures and hash-locks to protect transaction integrity. The network utilizes payment channels and balance proofs to conduct bidirectional transfers without the blockchain. This makes micropayments affordable by reducing transaction costs when directly engaging with the Ethereum network. Random Forest, Random Forest is an ensemble method for regression tasks. Multiple decision trees are built, and the forecast then consists of an average of the outputs of the individual trees. Rank, Digital currencies are ranked by market capitalization. Multiplying the price of a cryptocurrency by its total supply yields its market capitalization. Some rankings also consider the number of trades made in a certain time period, 24-hour/7-day price volatility, volume, circulating supply, and many others indicators. Ransomware, Ransomware is a type of malware used by hackers to encrypt their victims’ data and demand money for decryption or restoration. Depending on the attack’s severity, the ransom may be a few thousand to tens of millions of dollars. Ransomware mostly spreads via phishing emails with attachments such as infected URLs or PDFs. The three categories of ransomware are scareware, screen lockers, and encrypting ransomware. Bitcoin seems to be the most prevalent ransom payment method used by ransomware criminals. Rarible , Rarible is a platform that facilitates trade between creators of digital material (such as music, 3D models, and memes) and consumers. NFTs have progressed beyond cute animated GIFs, as shown by Rarible as its NFTs include digital artworks, memes, and virtual land. Tokens purchased on Rarible may be exchanged into RARI. With RARI tokens, users
Quantum Resistant, Quantum-resistant algorithms are cryptographic algorithms that can withstand quantum computer assaults. Quantum computers outperform today’s most powerful supercomputers. Experts believe quantum computers might become prevalent by the end of the 2020s, threatening cryptographic security. Several projects are underway to create blockchain networks that can withstand quantum computer attacks. Quasar Smart Contract (OMG Foundation), Quasar Smart Contracts overcome a significant issue for layer-2 blockchain projects, namely the 14-day delay in shifting assets to layer 1. Plasma is used by the OMG foundation to scale layer-2 blockchains by copying the primary chain. Before transferring them to the main chain, Plasma combines thousands of transactions. The OMG foundation has the same problem, but its Quasar Smart Contracts provide rapid escape as they are scalable, decentralized, and secure chains are possible. Both Polygon and OMG use plasma layers. Qubit, → “Quantum Bit“ Quorum (Governance), A quorum is the minimal number of members needed for a meeting to be legitimate. Companies frequently need a quorum of shareholders to make a binding decision as e. g., a 50+% majority. Some organizations and corporations make individual company agreements with other quorums. Companies might use guidelines to establish their quorum formula. In some countries special quorums are predetermined by laws. Radio Frequency Identification (RFID), Radio Frequency Identification (RFID) passively identifies tagged items or people using radio waves. A RFID system includes tags, an antenna, a reader, and a transceiver employing low, high, or ultra-high frequency radio waves to broadcast and receive data. The technology has existed for decades but has gotten increasingly popular owing to its usage in global supply chain management. The technology is used for inventory control, equipment tracking, employee tracking, etc. Rage-Quit, Rage-quit is when a DAO member departs with a proportionate share of the DAO’s assets. Rage-quit was created as part of the V1 Moloch DAO architecture and remains a basic functionality. It is been added to various DAO frameworks, such as Gnosis Guild’s Zodiac
135
Rarities the seed phrase has access to the assets. Many crypto wallets offer additional security measures such as 2FA or passwords. Redundancy, Redundancy refers to the situation in which an entity has many copies of the same item. This might be a piece of knowledge, a backup system, or an explanation that is repeated. The underlying concept is that if one fails, another will take its place. Redundancy in computing may refer to additional storage space or an additional power source. In blockchains, redundancy refers to having redundant channels between nodes so that if one connection fails, network traffic may still flow on at least one other route. Due to its redundancy, blockchains are particularly resilient to faults. It has been shown that redundancy reduces downtime, increases productivity, enhances reputation, increases speed, and facilitates disaster recovery. ReFi, → “Regenerative Finance“ Regenerative Economy, A regenerative economy is a circular economic structure that benefits society and the environment. The objective is to build more sustainable and balanced connections between humans and the greater planetary ecosystem, in contrast to the escalating negative externalities caused by current economic institutions. These economies replace the extractive impulses of today’s centralized models with more fair methods for distributing the possibilities to earn wealth and invest in the long-term health of global natural ecosystems. Regenerative economies use regenerative finance (ReFi), which analyzes how to rethink money as a solution to some of the world’s most difficult problems, with the aim of developing a new financial system in which economic and ecological health are matched. In a regenerative economy, assets may consist of non-monetary commodities and services. Regenerative Finance (ReFi), Regenerative Finance (ReFi) utilizes money to tackle some of the world’s most severe challenges, including the climate and environmental crises. It is a movement to create a new financial system that is in harmony with the earth and its planetary limits. It is a new approach to think about economics, connecting financial activity with renewing natural resources to make the environment a vital participant in the global economy. Regenerative financing in cryptocurrency focuses on funding community and public good
may vote on platform ideas, censor producers, and pick featured artwork. Rarities , There exist three categories of rarity in NFTs: common, rare, and legendary. A NFT is uncommon if one of its features is unusual. If one of its features is legendary, it is also legendary. If it is not legendary or uncommon, it is simply common. The gem color of a NFT indicates its rarity: green for common, blue for rare, and purple for legendary. Rarity , An NFT rarity score assesses the uniqueness of a non-fungible token’s (NFT) features compared to other NFTs in the same collection. This is a key determinant of a NFT’s value as the features have distinct ratings that contribute to the final rarity ranking calculation. And rarer NFTs have higher values. Rebalancing, Rebalancing is the method of buying or selling assets to maintain asset allocation and risk. If e. g., the initial asset allocation was 50/50 between assets A and B and asset A performed well, the portfolio weighting may have been boosted to 70 %. In order to revert to the initial goal allocation of 50/50, an investor may sell some A and purchase more B. In conventional finance, rebalancing is either performed manually by the investor monitoring via spreadsheets and buying/selling through exchanges/brokers or investing in funds, however in DeFi, rebalancing may be automated using smart contracts. Rebase, A rebase (or price-elastic) token is built such that its circulating quantity automatically adapts (increases or lowers) in response to price variations. This expansion and contraction process is called rebase technique. Rebase tokens are like stablecoins in that they both have price objectives. Unlike stablecoins, however, rebase tokens have an elastic supply, meaning that the circulating quantity adapts to supply and demand without affecting the value of the tokens in users’ wallets. Examples of rebase tokens include AMPL, YAM, RMPL, and BASED. Recovery Seed, A recovery seed (also called seed phrase or a backup seed phrase) is a cryptographically generated sequence of typically 12-14 random words that unlocks a cryptocurrency wallet on any device. A recovery seed may be used to restore a lost or damaged crypto wallet. All users should write down and hide their recovery seeds as anybody who knows
136
Relay Chain Agencies may in the future retain near-realtime access to encrypted compliance-related data kept on the blockchains of regulated financial institutions. Rehypothecation, Rehypothecation is the technique wherein banks and even brokers exploit the collateral provided by their customers for their own benefit. Clients who consent to the rehypothecation of their collateral may get a fee reduction or a reduction in the cost of borrowing. Rehypothecation occurs when a client leaves assets with a broker as a deposit in a margin account, where the broker may subsequently use the securities as collateral for his own margin account or as collateral for a loan. Reinforcement Learning, Reinforcement learning methods train models by rewarding desired actions and/or punishing undesired ones. More precisely, in each situation the model decides for an action which maximizes a numerical reward signal. Typical applications are finding optimal strategies for video games, or training driverless cars. REKT, REKT (or rekt) means wrecked in crypto slang with the context determining the meaning. In the crypto ecosystem, rekt refers to someone who made a bad deal or just a bad investment. But it must be remembered that being rekt and really losing money are distinct, since rekt assets might still recover. Relative Strength Index (RSI), The Relative Strength Index (RSI) monitors investment momentum relying on price change and speed. These movements are called oscillations that they may change dramatically between two extremes. RSI oscillations are measured from 0 to 100. The RSI is calculated based on the change in price of an asset over 14 chart periods, which may be daily or hourly. To compute the RSI, the average gain and average loss of an asset throughout the time are split. The relevant question is if an asset is overbought or oversold. Typically, an RSI reading over 70 is regarded to be overbought. When a security is oversold, the RSI might have values below 30. Relay Chain, The Relay Chain is Polkadot’s central blockchain. Polkadot bridges public and specialized blockchains, but smart contracts do not work on Relay Chains. All Polkadot validators stake the native DOT tokens of the network and validate the Relay Chain. Multiple transaction types let validators to engage with
initiatives that benefit the Earth. Increased demand for carbon credits or novel use cases like nature asset-backed stablecoins may make it attractive and spur environmental project development or e. g., tokenized carbon credits may even be linked into climate action apps. Regens, Regen is a play on degen, a common word in crypto circles, notably among DeFi traders. The term regen refers to participants in regenerative finance, who engage in a variety of ways in communities and platforms that employ blockchain technology to progress initiatives with a good social or Earth conservation effect. Regional/Local/Community Currencies, There are a number of currencies in the field of economics. A local currency is a currency that is used in a specific geographical area. A regional currency is a local money used in a greater region, while a community currency is often only used inside an often-detached community. Local currencies are often formed for several purposes, including to boost spending among local companies and associations. Sometimes they are founded naïvee a community does not trust their state’s legal tender. As the world’s population expands, monetary rivalry pressures local currencies. Regulated, Regulation is controlling something by making it function a certain manner or following rules. In the realm of cryptocurrencies, a currency is only regulated if it is a security under state or federal law or money transfer under state law or behavior. A regulated market has its advantages, such as controls, oversights, environmental protection, taxation, and anti-discrimination regulations. This control approach dates to ancient cultures that relied mainly on standardized weights and punishments for theft and fraud. Regulatory Compliance, When it comes to its operations, a business must adhere to a set of rules and regulations. These regulations are created by state, federal, or international authorities, and the requirements may vary by industry or company type. When a business runs in accordance with these requirements, it is effectively adhering to regulatory compliance. Regulatory compliance is the observance of external legal obligations given by state, federal, or international governments. Blockchain technology has the potential to enhance regulatory compliance and aid regulatory authorities.
137
Relay Nodes miners as nodes that enable network self-healing. Replay Attack, A malevolent actor intercepts the communication between a sender and a recipient during a replay attack. While delaying crucial communication before to the conclusion of a transaction, they may ask the receiver or sender for money or access to confidential information. Hackers do not even need to comprehend the message in order to be successful. Establishing additional IDs inside a single transaction is an useful method for preventing such attacks. Replicated Ledger, A replicated ledger is a copy of the records in a blockchain. This approach categorizes ledgers as master and slave copies. Master ledgers hold authoritative copies of blockchain data, while slave ledgers are just copies of the master ledger. The purpose of the replicated ledger is to alleviate the risks associated with all network members sharing a single copy of the blockchain ledger. Because the source blockchain is duplicated several times, replicated ledgers lack a single point of failure. In addition, whenever a user adds new transactions to their individual ledgers, the updates are propagated over the network and given to everyone. Copies of previously cloned ledgers that have been altered will be refused. Resistance (Line/Level), Resistance is a period’s greatest price (level). This occurs when the price of an asset reaches the level of resistance, prompting traders to begin selling. Typically, the selling pressure exerted by traders near the level of resistance leads the asset’s increasing price to cease and decline further. A resistance line or level does not exactly correspond to an asset’s highest price. Instead, it displays price zones that may drive selling activity. This is crucial, particularly when doing technical analysis (TA), since it indicates the optimal timing to purchase or sell a specific asset depending on its price breakout or trend reversal. A resistance level might also fluctuate depending on the price fluctuations of an asset. If the price has reached a certain price zone several times in the past, it suggests that resistance is strong. Retargeting, Proof-of-work (PoW) blockchains, such as Bitcoin, use retargeting algorithms, also known as difficulty adjustment algorithms. Retargeting is the process of adjusting the specified goal for a block’s values every 2,016 blocks, or about every 14 days. By
governance processes, parachain auctions, and nominated proof-of-stake (NpoS). Polkadot employs two subscription models: parachains (constantly executing processes with dedicated slots) and parathreads (only occasionally performed processes). Relay Nodes, Relay nodes serve as network hubs, linking many other nodes. They feature high-performance connection, enabling a reliable communication channel. Consequently, they lower the number of hops and the amount of time required to convey a message across a network. Relay nodes are a kind of blockchain network node that may minimize system noise by collecting protocol messages from participating nodes and other relay nodes linked to them. They run checks for duplicates, confirm signatures, take additional precautions before transmitting only genuine communications, and are usually situated near internet exchange points to save propagation time being operable by anyone. In the field of information technology, relay nodes are extensively used in wireless networks. A node is a legitimate relay node if the two requirements below are met: The node is configured to accept incoming communication on a publicly accessible port. Remint, Remint is a new cryptocurrency with real estate industry applications. Using cloudbased cryptocurrency mining, Remint encourages people to join the real estate revolution as it fuses with cryptocurrencies. Remint uses cloud-based mining and therefore no actual mining is taking place on a device. Renewable Energy, Renewable energy is energy derived from naturally replenishing resources. It consists of sources such as sunshine, wind, water flow, and geothermal heat. From 2011 to 2021, renewable energy’s share of the worldwide power supply increased from 20 % to 28 %. Renewable energy has gained significant interest in the blockchain community, since BTC’s energy usage alone is over 120 terawatts per year, according to the University of Cambridge. Elon Musk stunned the world when he declared that he would no longer accept Bitcoin payments for Tesla automobiles, citing the negative effects of the mining on the environment. Repair Miners, Repair miners are a suggested sort of Filecoin network mining node. They are different form storage and retrieval miners. Developers of Filecoin have characterized repair
138
Ripple quantities in Monero. Confidential transactions may provide cryptographic verification that the total of the input and output amounts is the same, without exposing the numbers. Monero transactions are also untraceable owing to ring signatures and stealth addresses. RingCT was deployed in block #1220516 in January 2017, and after September, it became obligatory for all network transactions. It is a verifiable and trustless coin production mechanism. Ring Miners, Loopring exploits network players known as ring miners to circumvent conventional order books and AMM processes that manage liquidity pools. Orders are fulfilled by ring miners before they may be finalized or abandoned. Ring miners are compensated with LRC tokens, the native currency of the Loopring system, or a slip-margin off an order’s total value. In addition, order rings allow for ring matching completing orders by connecting them and securing various transactions via multiple users. Ring Signature, Ring signatures enable users remain anonymous. Monero uses this technique to hide the source and receiver of a transaction from outsiders. Users are given a one-timespend key, and those engaged in previous transactions serve as decoys. Several government authorities have raised issues about Monero and related digital assets in recent years, citing the possibility that these cryptocurrencies may be used for tax evasion, money laundering, or terrorist financing. In fact, the US has made a determined attempt to break Monero’s mechanisms in order to identify the genuine participant in a ring signature. Ripple, Ripple is a US-based technology company’s real-time gross settlement, currency exchange, and remittance network. Ripple allows tokens representing fiat cash, cryptocurrencies, commodities, or other units of value like frequent flyer miles or cell minutes. Ripple promises safe, practically free worldwide financial transactions of any size with no chargebacks. The ledger utilizes XRP, the native cryptocurrency. In December 2020, the US Securities and Exchange Commission (SEC) sued Ripple Labs and two of its executives for selling XRP tokens, which the SEC classed as unregistered securities. The court case and SEC complaint is still pending and will probably be decided in Q1 2023.
raising the complexity of the problem, retargeting guarantees that the average time it takes to produce a block, 10 minutes, is maintained. Retargeting is created by dividing the first block’s hash target by the current block’s hash target. This continual retargeting on PoW blockchains necessitates that miners demand greater computational power than they did when Bitcoin was established in 2009. Revenue Participation Tokens, Companies with consistent revenue (or at least operating in a solid industry) may tokenize a portion of their future income. They may sell these tokens to investors, who then have the option of holding on to them and redeeming them for a certain proportion of future income, or selling them on. This participation token functions something like a gift card or IOU, entitling its owner to a specified amount of value. When the time comes to pay out, the tokens are distributed in the form of a second payment token that may be redeemed for fiat or cryptocurrency or sold on an exchange. This provides enterprises and investors with far more flexibility than a conventional equity/dividends arrangement. Reverse ICO, Reverse ICOs are given by established firms in order to tokenize or decentralize their company, generate more capital, or begin a blockchain-based line of business. A project is exposed to fewer legal challenges with an ICO, consequently, more scams and frauds often occur in ICOs. A reverse ICO necessitates a greater amount of transparency which assists in gaining investor confidence. Typically, a firm collecting money using a reverse ICO has an established user base, a solid business plan and numerous years of expertise. However, reverse ICOs are rather uncommon occurrences. Reverse Indicator, A Reverse Indicator is a person against whom one should always bet. If Mr. Smith is a Reverse Indicator, and he acquires a large quantity of A-coins, for example, because he thinks that the price of A-coins will rise, then all A-coins should be sold. Reverse Indicators’ price projections for cryptocurrencies are always incorrect. RFID, → “Radio Frequency Identification“ Ring CT (Confidential Transactions), Ring Confidential Transactions (RingCT) mask each transaction’s amount. Unlike confidential transactions, RingCT only hides transaction
139
Rivest-Shamir-Adleman (RSA) vestment from its current value and then dividing the result by the starting investment value. Multiplying the ROI by 100 then yields the rate of return. ROI does not take the time period into consideration; therefore, the ROI is a valuable indicator of (cryptocurrency) profitability, but it should be used in conjunction with other metrics when determining the success. Roth IRA, Unlike regular individual retirement accounts (IRAs), contributions to a Roth IRA are not tax deductible since they are made using after-tax money. Roth IRA contributions are made using after-tax money and are not tax deductible. Once people begin withdrawals the funds are tax-free. In 2021, the maximum for Roth IRAs for individuals was $140,000, while the limit for married couples was $208,000, with an annual contribution limit of around $6,000. All physical and online brokerage businesses, as well as most banks and other financial institutions, may provide Roth IRAs. Royalties , When a NFT is sold in a secondary sale on a marketplace, the original creator/ minter may be entitled to a royalty payment. Royalty payments for NFTs may be continued indefinitely, with the help of automated smart contracts automatically triggering a royalty payment. An intriguing use case that has the potential to disrupt the music business is to employ an NFT to automatically pay an artist royalty in perpetuity. Role-Playing Game (RPG), A role-playing game (RPG) is a game in which each player adopts the role of a character inside the game’s fictitious universe. Early internet role-playing games included Dungeons & Dragons, Battletech, and Star Wars. MUD (originally multi-user dungeon; later multi-user dimension or domain) and MOO (MUD, object-oriented) online environments incorporated role-playing game software employing ASCII maps and menus. MUDs and MOOS developed into massively multiplayer online roleplaying games (MMPORGs), where participants play a game with internet access to a persistent universe. Early MMPORGs included Ultima Online and Neverwinter Nights. Blizzard’s World of Warcraft had almost 8 million members at the end of 2022. Millions of people also play other MMPORGs, notably in South Korea, where internet adoption is strong. RPA, Robotic process automation (RPA) is a software technology that simplifies the de-
Rivest-Shamir-Adleman (RSA), Rivest– Shamir–Adleman (RSA) is a widely-used and rather old public-key cryptosystem for secure data transfer. The method was presented publicly in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman, whose surnames comprise the acronym RSA. Clifford Cocks, an English mathematician, created a comparable system at GCHQ (the British signals intelligence organization) in 1973. In 1997, this system was declassified. The encryption key is public and separate from the decryption key, which is kept hidden in a public-key cryptosystem. A user of RSA generates and distributes a public key based on two huge prime integers and a supplementary value. The prime numbers are held in confidence. Messages can be encrypted by anybody using the public key, but only someone who knows the prime numbers can decrypt them. No reported ways exist to circumvent the mechanism if a sufficiently big key is used. RSA is seldom used to directly encrypt user data, but regularly used to transmit shared keys for symmetric-key cryptography, which are subsequently used for bulk encryption–decryption. Roadmap, A roadmap is a long-term strategy that lays out an endpoint. A roadmap is also a high-level graphic overview that helps map out the vision as well as the path of a certain product offering. One its many purposes is to bring together and unite an organization’s team around a shared vision, mission, and strategy. Roger Ver, Roger Ver’s background is intriguing, and he joins a growing list of Bitcoin’s contentious influencers. Because of his prominence as a Bitcoin supporter, Ver has dubbed himself Bitcoin Jesus. Ver served 10 months in jail before leaving for Japan and ultimately becoming a citizen of Saint Kitts and Nevis. His tenure as Bitcoin.com’s CEO lasted till 2019, after which he switched to the position of executive chairman. Ver, like many others in the Bitcoin and cryptocurrency field, believes in and supports individual liberties and libertarian values. Ver continues to be a driving force in Bitcoin and cryptocurrencies. ROI, Investors, also in cryptocurrencies, use return on investment (ROI) as a performance indicator to evaluate individual (crypto) holdings or to assess the overall profitability of a (cryptocurrency) portfolio. The ROI is computed by subtracting the starting value of the in-
140
SALT C++ and can ensure memory safety via the use of a borrow checker to verify references. The programming language was invented by Graydon Hoare at Mozilla Research, although its development also included contributions from Dave Herman, Brendan Eich, and others. Rust has a complete ecosystem. Microsoft has experimented with it in order to protect safety-critical software components. Throughout the years, it has achieved widespread usage. Ryuk Ransomware, Ryuk ransomware was identified in August 2018 and has since become one of the most well-known and pricey strains of our time. Unlike ransomware like WannaCry, Ryuk is meant to be targeted. The nature of this software necessitates that fraudsters pay specific attention to each victim. Ryuk is used in several targeted attacks with highly customized infection vectors and exorbitant ransom demands. A spear phishing email may deliver Ryuk directly or be the first infection in a series. Then, Ryuk employs a mix of cipher algorithms. When the ransom is paid, the Ryuk operator will supply the victim with a copy of the appropriate RSA private key. S&P 500 (Standard and Poor’s 500), The S&P 500 (Standard and Poor’s 500) ranks the top 500 US companies. The S&P 500 is a stock market index that evaluates the 500 largest US companies by market capitalization demonstrating the performance of the market by representing the risks and returns. The market capitalization of the listed companies is around $32 trillion at the end of 2022. Investors use the S&P as a benchmark against which to evaluate all other assets across sectors. Although the volatility of the S&P 500 may make forecasting challenging, experts can use historical patterns and data to provide reliable forecasts when determining interest or return rates. To be included in the S&P 500, a company must meet a variety of requirements. SAFT, → “Simple Agreement for Future Token“ SALT, Salt is random data used in cryptography to hash data, a password, or passphrase to safeguard password in storage. Random bits are added to each password before hashing as a cryptographic salt. Salts produce distinct passwords even when two people choose the same password. Salts prevent hash table attacks by requiring attackers to recompute them for each user.
velopment, deployment, and management of software robots that mimic human movements while dealing with digital systems and software. In the same manner as humans, software robots can comprehend what is shown on a computer, complete the correct keystrokes, traverse systems, locate and extract data, and carry out a vast array of predefined operations. However, software robots can do the task more quickly and reliably than humans, without the need to stretch or take a coffee break. Workflows are streamlined via RPA, making businesses more lucrative, adaptable, and responsive. In addition to increasing employee engagement, commitment, and productivity, it eliminates repetitive chores from their workdays. RPA is noninvasive and may be used swiftly to expedite digital transformation. It is also perfect for automating older system procedures that lack APIs, virtual desktop infrastructures (VDIs), and database access. RSA, → “Rivest-Shamir-Adleman“ RSI, → “Relative Strength Index“ Ruby (Programming Language), Yukihiro Matsumoto (also known as Matz) invented Ruby in 1995. It has a large, dedicated developer community. He built his own language because he considered Perl to obscure and Python not object-oriented. His philosophy focused on the needs of human programmers, rather than the one of computers. Ruby simplifies full-stack web app development and served as the foundation for e. g., Twitter and Airbnb. Ruby is not as popular in cryptocurrencies as C++ or Solidity. Rug Pull/Rug Pulled, In the cryptocurrency sector, a rug pull is a malevolent scheme in which crypto programmers quit a project and flee with investor money. Once a substantial number of unwary investors exchange their ETH for the listed token, the developers remove everything from the liquidity pool, causing the price of the currency to drop to zero. Even more so, the coin’s producers may generate a momentary frenzy on Telegram, Twitter, and other social media platforms and immediately pump a considerable amount of liquidity into their pool to foster investor trust. Rug pulls flourish on DEXs because users may list tokens for free and without auditing. Rust, Rust is a multi-paradigm programming language created with safety and performance in mind. Rust is synthetically comparable to
141
Satoshi (SATS) transaction history, so the system’s throughput may rise as the network size grows and achieve higher scalability). Scaling Problem, The scaling problem relates to how a decentralized network manages blocks of transactions, which depends on the block size and block time. The Bitcoin blockchain’s block size was 1 MB in 2015 and 2 MB thereafter. While increasing block size helped Bitcoin’s scalability issue, engineers warned against alterations that may centralize the network. Unscaled blockchains can generally continue how they are, but they will see a decline in transaction speed and an increase in prices. Scaling Solution, A scaling solution improves a system’s efficiency and output without affecting its present processes. In blockchain, scaling solutions like sidechains and off-chain layers are created on top of a main chain to boost transaction throughput. State channels, roll-ups, interoperability, sharding, and different cryptographic functions are second-layer scaling solutions. Scam, Scams using cryptocurrencies have multiplied at an alarming rate and have become a popular tool for con artists to defraud cryptocurrency investors. Scams using cryptocurrencies may take several forms, including blackmail, fake investment schemes, and false business opportunities. In the past, Ponzi scams and fraudulent initial coin offers (ICOs) were also prevalent. SEC v. Shavers was a case in which the putative organizer of a Ponzi scheme offered an investment opportunity that fraudulently claimed weekly returns of up to 7 %. The scam further assured investors that the monies will be utilized to purchase more BTC. Chainalysis believes that one Bitcoin and Ethereum-based Ponzi scam alone collected around $2 billion in 2019. Scamcoin, Scamcoins are fraudulent cryptocurrencies developed to generate the developer money while stealing from investors. Typically, these coins will have particular characteristics, such as being clones of an existing coins or premined coins. Scamcoins are one of the primary reasons why presently existing cryptocurrencies might become worthless. In other terms, scammers have developed a scamcoin when they construct an unauthorized cryptocurrency in order to steal money from others.
Satoshi (SATS), Cryptocurrencies can be split like conventional money. The smallest unit of Bitcoin (BTC) is a atoshi, or 0.00000001 BTC named after Satoshi Nakamoto, BTC’s pseudonymous creator. Initially, a atoshi was offered as one hundredth of a Bitcoin, but the crypto community agreed on one hundred millionth. Satoshis is a popular crypto plural form and SAT or S popular acronyms. Bitcoin’s divisibility is important as 0.1 BTC is already worth hundreds of dollars, thus limiting it to two decimal places would be unrealistic. Also, transaction fees and micropayments need smaller fractions of a cryptocurrency. Satoshi Nakamoto, Satoshi Nakamoto is the alias of the individual (or possibly group) that produced the Bitcoin whitepaper. It outlined how digital money may bypass central banks following the financial crisis in 2008. Many people have been suspected to be Satoshi Nakamoto and some have gone to considerable pains to cleanse their identity, saying they did not create the cryptocurrency. Linguistic research of the whitepaper and other published publications connected others to the pseudonym, but these efforts were likewise inconclusive. The Australian entrepreneur Craig Wright has claimed to be Satoshi Nakamoto. Satoshi Nakamoto has in 2010 withdrawn from the Bitcoin community, adding to the mystery, but lives on via the Bitcoin whitepaper, which is publicly accessible. In Satoshi Nakamoto’s honor, one hundred millionths of a Bitcoin are called a atoshi. SATS, → “Satoshi“ Scalability, Scalability is Bitcoin’s restricted capacity to process huge volumes of transaction data quickly. It is because Bitcoin blocks (records) are restricted in size and frequency. Since Bitcoin’s inception, industry practitioners and academic academics have focused on blockchain scalability. Scalable blockchains fall into four categories: Scaling Bitcoin (increasing Bitcoin’s block size or block interval without modifying its PoW consensus mechanism to improve throughput), Scaling PoW (solutions that function in the Nakamoto consensus framework but have a greater throughput than Bitcoin’s PoW algorithm), Solutions based on BFT algorithms with less message complexity than PBFT), and Scale-out Blockchains (solutions that remove the necessity for validating/mining nodes to know the whole
142
Second-Layer Solutions Scrypt, Scrypt is an alternative to the SHA256 PoW method used in Bitcoin mining. Scrypt mining places a greater emphasis on memory than on pure CPU power. The technique that encrypts a key such that it requires a substantial amount of RAM to hash it. The technology makes it difficult for hackers to assault. Scrypt, despite its spelling, is pronounced ess-crypt. Seasonal Mean, The seasonal mean forecasts the average of all corresponding values of the previous seasons. For example, one may calculate the mean of all March values of previous years. Seasonal Naïve, In this method, the forecasted value is set to be the corresponding value of the previous season. For example, one may take the value associated with the same month of the previous year. Seasonal Time Series Decomposition, Seasonal patterns are present when a series is influenced by seasonal factors (e. g., the month of the year). For example, ice cream sales will be a lot larger in the summer months of a country, rather than the winter months. Seasonality is usually of a fixed and known frequency, but effects may slowly change over time SEC, → “Securities and Exchange Commission“ Secondary Market, A secondary market is a venue where investors and traders may purchase and sell various types of assets and securities that they possess. This is often where regular investors exchange financial products such as stocks, bonds, options, and futures in the conventional finance industry. The secondary market is comparable to a retail store like Walmart, where everyone may purchase one item whereas the primary market is for wholesalers that buy in large quantities. The same idea applies to cryptocurrencies. The key distinction is that the primary market equivalent is now mostly centered on token sale platforms. On the other hand, nearly half of all NFT transactions take place on the secondary market. Second-Layer Solutions, A portion of blockchain data is usually moved off-chain via second-layer solutions. Despite being off-chain, second-layer solutions run on smart contracts and are rooted in the blockchain, so they enjoy all its security advantages. In order to make the
Scammer, Scammers generate money illegally by deceiving others into giving out information they would not give out legally or pay for something fake. Fake emails are one of the oldest and most prevalent frauds. Fake smartphone applications packed with harmful code that might steal data are a more recent one. Also illegitimate social media updates may endanger profiles and spread fraudulent data or news. Scholarship/Scholar, Scholarship in Axie Infinity is the procedure through which managers give their free Axies (digital pets) to scholars who are new to the game and do not have the finances to purchase the three NFT monsters necessary to play. Axie Infinity (AXS) is the top blockchain game with $2.5 billion in revenue and digital creatures called Axies, akin to the famous game Pokemon Go. These creatures are used in combat between players to acquire in-game prizes. The scholars utilize the managers’ Axies to play the game and earn ‘Smooth Love Potions’ (SLP), the in-game money that can be used to breed and sell more Axies or may also be exchanged for fiat. Scholarships in Axie Infinity are mostly employed by players with limited financial resources and veterans with many Axies. Script, Scripts are lists of instructions that a software or scripting language executes. Scripts may automate computer operations and produce e. g., web pages. Some languages are script-based such as JavaScript, Perl, or REXX. Script languages are simpler and quicker to code than C and C++, but a script takes longer to execute than a compiled program since each instruction is handled by another program. Scripting Programming Language, To avoid the need for compiling before instructions may be executed, scripting languages are developed for runtime environments (RTE). An interpreter is used to convert scripting language instructions into machine language. A non-scripting language would need a software known as a compiler to convert the instructions into machine code in order to execute them. Examples of popular scripting languages are Node.js, Python, and Ruby. There are two different sorts of scripting languages: server-side scripting and client-side scripting. The only significant distinction between the two is that server-side scripting languages need a server for processing.
143
Secret Key manipulation. Congress established the SEC in 1934, after the 1929 Wall Street Crash. Through mutual funds, retirement accounts, and other assets, US households possess more than 58 % of the equities market. Since its inception, the SEC, presently led by former MIT blockchain scientist Gary Gensler, has had a tumultuous relationship with the crypto sector. The ongoing court action and SEC lawsuit against Ripple will likely be settled in the first quarter of 2023. Security, A security is a fungible, transferable financial instrument that reflects an underlying value. A security requires investment and the expectation of reward. The cash flow from assets, including liabilities, may be packaged into securities, and sold to investors. They provide holders with access to liquidity and investors with access to value. In the digital economy, many tokens are called securities while lacking the traditional components of a security. Security Token, Essentially, a security token is a digital representation of conventional securities. In the future, security tokens may serve as a viable substitute for stocks and other conventional assets. There are three major forms of conventional securities: equity, debt, and a debt-equity hybrid. Security tokens operate on existing blockchains. Hence a security token might operate on the Ethereum chain. Occasionally, individuals may also make profits via dividends in the form of more tokens, and they often get additional perks such as voting rights. Consequently, security token holders may enjoy many of the same advantages as stock and other securities. Blockchain Capital is among the most popular security tokens (Bcap). Security Token Offering (STO), A security token offering (STO) is a sort of public offering in which tokenized digital securities, also known as security tokens, are traded on cryptocurrency exchanges or security token exchanges. A security token is a token issued on a permissioned or permissionless blockchain that symbolizes an ownership position in an external asset or business. Individual security tokens are used to electronically authenticate identities by storing personal information. STOs are distinct from ICOs in that they are done by the sale of digital tokens on cryptocurrency exchanges to the general public. Seed, →d is a number selected to produce a random series of integers (but it can be pseu-
relevant blockchain more scalable and efficient especially for microtransactions. Secret Key, Since the same key is used for encrypting and decrypting, secret-key cryptography is also known as symmetric cryptography. A secret key (also known as a private key or key pair) is a piece of information used in symmetric cryptography for both decrypting and encrypting communications. When two people are having a private discussion, they both have the secret key in common. Secure Element (SE), The term secure element (SE) refers to a kind of computer chip that may perform a variety of functions. It can store sensitive information, allow for limited access, and run several apps. Important use cases for SE include authentication, digital signatures, contactless or NFC payments, cryptocurrency wallets, storing biometric data, and more. Various types of SE run in the cloud, reducing the need for expensive hardware chips on host devices. Secure Multi-Party Computation (sMPC), Secure multi-party computation (sMPC) offers the distribution of computations over numerous parties while protecting the confidentiality of the data used by each participant via a cryptographic. This implies that with blockchain, nodes may jointly calculate a function without revealing their inputs to any other nodes. Thanks to sMPC, analysts may now quietly and securely compute over dispersed data without ever having to worry about it getting into the wrong hands. Securities, Securities are a property right evidenced by a deed, the exercise of which requires possession of the deed. Only on presentation and return of the security is the party obliged to perform under the deed, except in the case of cancellation in the event of lost securities. However, developments on the financial markets have led to an expansion of this traditional view: For example, the Securities Trading Act defines the various types of securities as securities even if no certificates have been issued for them and they appear as uncertificated securities. Securities and Exchange Commission (SEC), The United States Securities and Exchange Commission (SEC) is an independent body of the federal government charged with safeguarding people and companies against market
144
Sell Wall in the cryptocurrency. Moreover, if all miners would pursue this strategy, no one stands to gain much. Self-Assembly, Self-assembly is the process by which a disorganized system of pre-existing components produces an ordered structure or pattern as a result of precise, local interactions among the components themselves, without external guidance. Self-assembly is called molecular self-assembly when the constitutive components are molecules. Self-assembly may either be categorized as static or dynamic. In static self-assembly, the ordered state develops when a system approaches equilibrium, resulting in a decrease in its free energy. In dynamic self-assembly, however, patterns of pre-existing components arranged by local interactions are not often referred to as self-assembled by scientists in the connected fields. Although both concepts are sometimes used interchangeably, the term self-organized better describes these systems. 2008 saw the publication of self-assembly for discrete, fault-tolerant, and scalable computing on internet-sized distributed networks by Yuriy Brun, which investigated and solved the SAT problem on distributed networks. Self-Replication, Self-replication is any dynamical system activity that results in the creation of an identical or similar duplicate of itself. Given adequate circumstances, biological cells proliferate by cell division. DNA is reproduced during cell division and may be transferred to children during reproduction. Viruses can multiply, but they can only do so by commandeering the reproductive apparatus of infected cells. Computer viruses propagate utilizing the existing hardware and software on computers. Self-replication in robotics has been a topic of scientific study and science fiction. Any self-replicating system that does not produce a perfect copy (mutation) will undergo genetic variation and produce variations of itself. These variations will be susceptible to natural selection, since some will be superior at living in their present environment and will outbreed the others. Sell Wall, Sell walls are huge sell orders placed at any price, which may force the price to plummet. High-net-worth people or whales may place it to influence asset values and others can additionally contribute to it. When placed purposely by huge holders or whales, it
dorandom, too). That sequence can create cryptographic key pairs for RSA and AES. Seed Hash, A seed generates a random number sequence, but it can also be pseudorandom. This sequence generates RSA and AES cryptographic key pairs. Seed Phrase/Secret Recovery Phrase, The seed phrase (also known as seed recovery phrase, backup seed phrase, or mnemonic phrase) is a set of words in a precise sequence that crypto wallet users use to restore access and control over their cash on-chain. It is a string of randomly-generated words extracted cryptographically from the wallet’s private key and coupled with 12, 18, or 24 words from a set of 2,048 English words known as the BIP39 Wordlist. It is recommended to keep a duplicate of the seed phrase outside of the network, since this makes it hack-resistant. The storage of seed phrases on internet-connected devices is deemed hazardous and is not advised. Segregated Witness (SegWit/SEGWIT), Segwit is a soft fork update intended to mitigate scalability issues by raising block size limits on the Bitcoin blockchain. SegWit functions by deleting signature data and decreasing the transaction size, enabling more transactions to be included in a single block. SegWit was deployed in August 2017 after Bitcoin developer Peter Wiulle proposed it during the 2015 Scaling Bitcoin conference. To accelerate confirmations, Since the signature is simply pushed to the end of a transaction, the identity of the transaction cannot be altered. SEGWIT, → “Segregated Witness“ Self-Execution, → “Smart Contracts“ Selfish Mining, Selfish mining was first suggested by Cornell academics in 2013 as a method for miners to collaborate and enhance their income by building distinct forks and not exposing the mined blocks to the rest of the network. This undermines the protocol’s general health, since collusion raises the danger of centralization. However, by participating in selfish mining, miners may optimize mining and improve output significantly. Stopping the declaration of new blocks to the public network also may speed up the process and decrease resource waste. However, selfish mining is not a realistic long-term approach since, if successful, the miners would diminish the value of their tokens by undermining public confidence
145
Semantic Web Service Robots, Service robots are meant to engage and communicate with clients in order to provide a service. Using technologies such as natural language processing (NLP), biometrics, and machine learning, they engage, communicate, and give customer support. In contrast to other service technologies that can only do certain duties, service robots may provide interactive services and function as corporate agents. In the customer contact service, robots may provide an automated social presence (ASP), giving the impression that customers are conversing with another social entity. It has been shown that ASP improves customer happiness and service quality. In addition, service robots are interconnected and integrated into a larger system. They have access to data from several sources, such as the internet, the corporate knowledge base, and the customer relationship management (CRM) system, which stores client history, preferences, and transaction information. In addition to their local input channels (e. g., cameras, microphones, and sensors), service robots may leverage biometrics such as face and speech recognition systems to give consumers with a more customized experience. Service robots may be distinguished by a variety of characteristics, such as representation, anthropomorphism, and task orientation. Representation refers to service robots that are either physically (e. g., Pepper) or electronically represented (e. g., Alexa). Anthropomorphism defines service robots that mimic human look and behavior, such as Sophia. Task orientation refers to service robots that are specialized in certain jobs, such as Roomba, the autonomous vacuum cleaning robot. Soon, service robots are anticipated to play a key role in the service sector. Settlement, In crypto, a settlement is the execution of limit or market orders on an orderbook-based DEX. When a trade order is executed, the currencies or assets are moved to a crypto wallet pending the transaction. These deals must be finished through a settlement procedure, and users must provide permission to add the processed assets to the crypto wallet. DEXs and DeFi settlements are automated using code and smart contracts, unlike financial institutions or TradFi stock trading. Orders may be settled via AMMs, aggregators, order books, or a combination of these. Transaction costs for opening and closing limit or market orders,
is frequently not to purchase from other traders at such levels, but to fool others into placing sell orders below the wall, creating downward price movement. Massive sell walls suggest that supply will expand, lowering demand and price. Most exchanges include interactive depth charts to show buy and sell walls. Semantic Web, The Semantic Web is a proposed expansion of the current www that offers software applications with machine-interpretable metadata of published information and data. It effectively adds more data descriptors to previously existing material and data on the web, and consequently, computers can generate meaningful interpretations, similar to how humans analyze information. Tim Berners-Lee developed the Semantic Web concept. The Semantic Web will result in more intelligent and easy consumer interactions. Its standards have the potential to open a fundamental progression of the web towards intelligence, allowing uploaded material to be displayed in a manner that machines can comprehend, link, and integrate. Semi-fungible Token (SFT) , Semi-fungible tokens (SFTs) are based on the ERC-1155 standard. Enjin created SFTs for blockchain-based video games. Like a gift card, a SFT loses its value after being used. In addition, transfers to erroneous addresses are reversible and refundable using SFTs unlike the irreversibility of NFTs. Additionally, multiple SFTs may be transferred in a single transaction. Sentiment, Crypto sentiment is the psychology of the masses about the cryptocurrency market. Crypto sentiment monitoring may be used by traders and investors as a significant predictor of price fluctuations. In finance, sentiment (or market sentiment) refers to the highly subjective perception of a market’s condition. It is the sentiment traders and investors feel towards the price movement of a given item. Fundamentally, the market mood is influenced by a number of things such as indicators from fundamental analysis (FA) and technical analysis (TA). Additionally, recent news and pricing history has an influence. Some investors use market sentiment as a sign of reversal. Attempts have been made recently to reliably assess and quantify market sentiment by using the findings and understanding of behavioral finance and behavioral economics. Ser, To keep things simple, ser means sir.
146
Shelley Phase may store the state and transaction history of a single address, for example. They may also be divided by the digital item they hold and allow digital asset transactions. Each shard may be shared with other shards, maintaining a blockchain’s decentralized ledger that every user may inspect. When sharding is effectively done in a blockchain, each user may keep just a fraction of the database’s change history, instead of the whole. Shard Chain, Transactions are facilitated using a shard chain, which is a sub-blockchain of the main blockchain. Each shard chain has its own autonomously operating smart contracts and account balances. The purpose of this database partitioning approach is to address the typical difficulties of blockchains. Its primary purpose is to expedite transaction processing, hence alleviating blockchain network congestion issues. In addition, it is essential to remember that every shard chain utilizes the same consensus and security mechanisms as the mainchain. Because shard chains are established for a particular purpose, they are able to grow considerably more quickly than the main blockchain network. Sharding, Sharding divides big databases into smaller, quicker, easier-to-manage components. The expression shard means a small part of a whole thus sharding splits and distributes one logical data set over numerous, independent databases on various servers. In order to accomplish sharding, the rows or columns of a big database table are partitioned into numerous smaller tables. Shards do not exchange data or computer resources. Sharding may be horizontal or vertical. Horizontal sharding involves creating new tables with the same structure but unique rows. Vertical sharding occurs when each new table’s schema is a subset of the original’s. Shelley Phase, With the publication of the Shelley code in July 2020, the Shelley phase of Cardano was initiated. It intends to turn the system into a decentralized blockchain and increase the network’s security and scalability by implementing proof-of-stake (PoS) consensus, delegation, and incentive schemes. Consequently, users will be able to stake their ADA tokens and vote on transactions. Key to the Shelley Phase is delegation, which allows ADA holders to delegate their holdings to other network members who are already operating
swap fees for utilizing aggregators, or liquidity provider fees for using an AMM are also paid in a settlement. Settlement Layer, A settlement layer offers indisputable security and objective finality if something on a distinct blockchain warrants adjudication. An ecosystem backed by a settlement layer as opposed to a single monolithic blockchain may be a computational need as opposed to a philosophical reference. Settlements are final, delivered payments. Credit card payments, such as MasterCard or Visa, do not constitute a settlement since the payment is made weeks or months after the event. In the realm of cryptocurrencies, a settlement is a transaction that has been recorded on the blockchain and is incorruptible, always available, resilient, and irreversible. SFP, → “Swing Failure Pattern” SFT, → “Semi-fungible Token” SHA-256, Secure Hashing Algorithm (SHA) 256 is used to control the establishment and administration of addresses and to verify transactions. Bitcoin employs double SHA-256, which means that the hash algorithms are applied twice. The algorithm is a NSA-developed variation of SHA-2. The hash algorithm is very secure, and its inner workings are not public knowledge. It is utilized by the US government to secure sensitive information owing to its capacity to authenticate a data’s content without disclosing it, which is made possible via digital signatures. Additionally, it is used for password verification. Shamir’s Secret Sharing, Shamir’s Secret Sharing technique employs a cryptographic algorithm to disseminate extremely sensitive material around a network or group without allowing unwanted access. The data is broken into smaller portions referred to as shares, which are subsequently dispersed among a group or network. The technique is named after Adi Shamir, a notable Israeli cryptographer. It is created via polynomial interpolation which is a sophisticated algebraic procedure that guesses unknown values between two points. Instead of needing all the members, just the threshold number that gives enough data points to accurately estimate the values between the gaps in the encrypted shares is required. Shard, A shard is a piece of a blockchain network that contains its own data. One shard
147
SHIB meme tokens and frauds. And because there are cryptocurrencies with nearly every ridiculous name possible at this moment, it is only natural that there is also one named Shitcoin. SHO, → “Strong Holder Offering” Short, A trading strategy in which a trader borrows an asset to sell it, expecting the price to fall. If the price drops, the short seller (re-)buys the asset at the lower price to return it to the lender, generating a profit. Short Squeeze, A crypto market short squeeze causes a price increase. If prices begin to rise, short options will result in losses. If losses become excessive, short sellers may conclude that it is preferable to close their position. This often occurs in futures and margin trading. Traders may manually close the trade. However, it is preferable to use an automatic stoploss trigger. A price increase is witnessed when several short sellers close their short positions in a brief period, indicating that they continue to purchase the currency. This causes the short squeeze. Side Channel Attack, A side channel attack is a hacking technique that leverages the inherent signals of a computer that accidentally transmit data. These assaults exploit the ostensibly innocent physical outputs of computers. For instance, an algorithm may be able to determine the kind of data that has traveled through a hard drive by analyzing the hardware’s operating noise. In the realm of cryptocurrencies, these attacks might detect a signal when a private key is inserted into a hardware wallet, since the latter emits a stronger signal. Side channel attacks employ information such as time, sound, and power levels, to begin dissecting data and deducing key variables. Sidechain, Using a two-way peg, a sidechain is connected to the main blockchain, often known as the mainnet or parent chain. Sidechains were developed to overcome the crypto world’s major speed problem by simplifying computations while maintaining the same level of security as the primary blockchain. The capacity to swap assets across chains via a twoway peg is fundamental. The Liquid Network, a protocol constructed on top of the Bitcoin network, and Polygon, an Ethereum sidechain meant to provide scalability solutions for public blockchains, are famous examples of sidechains.
nodes. Shelley’s introduction created several options, including incentives, transactions, pooling, monitoring, and delegating. The roadmap for Cardano consists of five phases: Byron, Shelley, Goguen, Basho, and Voltaire. SHIB, → “Shiba Inu Token” Shiba Inu Token (SHIB), SHIB is a decentralized Ethereum-based memecoin. It was created as a prank to compete with Dogecoin. Dogecoin’s initial logo, a Japanese dog breed, inspired its name. Shiba Inu token is a multi-billion-dollar community-driven enterprise. Shiba Inu’s multi-token ecosystem includes Shiba Inu (SHIB), Leash (LEASH), and Bone (BONE). Shiba Inu supports NFTs and DeFi platforms. ShibaDEX is a non-custodial multi-coin wallet and decentralized cross-chain exchange using the chain-agnostic AtomicDEX API to scale the Shiba community. Shielded Address, Shielded addresses employ zero-knowledge proofs to encrypt transaction data while being network-verifiable. Protected transactions include two shielded addresses. Shielded Transaction, There is a significant market for conducting anonymous and secure financial transactions. A secured transaction is one of these methods. It is a sort of transaction that uses the cryptographic method known as mixing to conceal the sender’s and recipient’s addresses. It works by generating a new address particularly for the transaction and then transferring money from the original sender’s address to the newly produced address, while simultaneously sending funds from another newly formed address to the original address of the recipient. These two new addresses are produced by a unique mixer service operating outside of the blockchain. This makes it challenging to establish the precise origin or destination of a transaction, guaranteeing anonymity for both senders and recipients. Zcash is the first cryptocurrency to do this using the zk-SNARK zero-knowledge proof architecture. Shilling, A shill is a hustler or scam artist who attempts to persuade others to purchase or praise a product (shilling). The shill’s activities are motivated by selfish intentions, often because they are the real seller or have something to gain if the product sells well. Shitcoin, Shitcoin is a common expression for a cryptocurrency with no value or use, such as
148
Slippage client that downloads just block headers and requests Merkle Tree proof-of-inclusion. Every leaf node in a Merkle Tree is labeled with the hash of a data block, and every non-leaf node is labeled with the cryptographic hash of its child nodes. SPVs let light clients know whether a transaction has occurred. Light clients are wallets that operate on low-end computers. However, SPVs have drawbacks, such as 51 % attacks, in which hackers may be successful in convincing SPV proofs to validate illegal transactions. SIM-Swap Scam, A SIM switch scam (also called port-out scam, SIM splitting, Smishing, or simjacking) is a sort of account takeover fraud that targets a flaw in two-factor authentication and two-step verification in which the second element or step is a text message (SMS) or call sent to a mobile phone. The scam leverages a mobile phone service provider’s ability to move a phone number to a new device (SIM). This function is utilized when a phone is lost or stolen or a client gets a new phone. The fraudster collects the victim’s personal information using phishing emails, organized crime, or social engineering. Fraudsters then contact the victim’s cell phone provider with this information to move the victim’s number to a new SIM. This is done by impersonating the victim or stating they have misplaced their phone, for example. Skynet, No, not the Terminator network. Skynet is a Sia blockchain technology for decentralized storage, content distribution, and file sharing. Sia’s purpose is key to understanding Skynet. Sia is a blockchain network for lending hard drives. Users may rent a hard drive to store encrypted data, giving them full control to it. Siacoins (SC) are Sia’s native token. The parent firm charges lenders and borrowers a tiny storage commission. Skynet users manage their own data and how it is used. Skynet apps may be social networking sites, desktop software, storage apps, mobile apps, and more. Slippage, Cryptocurrency traders want their buy or sell orders to be completed at the precise price they choose. This is not always the case, owing to a severe issue known as slippage. Slippage occurs when traders must accept a different price than what they originally asked owing to a change in price between the time the order (for Ethereum, for example) reaches the market and the time the deal is executed. This
Signal, Human or artificial intelligence study of historical data and trading patterns, as well as conclusions drawn from technical, fundamental, and sentiment research, might provide a signal. Individual investors/traders, research organizations, and investment/trading funds are some of the possible origins of a signal. Generally, signals are supplied for free, however customers sometimes pay for signals from seasoned investors/traders with a track record of success. Over the years, several Telegram groups have provided crypto signal services. By the time group members get the buy signal, the asset has often been pre-pumped by insiders, causing group members to purchase the cryptocurrency at an inflated price that leaves it susceptible to a sharp and quick drop. Therefore, it is advised to constantly exercise caution while joining signal groups. Silk Road, The FBI in 2013 took down the dark web criminal black market called silk road that accepted Bitcoins for transactions. Ross Ulbricht created in silk road in 2011 as a marketplace for illegal items including fake IDs, drugs, and narcotics. Silk Road is believed to have processes $1.2 billion in two years generating $80 million in commissions. Ulbricht is accused of using a second computer that may contain information on the estimated missing 440,00 Bitcoins. A Manhattan judge convicted him on seven offenses stemming from the Silk Road Marketplace. Simple Agreement for Future Token (SAFT), A Simple Agreement for Future Token (SAFT) assures developers will transmit crypto tokens to investors. By using the regulated SAFT, funds may be structured before the token’s debut while offering SAFT holders future ownership rights. In the contract, the investor’s exact contribution and discounted tokens are stated as well as when the cryptocurrency will be transferred. Unlike ICOs, SAFTs are aimed for authorized investors, not the public. This approach lets financial institutions to engage in token funding without regulatory worries. However, SAFTs are traditional contracts, not blockchain-based smart contracts as they lack self-execution and immutability. SAFTs may be enforced in court despite these loopholes since they are lawful and regulated. Simplified Payment Verification (SPV), Simplified Payment Verification (SPV)is a lightweight blockchain transaction verification
149
Slot (Cardano) enable to automate daily tasks like feeding pets and watering plants with only a smartphone or tablet. A smart house can monitor the temperature and heat/cool the area while its inhabitants are gone. Smart home technology may include a smart fridge that keeps track of their groceries and orders more from an online supermarket, or a smart fridge that offers meal suggestions based on its contents. The Internet of Things (IoT) has provided endless use cases and possibilities. Smart houses may minimize utility expenditures by monitoring heating, water, and electricity use. Blockchain technology may reduce the security risks of a single point of access in smart homes by encapsulating client commands in smart contracts. Smart Token, Smart tokens are normal tokens that not only convey the money they contain but also all the information required to perform a transaction concurrently. Smart tokens include smart contracts that utilize all the information required to approve a transaction. The Bancor decentralized trading protocol established one of the initial popular standards for smart tokens. In 2017, the business developed its own smart tokens that implemented direct convertibility via smart contracts. Its use case was straightforward: tokens that could be purchased or sold at any moment through their own smart contract, without the necessity for an exchange. Smart Treasury (Balancer), Smart treasury automates and optimizes share, coins, or token buybacks which are a means of distributing a company’s earnings to its shareholders as an alternative to paying dividends. It is accomplished by acquiring outstanding shares, coins, or tokens on the market, which then become treasury stock – stock that is ineligible for dividends and excluded from governance involvement. It is owned by the corporation and may be resold on the open market in the future in order to reacquire funds. A tight relationship exists between smart treasuries and automated market makers (AMMs), which are the outcome of the creation of decentralized exchanges (DEXs). sMPC, → “Secure Multi-Party Computation” Snapshot, A snapshot captures a moment in time. A snapshot documents a blockchain’s state at a certain block height. It keeps track of token holders’ total number and balance. A storage snapshot is like taking a picture of a
situation is possible on all markets as well as positive and negative slippages. Positive slippage occurs when the actual executed price for a purchase order is lower than the anticipated price, since it provides traders with a better rate than planned and vice versa for negative slippage and sell orders. To decrease or eliminate slippage, traders might use limit orders, which do not settle at an undesirable price. Slot (Cardano), Slots are blockchain’s smallest time periods. Cardano slots last one second. Each slot has a leader who can produce a single block or not. If the slot leader does not produce a block, the next slot leader will be picked from a different staking pool. Cardano’s proof-ofstake (PoS) uses slots and epochs. Each Cardano epoch currently includes 432,000 slots (five days). Empty slots arise when no delegate wins that slot’s leadership and fails to form a block. Empty slots happen owing to network delay or because network members do not notice winning blocks soon enough. Smart Contract, A smart contract is a self-executing computer program containing buyer-seller agreements contained in code. The software and agreements are disseminated on a decentralized blockchain network like Ethereum or Ontology. When criteria are satisfied, a smart contract executes automatically. Once code is run, it cannot be changed. Smart contracts allow anonymous transactions between parties that do not trust one other, without a third-party authority, court system, or other external mechanism. Smart contracts may be compared to vending machines as one may transact automatically by inputting coins and selecting a good. Smart Contract Audit, An audit is an extensive methodical examination and analysis of a smart contract’s code. This technique finds code mistakes, bugs, and security vulnerabilities and suggests fixes. Many smart contracts include large financial assets and/or precious things. Thus, such audits make sense as a single defect or weakness in smart contracts might cause large losses. In the booming DeFi business, where sometimes buggy smart contracts are hurried to market to satisfy investor demand, smart code audits are growing in importance. Smart Home, A smart home uses internet-connected appliances to enable remote operation and monitoring. Smart home technology may
150
Soft Fork (Blockchain) there will be a greater emphasis on data protection and privacy. Social Token , Social crypto tokens enable creators and content producers to commercialize their work as part of a non-fungible token (NFT) or social token, and in exchange, their followers donate to demonstrate their commitment. The value of social tokens is derived by the development of the communities. While the majority of current initiatives are still in the proof-of-concept phase, the long-term objective is to develop a new method for fueling the content creator economy. Tokenization may produce ecosystems that are far more rewarding and user-friendly than the present advertising and subscription models. There are several sorts of social tokens, including personal (e. g., $ALEX, $SWAGG) and community (e. g., $JAMM) tokens. Presently, social tokens play only a significant part in the ecosystem of creators for artists and musicians. Soft Cap, Soft cap is a project’s team-defined minimum fund-raising goal via an ICO, IEO, etc., whereas a hard cap is a team’s maximum financing goal. If a team cannot gather funds beyond its soft cap limit, it occasionally returns the money to investors, while others continue developing the idea. The teams should tell prospective investors why they need the money and what they will use it for. However, many teams have raised money even without a soft cap. Abnormally low and high soft cap levels show the team’s inexperience and validity. A team’s experience and validity are shown by a well-defined and communicated explanation of soft caps. Soft Fork (Blockchain), It terminates the validity of previous transactions or blocks for network members (nodes) that have chosen to adhere to the new consensus rules. However, it still permits nodes adhering to the previous consensus rules to accept as legitimate subsequent transactions or blocks. Consequently, a soft fork is backward-compatible, which distinguishes it from the more prevalent hard fork, which terminates forward compatibility for all previous consensus-following nodes. Soft forks are notable in that it is only necessary for the majority of miners on the network to agree to execute the new code. Over the years, Bitcoin and Ethereum’s blockchains have implemented several soft forks to update the network, address bugs, and improve functionality. Bitcoin
server’s data at a given period. Snapshots are not a full copy of hard drive’s contents; they mostly contain metadata and can only be stored on a local server or device. Live data in application tests, such as when testing a new app or program or trying out new settings, might put a system at danger, hence snapshots are used for test/dev. Workflows may be automated, tested, iterated, and deconstructed without much additional storage using a snapshot. Social Engineering, Social engineering tricks people into making errors that expose personal information or give it away. Cybercriminals have employed social engineering for years to collect personal information. Cybercriminals often utilize psychological deception, such as impersonating to get access to personal accounts. There are several types of assaults, including baiting, which entails enticing consumers in with something they like and then stealing it when they are vulnerable. Scareware, pretexting, phishing, and spear phishing are additional forms. All these attacks focus on establishing the user’s confidence, generating a feeling of urgency, and then manipulating the user to make a mistake so that the cybercriminal performing the attack may steal the user’s identity. Social Media, Social media allow users to produce and distribute information and engage in social networking. Social Media platforms enable users to communicate with one another and exchange information, ideas, personal messages, and other material such as images and videos. Some social networking sites provide live connection through text chat, phone conversations, and video calls. The incorporation of social media into many people’s everyday lives has altered the way they interact and exchange information. The rapid dissemination of information, such as news and views, that may have a worldwide influence is made possible by social media. In addition, social media enables individuals to participate in dialogues and debates that were previously impossible or difficult owing to physical distance. Moreover, social media has enabled firms to engage directly with their consumers, allowing them to develop relationships and obtain insights about their target audiences. Artificial intelligence and machine learning will enhance the user experience on social media platforms, live streaming and virtual reality technologies will expand, and
151
Soft Peg a given wallet has the power to transfer money. Software wallets provide customers more accessibility and convenience on desktop, tablet, and mobile devices. Additionally, they provide support for numerous crypto assets, which is known as a multi-coin wallet. A further advantage is that software wallets are typically cost free. Software wallet normally use a 12- to 24word seed phrase that is produced at random. AtomicDEX, Electrum, Exodus, and Guarda are popular software wallets. Solana, Solana is a smart contract blockchain platform with the coin SOL. It was proposed by Anatoly Yakovenko in a white paper in November 2017. Solana reaches agreement using a proof-of-stake (PoS) mechanism and its model, the proof-of-history mechanism. This helps the network to run more quickly since validating a block does not need communication between nodes. According to the Solana whitepaper, this concept is a decentralized clock. Solana, like other blockchains, can execute smart contracts. Solana’s execution environment is built on eBPF, enabling the usage of the programming languages Rust, C, and C++. Solidity, Solidity is a high-level object-oriented programming language for Ethereum. Solidity is a tool for writing smart contracts. The programming language interacts with Ethereum Virtual Machine (EVM), an abstraction layer between code and machine. Since the EVM does not compile solidity directly, it must be converted to Opcodes. Solidity allows inheritance, complicated objects, and libraries. It is enabled developers to construct complicated, automated financial, gaming, auction-based, and management apps. But it also has some flaws, like every programming language. Source Code, A Source code is a set of instructions (text-based codes) that result in a high-level programming language-based computer program. It is a collection of words, letters, symbols, etc. The instructions must be translated from the high-level language (source code) into a machine language recognized by computers before they can be executed by a computer. Compilers and interpreters do this translation in order to make programs executable. A program may be executed by running its compiled version via an interpreter or, for more sophisticated tasks, by executing its source code directly. A program’s source code is often stored in one or more text files. The pre-
Segwit is a well-known and typical example of a soft fork. Soft Peg, Soft pegging is the third most common form of currency manipulation, after hard and flexible pegs. Pegging permits a currency’s value to be fixed relative to another or a commodity. The Chinese Yuan was hard pegged from 1994 to 2005 and soft pegged with its value fluctuating up to 2.1 %afterwards. The soft peg approach permits some volatility between the pegged cryptocurrency’s value and its peg. Not to be mistaken with free-floating, in which a currency is not tethered to another, is the soft peg system. Soft pegging may provide currency markets with stability and predictability. Software Library, The software library contains procedures, functions, and code snippets. These collections allow code to be reused, preventing programmers from reinventing the wheel every time. Some libraries concentrate on graphics or data processing, while others are input/output or general-purpose. Usually, code generation, static, and dynamic libraries are available. Software Stack, Engineers use the phrase software stack to describe the levels used in software development. Each layer of a software stack may interact with one or more levels underneath and above it. The most prevalent application is a web browser sending data across the Internet Protocol (IP) network, which is then carried by the transmission control protocol (TCP). TCP resides on top of the internet layer of the internet protocol suite, which resides on top of the network access layer, which resides on top of Ethernet. Each layer must operate flawlessly for the job to be carried out, which is to surf the Internet using a web browser. The typical levels of a technology stack include hardware, operating system, and middleware. The sort of stack an application architect employs depends on the project’s particular demands and requirements as each software stack has its own advantages and disadvantages. Software Wallet, Software wallets, often known as a wallet apps, are pieces of software that enable users to store, transmit, and receive cryptocurrencies. Blockchains technically hold currency on-chain, but software wallets offer a graphical user interface (GUI) for interacting. Typically, there are three sorts of software wallets: web wallets, desktop wallets, and mobile wallets. Using private keys, only the owner of
152
Spot Trading or legitimate investment possibilities has been a heated subject. At the end, what token, coin, or cryptocurrency one purchases determines whether it is a speculative investment. Spoon (Blockchain), A spoon is a form of blockchain split in which the new coin inherits the current cryptocurrency’s account balances. Spoons allow new projects to add own features to the old software while still enabling the present protocol’s users to participate. The nature and purpose of a spoon distinguish it from the more typical hard fork. Most hard forks are controversial, while spoons prioritize teamwork. Prominent instances are Athereum and Cosmos, which both took screenshots of the Ethereum blockchain to record and transfer account balances to their respective successor networks. Spot, Spot trading involves purchasing and selling assets, securities, and cryptocurrencies at real-time prices to make a profit. In contrast, investing typically involves holding (or HODLing) an asset for the medium or long-term. Spot traders purchase and sell a variety of assets, securities, and cryptocurrencies to create short-time gains, unlike crypto investors who retain assets for the medium or long term. Spot trading focuses on buying cheap and selling high to maximize profits. There are different over-the-counter (OTC), peer-to-peer (P2P), centralized exchange (CEX), and decentralized exchange (DEX) crypto spot markets. Spot Market, Spot markets are cash markets where products are sold immediately. Prices vary every day or even every second according to supply and demand. Spot market contracts are made on the trading floor of a futures exchange. Legally binding contracts are frequently handled via a clearinghouse (third party). Futures enable investors to hedge against unfavorable asset price swings. The spot exchange rate is the current exchange rate of a currency pair. There are different over-thecounter (OTC), peer-to-peer (P2P), centralized exchange (CEX), and decentralized exchange (DEX) crypto spot markets. Spot Trading, Spot trading entails instantaneous exchange at the current price. In crypto, a spot trade involves trading two coins against each other. Spot trading refers to an asset’s selling or buy price, not its future price as in a futures contract. Most exchanges provide spot and margin trading. In contrast to stock
cise format of this file varies per programming language, although most programs have at least one file with the extension.c,.cpp,.CPP, or.cxx (e. g., filename.c). The objective of having the source code is to be able to modify it whenever necessary. Having the source code guarantees the highest level of product security. SPAC, → “Special Purpose Acquisition Company” Spear Phishing, Spear phishing is a targeted assault that combines information from social media, work emails, and other sources to create an individual-specific phishing attack. Because it leverages personal information to acquire confidence, spear phishing is more harmful than mass phishing. The senders may be familiar with the target, including their personal information and hobbies. They may even be aware of their telephone number and address. The greatest danger posed by spear-phishing is the harm it does to a company’s image. Every incident of spear-phishing, whether it’s a false CEO email requesting personal information, faking a supplier to obtain access to their systems, or fooling employees into putting malware on their computer, may leave employees feeling frightened and unprotected. Special Purpose Acquisition Company (SPAC), SPACs are created by investors to raise money via an IPO (initial public offering) to acquire a business and have no commercial activity. Groups of investors called sponsors create them to pursue transactions in a certain sector. The money is locked in an interest-bearing trust account and may only be used for acquisitions or to repay to investors if the SPAC is dissolved. SPACs are a popular technique for firms to go public while avoiding IPOs and ICOs and without a significant market presence. They are speedier and more convenient than IPOs and ICOs. Speculative Investment, Speculative investment involves high-risk, high-reward assets. Speculators strive to benefit from price changes on the market via quick trading. Some speculators seek inexpensive assets, while others profit from what they perceive to be inflated markets. In certain instances, speculation may be compared to gambling since it does not always include the core value of an asset and often involves minimal prior study. Since cryptocurrencies have gained popularity, the debate over whether they are speculative investments
153
SPV Stagflation, Stagflation is a phase in which the economy simultaneously faces high inflation, low growth, and high unemployment. Stagflation is a highly unusual economic and gray swan event since the three indications seldom occur concurrently. The reasons of stagflation are many, but overregulation of the economy, an increase in taxes, and an increase in interest rates may all contribute. In the 1970s, when the US experienced inflation amid a recession, the term stagflation was created. Some think that this episode was triggered by the Nixon administration, which forcefully pressed the Federal Reserve to increase the money supply in parallel with the White House’s wage and price control program. Staking, Staking is the practice of locking up crypto assets in order to make a return on investment and assist safeguarding the blockchain. The consensus mechanism of the blockchains that enable the staking procedure is proof-of-stake (PoS). Nodes with staked cryptocurrency validate new blocks and get a return. Staking is like having a cryptocurrency savings account. There are three primary types of staking cryptocurrency: Staking on a Centralized Exchange (CEX), operating an own node, or delegating one’s stake. Most cryptocurrencies have a proof-of-stake (PoS) consensus method, allowing them to be staked. Staking Pool, A staking pool, when referring to the participation mechanism in a Proof-ofStake (PoS) consensus network, is essentially the collection of all the assets given by numerous stakeholders in order to unify their staking power. In PoS networks, decision-making or computing capability is proportional to the quantity of assets stored. Many choose to give their power to a staking pool since most network members have insufficient means to stake on their own. These pools often have their own administrator or pool operators who are responsible for maintaining the functionality of the nodes/validators. This procedure strengthens network security and checks and validates new blocks. Stakers get proportional rewards which are often evaluated and reported in annual percentage yield (APY). Stale Block, Stale or orphaned blocks in Bitcoin Mining are legitimate blocks that have been successfully mined but are no longer included in the longest proof of work chain. This happens when two blocks are mined al-
exchanges, cryptocurrency exchanges enable spot trading 24 hours a day, seven days a week. There are many different crypto spot markets. SPV, → “Simplified Payment Verification” Spyware, Spyware is a sort of software that is built to record and transmit any activities on an infected device to a snooper. Spyware’s primary objective is to monitor a user’s behavior and collect as much information from them as possible for the hacker’s own advantage, such as selling data to marketers or committing identity theft. There are several varieties of spyware, including adware, trojans, keyloggers, tracking cookies, and system monitors, which execute certain activities and record a set of data without the target’s knowledge or permission. Spyware is often spread to unwary users through infected websites, which may be obtained via email, random pop-up browsers, or advertisements. Additionally, downloading files via the Internet might infect a device with malware. Spyware is harmful to crypto users because it may steal their private keys, enabling criminals to steal their digital assets. Unlike with credit or debit cards blockchain transactions cannot be undone. SSL/TLS, SSL (Secure Socket Layer) and TLS (Transport Layer Security) are cryptographic technologies used to secure online connections. SSL was replaced by TLS in 1999 due to its superior security characteristics. TLS 1.3 is the current version. However, SSL continues to be used as a metonym for both protocols. The term SSL certificate is commonly used, yet SSL is deprecated and no new systems support it. Stablecoin, Stablecoins are cryptocurrencies having a constant value, often tied to the US dollar, a basket of fiat currencies, or a precious metal. Stablecoins reduce cryptocurrency price fluctuation. Stablecoin currencies are collateralized by an underlying asset, generally the one it digitally reflects, to provide price stability. E. g., the US dollar currency backs Tether (USDT) 1:1. In recent years, the number of stablecoins has skyrocketed. There are basically four stablecoins: Fiat-collateralized stablecoins (e. g., USDT, USDC, BUSD), Commodity-collateralized stablecoins (e. g., DigixGlobal), Crypto-collateralized stablecoins (e. g., MakerDAO’s Dai token), and non-collateralized stablecoins, which use a seigniorage shares system and algorithm to keep their peg.
154
Storage Mining/Storage Miners ing price in relation to its high and low range over a period of usually 14 days. Typically, the graph of a stochastic oscillator consists of two lines. One line marks the oscillator’s actual value for a timeframe. The three-day simple moving average is shown by the second line. The crossing of these two lines is seen as a hint that a reversal is approaching, since it indicates a major daily change in momentum. Frequently, stock/cryptocurrency traders consider the numbers 20 and 80 as thresholds. Below 20 indicates that the market is oversold, while beyond 80 indicates that it is overbought. Stop-Loss Order, Stop-loss orders help investors minimize investment losses. Traders may specify a portfolio minimum price and once this price is achieved, the exchange initiates a sell order to minimize trader losses. Stop-loss orders are useful, particularly with volatile cryptocurrencies. Stop-loss orders also allow investors to avoid constantly monitoring securities and crypto assets. Storage (Decentralized), The concept of decentralized storage leverages decentralized networks to increase file storage privacy, security, censorship resistance, affordability, and availability. Decentralized storage is unlike cloud storage, which stores data remotely on a single service provider servers like Google Drive or Amazon Drive. A cloud storage provider’s centralized data repositories might undergo outages or be hacked by hackers, resulting to diminished data availability or loss. As a private organization manages them, they might limit client access and filter data. Decentralized storage solutions break user files into encrypted pieces and store them on a blockchain or other geographically and organizationally scattered network. Distribution of multiple redundant copies of file fragments leads to increased security and privacy. Even if some nodes on the network become compromised, files can still be retrieved from the remaining nodes. InterPlanetary File System (IPFS), Storj, and Siacoin pioneered decentralized storage after 2013. Storage Mining/Storage Miners, Storage mining compensates miners for storing data on their servers or devices. Miners must allocate a particular amount of storage space to be a blockchain node. These nodes verify transactions and mine new blocks for the chain. The storage-based consensus method is still experimental in the cryptocurrency sector as most
most simultaneously due to network latency. This leads the network to momentarily divide into two rival chains, resulting in two distinct Bitcoin blockchain histories. When miners contribute fresh blocks to one of the two version histories, the divide is resolved. The stale block is invalid and its rewards are also invalid, so the miners cannot spend them (the coins are rendered inert and unspendable). Any transactions mined in a stale block are returned to the mempool and included into subsequent blocks. State Channel, State channels enable users to conduct safe off-chain transactions with little interaction with the Ethereum Mainnet. Channel participants can execute an infinite number of off-chain transactions while submitting just two on-chain transactions to start and terminate the channel. Bitcoin’s Lightning Network payment channels are like state channels. However, in addition to facilitating payments, they also enable general state updates. Stationarity, Stationarity presupposes the existence of the following properties: // Mean constant: There is no increase or decrease in the data, hence the data is about horizontal across time. // Constant variance: The variance, or dispersion or variation around the mean, is virtually unchanged. // Constant autocovariance: Informally, temporal similarity between observations is constant. Stationarity is essential since many forecasting techniques rely on steady statistical features throughout time. STL-ARIMA/STL-ETS/STL-Drift/STL-Naive, The time series are decomposed into the trend, seasonality, and remaining parts using STL decomposition. The corresponding model is then applied to the seasonally adjusted data (i. e., data, where the seasonal component has been subtracted from the time series). The model is then used to forecast, and then the seasonal component is added on top. STO, → “Security Token Offering” Stochastic Oscillator, The stochastic oscillator is a momentum indicator used to decide when to enter and quit a trade based on whether the underlying asset or security is overbought or oversold. In the 1950s, Dr. George Lane developed the concept of stochastics. The stochastic oscillator depicts the position of a stock’s clos-
155
Storage Node be accessible to individuals who have held a competing currency for at least six months or to active liquidity providers on a decentralized exchange (DEX). In addition, a SHO may target people with a monthly transaction volume exceeding $5 million. The architecture is typically advantageous for both crypto projects and investors with strong hands, or the ability to keep a coin for lengthy periods of time. Stroop, On the blockchain, it is the smallest unit of XLM, Stellar’s native cryptocurrency with currently 25 billion coins and a fixed supply of 50 billion coins. One stoop equals 0.000001 XLM. Stellar was created in 2014 as an open-source payments network. It promotes blockchain interoperability, makes micropayments economically, simplifies mining, sending, and exchanging digital currencies, and facilitates a smooth currency exchange. The idea was to produce cryptocurrencies as robust as Bitcoin but easy to use and connected with the financial system. Structured Data, Structured data is stored in a pre-defined format, usually in the form of a table (i. e., consisting of rows and columns) with well-defined entries (e. g., numbers, dates, strings). The structure reduces the need for preprocessing and makes analysis much easier as the data entries can be addressed much more easily. A CRM (customer relationship management) database, stores customer data in a structured way to allow employees to interact with the data in an easy manner. Subgraph Manifest, The subgraph manifest is the file that specifies how certain Ethereum network data is translated to the graph. It is written in YAML and includes the name, description, and data sources columns. The subgraph manifest is a standardized method for specifying the entities, connections, and indexes required by a graph. Subgraphs are open-source data structures that specify how an application should store data in a decentralized database known as a Graph Node. The graph is used as a mechanism to expedite the development of dApps utilizing GraphQL on Ethereum and IPFS. Everything is open-source, allowing anybody to construct a subgraph using a template or by forking an existing one. Substrate, Substrate is a platform for web application development created by Parity Technologies that enables software developers to build decentralized solutions. Substrate has a
blockchains use proof-of-work (PoW) or proofof-stake (PoS) consensus. Filecoin is one of the cryptocurrencies that uses on storage mining. Here, storage miners have a lot of versatility due to the network’s extremely adjustable storage power needs. Storage Node, Similar to how the Bitcoin (BTC) network’s ability to conduct transactions is assured by its own nodes, storage nodes manage the Storj network. Storj is a decentralized cloud storage that offers remote digital data storage and distribution services, like Google Drive or Dropbox, but without a central administration. Cloud storage services enable customers with insufficient hard drive capacity on their own computers or mobile devices to remotely rent storage space for a price. The storage nodes may vary from a single personal computer whose owner want to use idle disk space to specialized configurations with many hard drives geared for profit. Each node gets compensated with Storj (STORJ) in proportion to the quantity and quality of storage space it offers. This is referred to as storage mining. Store of Value, A store of value may be an asset, currency, or commodity. A commodity may be called a store of value if it’s worth remains consistent or increases over time without depreciating. Gold, along with other precious metals, is an excellent store of value owing to its indefinite shelf life. A nation’s currency must be a reliable store of value for its economy to operate efficiently. Numerous civilizations throughout history have used precious metals such as gold and silver owing to their ability to hold value and their relative transportability. Prior to 1971, the United States was on a gold standard, which meant that dollars were redeemable for a particular weight of gold. What constitutes a store of value may vary considerably, although in most more developed countries, the local currency can be relied upon as a store of value in virtually all circumstances. Strong Holder Offering (SHO), Strong holder offering (SHO) is a technique for raising capital in which investors are selected based on their on-chain actions and other unique statistics. A SHO allows a project to receive investment from people who possess a certain cryptocurrency. A SHO approach targets public investments and is a creation of DAO Maker, which utilizes it extensively to aid in the establishment of new crypto initiatives. An SHO may
156
Sweep the floor Supply Chain, A supply chain is, in basic words, the series of steps that a service, product, or commodity takes before reaching the end consumer. A supply chain encompasses everything from the procurement of raw materials through their processing in factories and other enterprises to distribution and sales locally, nationally, or internationally. Lastly, the supply chain includes any third-party businesses that purchase the goods for resale. A supply chain is, in essence, a thorough map of how a service, product, or commodity travels from its origin to its ultimate destination in a customer’s house. Today’s supply chains might include thousands of stages. Herein lies the use of blockchain technology and cryptocurrencies. Non-fungible tokens (NFTs) may be an ideal vehicle for a supply chain as all products become highly traceable, and supply chain losses are reduced. Supply Chain Attack, Supply chain assaults are becoming more prevalent, with the Solar Winds attack in the United States occurring in 2020. In this instance, hackers (widely assumed to be Russian) infiltrated a software supplier used by Fortune 500 firms, government entities, and several other institutions. By assaulting Solar Winds, the cybercriminals indirectly targeted all these organizations. Using a trojan horse update, the hackers acquired access to a significant quantity of sensitive and perhaps top-secret data kept by military branches, the state department, and the pentagon. Beyond cybercrime, supply chain attacks are beginning to reach the realm of cyber warfare. In the next years, supply chain attacks may be used for extortion, spying, and gaining control of key infrastructure networks. Swarm, Swarm is the term for a collection of peers that share a torrent. Multiple swarms may exist for a single torrent. In some instances, peers form their own swarm. A peer is an end-user or client who utilizes the BitTorrent protocol to download and upload torrents on their computer. At any one moment, the BitTorrent protocol permits only one swarm to exchange a file. One may compare a swarm to a video conference in which everyone in the swarm participates, but only one person can talk at any one moment. In this example, the talking refers to the shared file. Sweep the floor, To sweep the floor is to purchase all the NFTs on the trading floor of a certain project. This might be a positive indica-
safe and scalable blockchain logic, a rich user experience for any chain, interoperability with the Polkadot ecosystem, and support for various smart contract platforms like the Ethereum Virtual Machine (EVM). In addition, it enables a peer-to-peer networking stack capable of accelerating the transaction throughput between blockchain networks and their members and includes configurable features, such as transaction queues and runtime libraries, that may be tailored to the demands of an application. Substrate is also compatible with all browsers and desktop devices. Supercomputer, Seymour Cray of Control Data Corporation developed the first supercomputers in the 1960s. In the past, supercomputers were not as prevalent as they are now. Supercomputers feature superior GPUs and CPUs compared to personal computers. Currently, the speed of the most powerful supercomputers is 100 quadrillion FLOPS (floating-point operations per second). Weather forecasting is one of the most apparent applications of supercomputers. There is a global rivalry among nations to be the next to develop the fastest supercomputer. The huge processing capacity and enhanced productivity of supercomputers make them the ideal mining equipment. Supervised Learning, Supervised learning models learn patterns based on the features of the labelled training data. The goal of these models, is to predict the associated label, based on the features. This is done by using the patterns learned from the training data. It is important to note that a high performance on the training data does not imply high performance on unseen data (see “Overfitting“). Supply and Demand, The economics 101 concepts of supply and demand may be seen as the ruling forces of a market economy, which are tempered by pricing. It describes the link between a product or asset and the desire of individuals to purchase or sell it. Supply is the quantity of available material, asset, product, or service in an economy. Demand refers to the need for goods and services. It is used to assess the number or proportion of individuals who are interested in the products/services supplied by a company and how much they are prepared to pay for them. Bitcoin is an example of a scarce asset since its value grows as its demand increases.
157
Swing Failure Pattern (SFP) the stock market, symbols are also used to represent well-known public corporations, such as Apple (AAPL) and Facebook (FB). In essence, symbols may help investors differentiate digital assets with similar-sounding names. If assets are also shown on a fast-moving screen, symbols guarantee that information may be comprehended rapidly. The number of letters in a symbol can vary between one and five characters. Synthetic Asset, Tokenized derivatives are basically synthetic assets. Synthetic assets, or tokenized derivatives, add the derivative’s record to the blockchain and create a cryptocurrency token. Derivatives are popular in the cryptocurrency market because they enable investors to bet on token volatility without owning any. Synthetic assets are also favored because of their security and traceability. Synthetic assets trade on the blockchain, not centralized exchanges (CEXs). On several blockchains, new exchanges for synthetic assets are developing to provide traders with maximal flexibility and lower gas fees. Cream Finance and MakerDAO are two prominent alternatives to Synthetix, which is the largest and most popular exchange for synthetic assets. TA, → “Technical Analysis/Trend Analysis” T-Address (Zcash), Zcash employs two distinct but completely compatible address types: z-addresses (private) and t-addresses (public) (transparent). When a user wishes to transmit a transparent transaction, such as for auditing or legal compliance, they utilize the t-address, which makes the transaction seem as if it were done on a public blockchain. Zcash (ZEC) is one of the cryptocurrencies that focuses on giving users with a mechanism to stay completely anonymous while dealing on the blockchain by using zero-knowledge proofs, among other things. Monero is another popular example of a totally anonymous cryptocurrency (XMR). All transactions on a public blockchain, such as Bitcoin (BTC) or Ethereum (ETH), are completely visible by default. Taint, Taint refers to the belief that certain bitcoins are riskier or less acceptable due to their prior owners or probable ties to criminal activities. The taint chain is a technique for tracing stolen Bitcoins using the blockchain. The technique was peer-reviewed and presented in the paper making Bitcoin legal at the 2018 Security Protocols Workshop. BitcoinRedux is a com-
tor of impending good news or the presence of whales in the area just before a project moons. Swing Failure Pattern (SFP), The swing failure pattern (SFP) is a crucial indicator of a trend reversal because it indicates when the existing market trend begins to weaken and a new trend begins to emerge. A SFP happens when the current price trend fails to achieve a new high in an uptrend or meet the lowest low in a downtrend. The term was originally created by Welles Wilder in his book about technical trading analysis. The relative strength index (RSI) swing failure is an excellent tool to understand the SFP trading approach. SFP happens when the price line and RSI line diverge. It is an indicator of falling momentum, especially when the market is in an oversold or overbought situation. The point at which the RSI line falls under the most recent swing low is known as the fail point. Swing Trading, Swing trading is a trading practice in which investors buy stocks or other assets for a short period to make a profit. Successful swing traders monitor their positions and transactions. Risk-to-reward is midway between trend and day traders. Swing traders depend on charted technical indicators to discover trading opportunities, despite technical analysis’ imprecision. Swing traders aim to benefit from market price swings. Individual gains may be lower since traders concentrate on short-term trends and minimize losses. Small gains might add up to a large annual return. Sybil Attack, Sybil attacks may be simple, like creating duplicate social media profiles, or complicated, like maintaining several blockchain nodes. Both strategies aim to build network influence. The origin of the name Sybil is a medical case of a lady with dissociative identity disorder. A malicious actor may seek to destabilize the power structure of a network in blockchain systems by acquiring as many node IDs as feasible. On peer-to-peer networks, it is possible to rapidly concentrate network control by assuming many identities. Sybil attacks use several nodes to modify information send or received across a network. Considering the inherent interdependence and interconnection of decentralized systems, this may be quite successful. Symbol, A cryptocurrency’s symbol is its shortened acronym, such as BTC for Bitcoin, ETH for Ether, or BNB for Binance Coin. On
158
Terahashes Per Second (TH/s) Tardigrade (Storj), Tardigrade, named after a resilient microscopic animal, is a comparable S3-compliant storage service, but decentralized. Instead of massive server clusters in specialized data centers, Tardigrade uses a distributed network of small-scale storage nodes. Tardigrade breaks files into up to 80 encrypted sections and sends them to different storage nodes, but only 29 of these need to be retrieved from the nodes to reassemble the file. Tardigrade was introduced by the Storj (STORJ) platform in March 2020. TBATS, → “Trigonometric seasonality, BoxCox transformation, ARMA errors, Trend, and Seasonal components” T-Bills, → “Treasury Bills” T-Bonds, → “Treasury Bond” TCG, → “Trading Card Game” Technical Analysis/Trend Analysis (TA), Technical or trend analysis (TA) is the study of market activity using price charts to predict the direction of future prices. TA is predicated on the idea that all factors, including basic information, political events, natural disasters, and psychological concerns, influence market pricing and are rapidly discounted in market activity. The concept of technical analysis is founded on three assumptions. First, everything is promptly discounted on the market. Second, prices fluctuate in trends (even in non-uniform marketplaces), and third, history always repeats itself. When a market has begun to move in a certain direction, technical analysis is more valuable and instructive than fundamental analysis, which is used to anticipate the movement. Technical Indicators, Technical indicators are used to predict future price movements in Technical Analysis (TA). Technical analysis studies price movement and volume to assess markets and derive investment advices. Technical analysts use price patterns, trading signals, and other quantitative charting methods to analyze a security’s strength or weakness. Technical indicators focus on price, volume, and open interest rather than company fundamentals like earnings, sales, or profit margins. Active traders use them to judge short-term price swings, whereas long-term investors use them to calculate entry and exit points. Terahashes Per Second (TH/s), Data processing speed is measured in terahashes per second. A hash is a unit of measurement for
prehensive examination of the lessons learnt after system development. Tamper-Proof Ledger, Blockchain technology depends on security, which is why, in principle, all blockchain ledgers are tamper-resistant ledgers. Currently, the global monetary system runs with many ledgers. Banks and credit card firms are ledgers at their heart, storing information about transactions and the flow of funds between parties. Due to the significant danger of fraud and information manipulation, the conventional banking system is often under stress. This is where blockchain technology or immutable ledgers enter the picture. Bitcoin was the first effective tamper-proof ledger to be introduced. Since then, all blockchains have relied on encouraging node operators not to alter the ledgers. This incentive system maintains the immutability of the distributed ledger regardless of its size or the number of blocks contributed. Tangle, The IOTA Tangle is a novel distributed ledger technology (DLT) built for the Internet of Things (IoT) ecosystem. The IOTA system is not based on the standard blockchain concept, but rather on a new sort of DLT. The IOTA Foundation, a non-profit organization formed and registered in Germany, invented it. IOTA Tangle was created to facilitate feeless microtransactions for the expanding ecosystem of IoT devices. IoT devices are network-enabled gadgets, which include smart appliances, home security systems, computer peripherals, wearables, routers, and smart speaker devices with Wi-Fi, Bluetooth, or near-field communication connections (NFC). Tangle was established with the promise of great scalability, fee-free transactions, and near-instantaneous transactions. Taproot, Taproot is a Bitcoin enhancement in form of a soft fork designed to enhance both privacy and other factors associated with increasingly complicated transactions. Its purpose is to modify how Bitcoin scripts run in order to increase the blockchain’s privacy, scalability, and security. Currently, Bitcoin transactions use a variety of complicated features, such as timelock and multi-signature. Without Taproot, anybody may identify transactions using these intricate functionalities. In contrast, Taproot even makes it possible to hide that a Bitcoin script has run at all.
159
Terms and Conditions mainnet. Testnets may be used as a simulation tool to experiment with cryptocurrencies without repercussions. TGE, → “Token Generation Event” TH/s, → “Terahashes Per Second” The Merge (Ethereum 2.0), The Ethereum merge refers to a software update that replaced the platform’s proof-of-work (PoW) consensus process with a proof-of-stake (PoS) system. The consolidation was completed on September 15, 2022. The merge lowered Ethereum’s energy use by approximately 99.9 %. The Onion Router (Tor), The Onion Router (Tor) is a decentralized network that provides anonymity by encrypting internet data and routing it via a number of servers before to its ultimate destination. Through the network’s .onion domain, users may get and give access to websites and services that are only accessible through the Tor network. It is managed by the non-profit Tor project, which published the Tor browser, an open-source web browser that automatically routes traffic via Tor. Each user’s communication is routed via three random nodes, or relays, before being sent to its destination on the Tor network. Each leg of the route is separately encrypted, and each relay only knows where the traffic came from and where it is heading. Hence, no node can ever know the whole path of any communication. The network is perhaps best known as a gateway to dark web sites and markets. Theta, Decomposes the seasonally adjusted series in short- and long-term components. The parameter theta determines how much the trend-component is damped by. Before forecasting, the seasonality must be included again, if there was any. Think Long Term (TLT), Having a long-term perspective implies that people can confidently imagine and actively pursue outcomes in the far future. When people adopt this point of view, they are be able to see a possible future outcome in their minds, and can plan their actions and measures accordingly. This Is Gentlemen, Starting as a typo in the writing this is it, gentlemen, it is now often used as an introductory phrase for uplifting news. Throughput, Transaction throughput refers to how rapidly a blockchain processes trans-
computing power necessary to solve a problem. The more computing power, the more hashes are generated each second. The hash rate is measured in megahashes, gigahashes, and terahashes per second, among other units. One terahash is one trillion (one billion million) hashes per second. The rate of hashes per second is crucial in the context of Bitcoin mining or blockchain since it impacts how long it takes to mine a block. Terms and Conditions, General terms and conditions are all pre-formulated contractual terms and conditions for many contracts which one contracting party provides to the other contracting party when concluding a contract. It is irrelevant whether the provisions form an externally separate part of the contract or are included in the contract document itself, what their scope is, what font they are written in and what form the contract takes. Terms of Reference (TOR), A Terms of Reference (TOR) document specifies a board or committee’s authority to manage a designated area of duty. It should clearly state duties, responsibilities, operations, tenure, and obligations in accordance with any specific legislative requirements. Creating a TOR helps boards or committees and key stakeholders understand the scope, goals, and operating procedures of the board/committee and any statutory obligations (e. g., under a governing act or the Financial Management Act 1996). Individual boards and committees’ TOR documents will vary in context and structure, however there are several key elements any TOR document should include. Test Data, Test data or holdout data is not part of a training process. It is solely for evaluation purposes, i. e., to assess the performance of the predictions of trained model. If the model were to train on this data, it would not be an accurate predictor of the performance, therefore it is vital that this data is not touched during training. Testnet, Testnet is a secondary blockchain where developers may test new features without affecting the main network. Adding new goods or features to a live blockchain is risky and may have tremendous effects if not well vetted. In the worst instance, hackers may exploit flaws to steal money. Developers will search for faults on a testnet and ask people to test the blockchain for feedback. After a testnet trial, a feature may be implemented to the
160
Time-Weighted Average Price (TWAP) be quantified using either the block number or timestamp of a transaction. nSequence, nLocktime, CheckLockTimeVerify, and CheckSequenceVerify are the four methods for determining timeblocks. Timestamp, Timestamps are important to the method through which miners are compensated for mining each block. Typically, when a block is created, two timestamps are involved. One is the block header that the miner imputes. The second is the time the block was really formed. Theoretically, both should generate the same timestamp, but there is always the possibility that miners may enter inaccurate timings or lie about them. Time-Weighted Automated Market Maker (TWAMM), Time-Weighted Automated Market Maker (TWAMM) helps traders in executing huge orders with little slippage and cheap gas costs, without impacting the price. Traders in traditional finance (TradFi) sometimes engage brokers to execute big orders algorithmically over a predetermined period, which frequently yields the best price. A Time-Weighted Average Price (TWAP) order, which provides the price of a security or asset over a specified time period, is sometimes the simplest method to do this. The TWAMM simulate TWAPs as it divides a large order over time into an almost infinite number of small orders using an automated market maker (AMM). This trading approach may cause prices to diverge from the crypto market. For instance, when a traders want to purchase $1 million worth of Solana, they cannot do it in a single transaction since it would cause a significant spike in the market price. Thus, they will typically utilize a trading desk or an algorithm to divide the $1 million order into smaller orders of $1,000 spread out over many hours or days in order to have less of an influence on the market price. Time-Weighted Average Price (TWAP), The time-weighted average price (TWAP) indicates the average price of an item as it increases and decreases over a certain time period. Stock brokers enable traders and customers execute big orders algorithmically over time to acquire the best price and minimize market impact. Brokers must first establish the asset’s opening, closing, high, and low prices on a particular day before calculating TWAP. Traders use this to prevent a large order from quickly increasing an asset’s value. In Decentralized Finance
actions, expressed in transactions per second (TPS), minutes (TPM), or hours (TPH). A blockchain platform’s consensus process influences transaction throughput. As an example, Bitcoin’s PoW blockchain has a lesser throughput than Cardano’s PoS network. Block size, traffic, and transaction complexity impact the throughput. Rollups, sidechains, state channels, novel consensus algorithms, and block size increases may boost a blockchain’s throughput. Ticker, Tickers assist traders track the current prices, and they are also used in cryptocurrencies. These tools provide an instantaneous view of the intraday price fluctuations of an asset, security, or cryptocurrency. The offered information contains the symbol, which is the shortened name, the most recent reported price for the asset, and a number indicating how much it has increased or decreased in terms of cash and percentage. To facilitate comprehension, the text is colored green if the asset has made gains and red if it has reported losses. Ticker Symbol, A ticker symbol represents an asset, stock, security, or cryptocurrency token on exchanges, swapping services, and other DeFi solutions. Every stock and cryptocurrency token needs a ticker symbol to help traders identify them. Ticker symbols prevent fraud and frauds as the same ticker symbol cannot be used for two stocks or cryptocurrencies. Time Series Linear Regression (TSLM), Time Series Linear Regression (TSLM) is a linear regression model, where the variable of interest depends on the trend and seasonal dummy variables. The values therefore follow the trend, but are also affected by the season. Timelock/Locktime, Timelock (or locktime) may be seen as a timetable by which miners on the blockchain execute cryptocurrency transactions. Transactions will be included in the Merkle Tree based on the block height allowed by miners. After this is completed, transactions are only authorized. Timelocks were first introduced by Bitcoin’s creator, Satoshi Nakamoto, intended to be included in all transactions. The blocking time is 0x00000000 by default. Timelocks guarantee that transactions are not validated until a certain time or block height is achieved. Absolute timelocks guarantee that each block is specified relative to a certain time. In order to establish how much time must pass before transactions may be confirmed, time-relative timelocks are in place. Time may
161
Tipset Blockchain and token economies provide a way to bridge the gap between an increasingly global and virtual worlds and the actual world. In a token economy, blockchain technology is used to digitize tangible goods, verify their ownership, and facilitate their exchange. Documentation, tokenization, governance, and trading are the four tools required for working with tokens, also known as digital assets. Tokens may be classified as fungible (divisible, FT) or non-fungible (not divisible, NFT). Token economies are basically a digital representation of the interaction between persons and entities in the physical world. They are founded on measurable units (tokens), are regulated by mathematics, and are safeguarded by encryption. Token Generation Event (TGE), Companies may choose a Token Generation Event (TGE) instead of an ICO. Both fulfill the same function, however out of concern for regulatory repercussions, some organizations may choose to identify their fundraising efforts as TGE). The majority of TGEs involve enterprises in the utility sector. Companies prefer to refer to their token sales as TGEs since these tokens often form a minor amount of the product. Regulatory institutions are under increasing pressure to classify initial coin offerings (ICOs) as securities and, therefore, tax them. TGEs are not classified as securities and are thus not taxable. Therefore, there may be tax benefits for token issuers to designate their events TGEs. Token Issuance, In the realm of blockchain technology and cryptocurrencies, token issuance is one of the most significant operations. In essence, token issuance involves the creation of new tokens, which are subsequently added to the overall supply of the cryptocurrency. Token issuance may take several forms based on the blockchain and cryptocurrency. Token burning is diametrically opposed to token issuance, since tokens are destroyed permanently. Token issuance may also refer to the tokenization process, in which a non-cryptocurrency asset is introduced to the blockchain through a particular crypto token. The criteria governing token issuance of a project assist investors in deciding whether to engage in the project. Token Lockup, Token lock-up (or vesting period) is a time after a token sale when token holders cannot sell their tokens. Locking tokens prevents investors from dumping their tokens. It also prevents team members from selling tokens
(DeFI) a Decentralized Exchange (DEX) using a time-weighted average market maker (TWAMM) tries to assist traders in executing big orders as rapidly and effectively as possible, at low gas rates, and without impacting the price. Tipset, The blockchain of Filecoin, a decentralized storage system, is frequently referred to as a tipset. Tipsets provide the basis of Filecoin’s consensus technique, which is election-based (unlike Bitcoin’s) and permits numerous miners to be the selected leaders in a round. Therefore, with Filecoin and similar storage systems, the capacity of the network may be enhanced by having numerous storage miners issue blocks in a single epoch. In addition, using tipsets as a blockchain’s underlying data structure may improve network security. Filecoin’s tipset system is quite similar to Ethereum’s, in that it promotes cooperation among users to increase chain throughput and decrease unnecessary wait times. TLT, → “Think Long Term” Token, Tokens are not to be confused with cryptocurrencies or altcoins. Tokens and altcoins are subclasses of cryptocurrencies. Tokens are a sort of cryptocurrency used to represent a particular asset or function on the blockchain. Tokens can then be divided into fungible (divisible) and non-fungible (not divisible) categories. The two most prevalent kinds of tokens are security and utility tokens. Security tokens function similarly to stocks. Utility tokens provide users access to a platform’s goods or services. A blockchain-based start-up may issue tokens to provide customers with future access to selected goods and services. Token Distribution, Token distribution is how blockchain network members get tokens. Tokens may be distributed by ICO, mining, or Airdrop. Depending on the blockchain technology, the distribution might occur in different ways. The purpose of token distribution is to generate capital for a project’s development. Typically, this entails offering tokens at a discount or bonus in order to encourage investors and early adopters to purchase them. Token Economy, Token economies relate to the economics of tokenized products and services. These economies can run without the need for middlemen/intermediaries/agents.
162
Tokenize enforced. When a new cryptocurrency token is released on an Ethereum-based blockchain network and conforms with the ERC-20 standard, its smart contract will be interoperable with decentralized exchanges intended to interact with ERC-20 tokens. Token Swap, Due to the restricted liquidity and quantity of trading pairs on each exchange, it is often impossible for consumers to trade directly between two crypto tokens. Certain exchange platforms enable users to swap tokens immediately, avoiding the annoyance and extra costs associated with two-step transactions. Metamask, ShapeShift, and AirSwap are some of the services that facilitate token swaps. Moreover, several cryptocurrencies, such as ETH, NEO, and QTUM, enable users to launch other crypto tokens on top of their blockchains. These second-layer tokens may ride on the security and popularity of the underlying platforms without having to spend time and money developing their own ecosystem from scratch. In such situations, a token swap is possible, in which the creators shift their token from one blockchain basis to another while preserving the balances of all addresses. Tokenization of Everything, Tokenization is perhaps the most important use case of blockchain and distributed ledger technology (DLT). Experts have studied the value proposition of tokenization for users, financial intermediaries, and regulators, including fractional ownership, the opportunity to acquire a fractional interest in formerly illiquid assets such as art artifacts or real estate. The regulatory framework for tokenizing debt and equity securities is presently being developed by regulators around the globe. The current non-fungible token (NFT) trend is one more instance of tokenization. Tokenization will establish new business models for almost all sectors, resulting in the tokenization of everything. Tokenize, Tokenization is a blockchain and cryptocurrency buzzword. Many individuals do not know what this commonly-used term implies. To tokenize means converting goods into digital assets called tokens. One may tokenize assets like real estate, art, company shares, credits, loans, etc. In the future, more and more businesses will tokenize their products and services for their customers. Experts estimate the value of tokenization could exceed $24 trillion by 2027.
once trading begins. By locking tokens, projects prevent a crash the price after listing. In addition, locked-up tokens are not included in the circulating supply since they are not included into investors’ and traders’ technical analyses. Token Migration, Token migration (sometimes called token swaps) happens during a blockchain changeover. Token migrations happen when new projects move their investors’ tokens from third-party platforms to their own chains. Migrations are not necessarily tied to new blockchain releases, they may also happen when projects change protocols. Technical or economic variables may potentially also be the reasons for a token migration across blockchains. Most projects provide ways to migrate tokens in seconds using a wallet address or a major exchange. Token Sale, A token sale is the first step before a cryptocurrency becomes public. The most popular token sale is an initial coin offering (ICO). An ICO enables early adopters and investors to buy a new cryptocurrency token before being listed on international exchanges. ICOs often demand investors to do certain steps, such as securing a part of the tokens they get. Some cryptocurrency ventures have also attempted to utilize their token sales as a marketing tactic by limiting early investor participation to a select group of individuals. Token sales are usually described in the whitepapers of new projects, since they have a significant impact on the tokens’ future value. The quantity of tokens earmarked for first token sales may also give insight into how much the project is prepared to sell privately to acquire sufficient funding to continue. Token Standard, Standardization in the context of tokens refers to having a set of rules that describe the data a token should include, the behaviors and activities it is capable of, and the operations a holder or community may do regarding that token. Token standards provide norms for the creation, issue, deployment, transfer, and destruction of tokens on their blockchain. These token standards are expected on blockchains that facilitate the construction of smart contracts, since such a blockchain allows the production of an arbitrary number of tokens on top of it. Standardizing the functionality of various tokens enables developers to construct applications on top of those standards, with the same underlying interfaces if the standard is
163
Tokenized Carbon Credits how a token is utilized inside a project ecosystem or how it will follow a monetary policy as the project expands. Tokenomics involves a broad variety of behaviors and conceptions, some hard-coded into a blockchain’s protocol and others more theoretical. Tokenomics’ three key tasks are fundraising, determining holder governance, and digital asset ownership. The major difference between a traditional economy and tokenomics is that the latter is created for decentralized cryptocurrencies, while conventional economics is based on historical events and human behavior. Tokenomics gives the authority back to the people, who determine how a cryptocurrency project should be governed. TokenSets (Set Protocol), Set Protocol has released a whole new smart contract platform called TokenSets. It paves the way for the use of tokenized assets in the form of baskets, both for creation and trade. Users may program a Set to trade, rebalance, and implement strategies automatically in an effort to achieve those objectives. The value of a Set is dependent on the values of the underlying assets it contains. Toll Bridge, A toll bridge is a smart contract-powered bridge where a toll price unlocks new features. DAO Maker is a significant blockchain project that provides a toll bridge in order to create a secure and decentralized launchpad for entrepreneurs. The toll bridge considers variables such as the vesting schedule and the number of days since the token generating event (TGE). To use the bridge, the MetaMask extension must be used to connect to a whitelisted wallet. The bridge also permits token purchasers to depart the vesting schedule prior to the expiration of time. TOR, → “Terms of Reference” Tor, → “The Onion Router” Total Exchange Volume, The total exchange volume is the total amount of cryptocurrencies traded on a certain cryptocurrency exchange. Virtually all cryptocurrency exchanges monitor and record daily transactions on the blockchain. The exchange volume may be located on the webpage of each exchange. Totals are updated once every day. The total exchange volume is a crucial indicator for cryptocurrency traders, since it reveals the total amount being exchanged on an exchange. The greater the number, the greater the liquidity of the exchange.
Tokenized Carbon Credits, Tokenized carbon credits reflect carbon that has been kept from entering the environment or extracted from it. One carbon credit is equivalent to one metric ton of carbon that has been verifiably saved or eliminated. They are produced by transferring carbon credits from voluntary carbon market registries to the blockchain. As a method for companies to pay for net greenhouse gas emissions, carbon credits are often included into sustainability initiatives. Carbon credits that have been tokenized may be deployed as a financial instrument inside cryptocurrency ecosystems, enabling people, organizations, and governments to invest in carbon. Tokenization also helps to increase carbon market liquidity. Tokenized Securities, Tokenized securities are securities whose ownership is represented by a token registered on blockchain’s distributed ledger technology (DLT) infrastructure. Equity, bonds, or investment funds may be tokenized. Tokenization converts asset ownership into a token. A tokenized security is a blockchain-based tradable asset that represents an investment. Tokenized securities may also represent liquid assets like real estate and art. A token representing ownership rights may be subdivided and exchanged, with a blockchain system storing all exchanges and ownership. Tokenized Stocks, Tokenized stocks are often established on top of the blockchain platforms. They facilitate the representation of assets. Tokenized stocks allow trading without having to worry about exorbitant brokerage fees, lengthy settlement delays, or any of the other issues that plague stock trading. These tokens are backed by genuine stocks, and there are several firms that pay dividends in Ether, Bitcoin, or other cryptocurrencies for owning them. Tokenized stocks are effectively fractional ownership of stocks in a cryptocurrency wallet, but without voting rights. Tokenless Ledger, A tokenless ledger is a kind of distributed ledger technology (DLT) that operates without a currency token. It employs private, immutable, and decentralized ledgers. Permissioned ledgers may be built on a public network, such as the Ethereum blockchain, or be tokenless. With these tokenless blockchains, network-maintaining miners often do not get a reward or payout. Tokenomics, Tokenomics is an umbrella word used by cryptocurrency enthusiasts to explain
164
TradingView ing bot automates the trader’s asset trading so the investor or trader must not sit in front of their display and choose which cryptocurrency to purchase and sell and when. A trading bot can collect data, analyze it, assess market risk, and purchase and sell cryptocurrencies. Trading Card Game (TCG) , A trading card game (TCG), often termed a collectable card game (CCG), was debuted in 1993 with Magic: The Gathering. A player may start a CCG with a pre-made beginner deck and then personalize it with cards from booster packs or through trading with other players, building up their own library. Players may also construct new decks from their library as they collect additional cards. Multiplayer games are also widespread. Each player starts with a shuffled deck and draws and plays cards to attack the other player and lower their health to zero before their opponent can do the same to them. Game accessories include dice, counters, card sleeves, and play mats. Expert CCG players compete for rewards. Trading Tournament, Trading tournaments are a popular technique to benefit from cryptocurrency holdings. Spot and derivative crypto exchanges arrange these events to test traders’ understanding of the cryptocurrency market and award them for their knowledge. Trading Volume, Trading volume is the number of completed deals in a certain securities or market. The daily volume is 1,000 if 1,000 shares are traded. If many traders took positions in the securities on the same day and closed them before the end of trading, the trading volume might be more than the total number of open positions at the start or conclusion of trading. Trading volume is a technical indicator since it shows a security or market’s total activity, and investors use it to validate a trend or trend reversal. TradingView, Many crypto and stock traders use the online web-based platform TradingView to analyze markets and discuss trading ideas, methods, and thoughts on global financial markets and learn technical analysis techniques. TradingView’s 550 million users have developed millions of trading techniques and charts. TradingView can help anybody, regardless of experience or technical understanding, to acquire market insights. It is a cloud-based tool for traders to connect and analyze charts.
Total Supply, Total supply represents all generated or mined coins. Not every coin listed in this measure is usable, and coins that have been burnt are excluded. This contrasts with the circulating supply, which estimates all mined and usable tokens or coins, omitting those that have not yet been generated. Instead of total supply, circulating supply is utilized to determine the market capitalization of a cryptocurrency. The maximum quantity of Bitcoins that may ever be generated is restricted at 21 million, while it is believed that around four million Bitcoins are missing or lost. Total Value Locked (TVL), Total value locked (TVL) is the amount of assets presently staked in a certain protocol. This statistic is not intended to indicate the number of existing loans, but rather the total amount of underlying supply being secured by a particular application by DeFi. To calculate the TVL ratio, divide the market capitalization by the TVL. Theoretically, the lower the TVL ratio is, the higher the value of an asset needs to be. TPS, → “Transactions Per Second” Trade Volume, The trade volume indicates the total quantity of cryptocurrencies acquired and traded in a day. It is a significant measure since it might suggest shifts in crypto market movements. For instance, if a cryptocurrency with a generally low trading volume has a surge, it may indicate a shift in the market, such as an increase in institutional interest. Similarly, a decrease in 24-hour volume for a cryptocurrency that generally has a strong volume may indicate that demand for the cryptocurrency is decreasing. Frequently, investors use a cryptocurrency’s volume to forecast whether its price will rise or fall in the future. Historically, Bitcoin is the cryptocurrency with the biggest trading volume. Trademark, A trademark basically serves to identify the goods and/or services of a company. Protectable are signs which are suitable to distinguish goods and/or services of a company from those of other companies. Trademark Infringement, Infringement of a registered trademark occurs when the exclusive rights of the trademark owner are interfered with without his consent. Trading Bot, Even a little delay in trades might incur considerable losses, hence many cryptocurrency traders use a trading bot. A trad-
165
Training Data move too rapidly for consumers to manually respond, users cannot act manually. Transaction triggers minimize the unrealistic and time-consuming requirement for ongoing monitoring. Transactions Per Second (TPS), TPS is the maximum number of transactions a computer system or blockchain network can handle per second. PayPal’s TPS is 193 while VISA’s is 1,700. Thus, this metric evaluates blockchains’ capacity to handle real-world transactions. TRC-10 (TRON), TRC-10 is a native token on the TRON network used for basic token creation without the TRON Virtual Machine (TVM). TRC-10 is API-accessible (application programming interface). TRC-10 costs 1,000 times less than TRC20, but API transactions and deposits need more bandwidth. TRC-20 Token, The TRC-20 token standard enables the creation of tokens on the TRON network. It specifies the functionalities that must be implemented for a token to be recognized as a standard TRC20 token. The TRC-20 standard is designed to be entirely compatible with the ERC-20 standard, which is used for Ethereum tokens. For the TRC-20 protocol to operate properly, the token’s contract must implement several functionalities. In TRC-20 token development, there are three optional and six compulsory components that must be established. Treasury Bills (T-Bills), Treasury bills (T-bills) are short-term, treasury-backed government debt obligations with maturity of max oneyear. When investors buy treasury bills, the US government issues I owe you letters. A higher interest rate applies to treasury bills with a longer maturity date. Instead of receiving interest payments on a monthly basis as a coupon bond would, the interest on a Treasury bill is included in the premium when the bill matures. Treasury Bond (T-Bond), With a treasury bond, investors lend the government money for a certain period. In exchange, they get semiannual interest payments until the bonds expire or until the government repurchases them at face value. When selling before to maturity, the seller may get less than the original investment made. Treasury bonds are sold over-the-counter (OTC) and may be purchased directly from the Federal Reserve Bank, brokerage firms registered with regulatory organizations such as the SEC or CFTC, mutual fund companies, or deal-
Training Data , To properly train a model, it must first be taught its intended purpose via training data. This usually involves updating the model’s weights or parameters so that it performs better on the training data. The problem is to use enough data such that the model can generalize adequately to new inputs without overwhelming it with information. Transaction (TX), In crypto transactions an initiator transfers funds from one public address to another. Before being recorded on the distributed ledger, transactions are encrypted by cryptography. No central bank or body regulates or oversees crypto transactions, unlike fiat money. Using crypto wallets, peers can transact directly without intermediaries/middlemen/ agents. The time to register a transaction on the blockchain varies by network and transaction charge. When traders are unsure whether a transaction was successful, they can use the coin’s block explorer to inspect the distributed ledger. Transaction Block, The blockchain network consists of a huge number of chronologically ordered transaction blocks. Each transaction that has taken place over time is stored inside a transaction block. In Bitcoin, a transaction block provides a record of every transaction that has occurred in the preceding 10 minutes. Additionally, each transaction block is aware of the preceding transaction blocks. If users are trying to trace the transaction history of a certain Bitcoin, this simplifies their search throughout the ledger. Transaction Fee, Transferring cryptocurrency incurs a transaction fee. Transaction fees are variable and based on blockchain activity. Paying a higher price may speed a process as miners, who are compensated for verifying transactions, give it priority. The majority of cryptocurrency exchanges fees are predetermined. Transaction Triggers, Transaction triggers may be configured to perform several transactions simultaneously when certain circumstances are satisfied. In numerous ways, this might give increased convenience and confidence for users. On decentralized platforms, for instance, users may set a stop loss order to activate when the price of the assets they have borrowed falls below a specific level, closing their holdings to reduce losses and control risk. As cryptocurrencies are volatile assets whose values might
166
Turing Completeness decrease paperwork, and avoid or reduce inheritance or estate taxes. A trust is a legal entity to hold property safely. Some cryptocurrency investors also opt to place their funds in a trust because they are further insulated from some of the hazards associated with conventional services. Trusts are often utilized for an extra degree of security and secrecy. Trustless, A trustless system has no known or trusted parties. Bitcoin’s foundation is trustlessness. It enables all transactional data to be validated and kept on blockchain, the cryptocurrency’s distributed ledger. Trustless systems allow P2P transactions without intermediaries/ middlemen/agents. It lets people trust abstract concepts instead of persons. The antithesis of centralized systems, such as banks, are trustless systems. The typical financial services need a third party to validate data and make decisions. Theft and hacking are regarded to be risks for centralized systems as well as data manipulation or alteration. A fundamental benefit of trustless systems over decentralized systems is that they may be completely administered by a censorship-free, impartial computer program. TSLM, → “Time series linear regression” Tumbler, Tumblers divide and blend transactions so that third parties cannot track the transactions as easily. Users put their money into the pool of the tumbler who will return the identical number of coins to each user, less any applicable fees. However, the monies received will be comprised of a variety of deposits made by different customers. This helps to establish a separation between the sending address and the receiving address. Tumblers often do not request user information, maintaining anonymity. Consequently, tumblers are often accused of facilitating illegal activities such since money laundering, as they facilitate the usage of anonymous apps on the Dark Web and make law enforcement’s operations more difficult. Turing Completeness, Turing complete machines are able to execute all programmed computations. A system of data-manipulation rules (such as a computer’s instruction set, a programming language, or a cellular automaton) is turing-complete if it can imitate any Turing machine (devised by English mathematician and computer scientist Alan Turing). Turing completeness is used to represent the effectiveness of such a collection of data-manipulation rules. Almost all programming languages are
ers approved by them. Unlike T-bills, T-bonds mature between 10 and 30 years. T-bonds provide stability during times of market uncertainty and are a valuable addition to any fixed-income investment portfolio. Trend, A trend is a long-term increase or decrease in the data, which can also change direction over time. Trend-Cycle Time Series Decomposition, Patterns in the value of the time series that disregard seasonality and random fluctuations and focus on long-term variations. This may be a nonlinear, long-term rise or drop that can change direction and has no defined frequency. Trigonometric Seasonality, Box-Cox Transformation, ARMA Errors, Trend, and Seasonal Components (TBATS), Extension of the ETS model through further components, such as Fourier terms, which allow for modelling more complex seasonality, or Box-Cox transformations, which stabilize the variance. Trojan, Trojans are a kind of malware that often masquerade as genuine software. Cybercriminals and hackers attempting to get access to a computer system may use trojans. Social engineering is often used to deceive users into loading and executing trojan files on their system. Once active, the trojan may allow cybercriminals to snoop, steal sensitive data, or get backdoor access to a system and change files. The name trojan stems from the ancient Greek legend of the Trojan horse, which led to the destruction of the city of Troy. The term originated in a 1974 by the US Air Force, which theorized that computers may be corrupted. Truffle, Truffle is a commonly used tool for developing blockchain applications utilizing EVM. Tim Coulter created it in 2015 because he could not locate dApp development tools. ConsenSys bought the truffle suite in 2020. Truffle was created to simplify dApps development and seeks to integrate them into a single node tool developers may use for smart contracts or frontend apps. The truffle suite is a complete app development ecosystem. It is popular among dApp developers since it supports the whole process. Trust, A trust is a fiduciary relationship in which a trustor provides a trustee the power to hold assets for a beneficiary. Trusts are created to preserve the trustor’s assets, distribute them according to the trustor’s desires, save time,
167
Turing Complete TypeScript supports imperative, functional, and generic programming. It is an object-oriented language since it uses class, inheritance, and abstraction following polymorphism and encapsulation. TypeScript is a portable programming language that may be used to compile JavaScript applications. Typosquatting, Typosquatting tricks people who input a URL wrongly into a search engine. Hackers or cyber fraudsters develop websites with similar URLs (like gogle.com vs. google. com) that seem like the login homepage. This way they may steal login details or other data. These sites may offer close-to-original counterfeits. Typosquatting schemes may also imitate prominent websites to misdirect visitors for advertising money. Unbanked, Unbanked refers to those who cannot access basic banking goods and services, most of them from disadvantaged groups rejected by established financial institutions for different reasons. Most unbanked people are impoverished and cannot afford or meet the criteria for a bank account. Despite government attempts to offer new financial products that may reach unbanked communities via microfinancing, many banks continue to exclude low-income consumers for lack of resources. The crypto ecosystem promotes financial inclusion via digital assets, smart contracts, and blockchain technology. Cryptocurrencies and DeFi provide cost-free new applications that mirror established financial goods and services and are open to anyone. Uncle Block (Ommer Block), The uncle block (ommer block) phenomenon is mainly significant in the context of cryptocurrency mining. It occurs owing to the fundamental design of a ledger, which permits the entry of just one block at a time. The discarded block is referred to as the uncle, ommer, or stale block. Even though the system rejects the uncle block, the blockchain guarantees that miners are treated fairly by not depriving uncle block miners their reward for their work. However, the uncle block reward obtained by mining is inferior to that of a finished block. Unconfirmed, A proposed transaction remains unconfirmed until the network verifies that no other transactions involving the same currency are pending. The transaction has not been added to the distributed ledger (blockchain) yet, hence it is in an unconfirmed status.
turing-complete nowadays. Turing equivalence states that two computers are comparable if one can imitate the other. Turing Complete, Turing complete means a system can perform what Alan Turing’s theoretical turing machine can. Most programming languages are turing complete, but blockchains do not need to be. Ethereum smart contract language Solidity is turing complete. When a programming language is not Turing complete, it cannot solve all computational problems. Bitcoin is not Turing complete, because it is a cryptocurrency, it only permits value transfers. Loops enable a Turing-complete language to repeat commands. TVL, → “Total Value Locked” TWAMM, → “Time-Weighted Automated Market Maker” TWAP, → “Time-weighted Average Price” Two-Factor Authentication (2FA), Two-factor authentication (2FA) needs two forms of information to access an online account, device, or computer system. This is a frequent feature also on many cryptocurrency exchanges, where users may have multiple ways to access their account or hot wallet. After entering the password, a user may be asked for a security code. The user might get this security code through SMS or email or other methods like authentications apps. In other words, the first element is the password itself, while the second factor is a text with a code, or it may even be biometrics. The biometric authentication may be accomplished by fingerprint, facial recognition, or retina scan. TX, → “Transaction” Type Checking, Type checking verifies that each action has received the correct amount and kinds of arguments. In some programming languages, type checking is done by the compiler, whilst in others, it may be postponed until runtime. Assigning a data type to each variable, parameter, and function return value in a computer program is the most prevalent method of type checking. TypeScript Programming Language, TypeScript is an enhanced version of JavaScript. Its programming is easy, fast, and straightforward. Since its creation, it has been a free, open-source programming language. It is licensed under Apache 2.0 and available online.
168
Unstoppable Domains Unrealized Profit & Loss, Unrealized profit and loss (P&L) arise when investors have a stake in an appreciating or depreciating investment. Unrealized P&L is the outcome of holding a certain investment position, but is not recognized until the position is sold. Paper profit or loss is another term for unrealized P&L. Traders often concentrate on their realized P&L since it indicates genuine (i. e., realized) earnings or losses that may be used for tax reasons and reinvested in future transactions. Unrealized P&L has no effect on taxes or account balances. Unregulated, Unregulated implies no government regulations or laws protect individuals participating in the activity. In the financial business, unregulated means no regulatory entity protects investors and customers against fraud, harassment, or other misconduct. Unregulated and decentralized cryptocurrencies are largely unregulated. Unspent Transaction Output (UTXO), Unspent transaction output (UTXO) refers to digital money allowed for spending by another account. UTXOs employ public key cryptography to identify and transfer ownership. UTXOs are formatted with the recipient’s public key, limiting their spendability to accounts that can prove ownership of the accompanying private key. The UTXO can only be spent if it has the public key’s digital signature attached the last time it was sent. Bitcoin is one kind of cryptocurrency that employs the UTXO mechanism. The Cardano blockchain implements an expanded version of the UTXO concept (EUTXO). Unstoppable Domains, Unstoppable Domains is a San Francisco-based startup that offers blockchain-based domain names, .crypto and .zil. Zilliqa blockchain is one of the systems’ blockchains. These domain names may be minted as Ethereum NFTs. Blockchain-based domain names are permanent and do not need annual registration costs to renew. A blockchain-based domain is censorship-resistant and gives users complete ownership and control. Blockchain-based domains may link to internet, IPFS, or bitcoin addresses. In the latter situation, the domain owner may connect their Bitcoin, Ether, or other crypto wallet address to the name and invite people to transfer crypto to the domain.
UNI Token, Uniswap is the biggest decentralized exchange using UNI. UNI holders have voting rights on platform evolution choices. Investors may participate to Uniswap liquidity pools, which give UNI token in return. The project’s maximum supply of one billion tokens will be in circulation by 2024. After this time, the UNI coin will have 2 % continual inflation to sustain network participation and discourages passive investors. Anyone can purchase or sell UNI tokens the on major exchanges. US House Committee on Financial Services, The US House Committee on Financial Services (HFSC) is a representatives committee regulating securities, commodities, banking, and insurance. The HFSC began as a select committee in 1865, and became a standing committee in 1891. Before 1968, it was called the Committee on Banking and Currency. The committee has 54 members, 30 of whom are Democrats and 24 of whom are Republicans. It regulates all sectors of the nation’s financial services and economy, including the banking, insurance, real estate, securities and futures markets, money laundering, terrorist funding, and other illegal acts impacting the financial system. Consumer protection and financial institutions, diversity and inclusion, housing, community development and insurance, investor protection, entrepreneurship and capital markets, national security, international development and monetary policy, and oversight and investigations are its six subcommittees. Every subcommittee is led by a distinct chairman and ranking member. Unlabeled Data, Unlabeled data consists of samples that have not been tagged with labels. This means the data essentially consists only of features. Unsupervised learning algorithms can be applied to identify properties and characteristics of the data. For example, it may be that the data tends to gather in one or more clusters. In this case, cluster analysis may be used. Unpermissioned Ledger, Unpermissioned ledgers may be accessed by anybody and users may send messages and participate in blockchain authentication, verification, and consensus protocol. Unpermissioned ledger users may produce data, publish smart contracts, and operate nodes. Unpermissioned ledgers are transparent since all data is available to anyone. Bitcoin and Ethereum are exemplary unpermissioned ledgers.
169
Unstructured Data requiring them to consider their roles and responsibilities for each use case. Use cases illustrate work flows step by step. They assist with identifying critical user needs, verify that design and execution are aligned with corporate objectives, and give a clear checklist of what the product must do. They aid teams in avoiding scope creep, one of the leading reasons of software project failure. User Interface, The user interface is the most important aspect of a successful digital applications like apps, wallets, or websites. The higher the quality of the user interface, the greater the likelihood that it will fulfill consumers’ needs and expectations. A user Interface is essentially the entire appearance and atmosphere of a digital service product. It consists of the design, layout, shape, color scheme, and functionality, among other elements. These aspects have a significant influence on the user experience of an application, which has a direct effect on the success rate of the application. UTC Time, Cryptocurrencies use Universal Time Coordinated (UTC) as their time basis. Since cryptocurrencies run 24/7, unlike other exchanges, using an uniform time simplifies things since cryptocurrency users are in various time zones. Utility NFTs/Utility-focused NFTs, A utility NFT is far more than just the digital asset it represents. Creators may enhance non-fungible tokens with real, often tangible value, as well as exclusive privileges that may be claimed by the token’s owner. This may be a discount, a concert ticket, or ownership rights to virtual or tangible objects, the options are unlimited. It is therefore not merely a matter of having the asset, but also of its potential for use. For example, gamified NFTs for fantasy sports, access NFTs for exclusive content or events, and engagement NFTs for fan communities. Utility Token, Utility tokens help individuals utilize something. Utility tokens are only usable in their intended environment. The SEC is ever vigilant for new utility tokens and security tokens. The regulator applies the Howey Test to evaluate whether a token is regarded as a security token or a utility token. Because they are not considered investment contracts, utility tokens are not subject to the same restrictions and requirements as security tokens. Filecoin is a good example for an utility token that helps
Unstructured Data, Unstructured data does not have a pre-defined structure and can therefore not be stored in a traditional relational database. As a result, extensive processing is often required to extract information from the data (e. g., feature engineering). Addressing specific data entries is also generally much more difficult. Examples of unstructured are tweets or annual reports as PDF. Unsupervised Learning, Unsupervised learning models aim to find structures in data, which does not need to be labelled. For example, the distance between datapoints is an example of how such structure can be found in data, and is essentially the idea behind clustering, which is the most common type of unsupervised learning methods. Note that the definition of the distance measure plays a crucial role here. US Office of Foreign Assets Control (OFAC), The US Office of Foreign Assets Control (OFAC) is an enforcement and financial intelligence unit. Its principal purpose is to produce and publish the Specially Designated Nationals and Blocked Persons List (SDN), a list of targeted nations’ citizens and organization. The OFAC imposes economic and commercial penalties on list members. Terrorists, drug dealers, and aggressors are among those targeted. Since 2020, OFAC has been putting pressure on crypto operations, reviewing the transactions of the main digital asset exchange Coinbase, fining businesses such as BitPay, and issuing warnings to organizations who aid ransomware victims in paying their attackers that they may be fined. US Securities and Exchange Commission (SEC), The US Securities and Exchange Commission (SEC) is an independent federal agency charged with safeguarding investors, ensuring the fair and orderly operation of the securities markets, and enabling capital creation. Use Case, The term use case describes how an actor (or system) utilizes an application to accomplish a goal in software development. Ivar Jacobson created the use case style in 1987 in order to record complicated needs in a basic, straightforward manner. Today, use cases are part of the unified approach for designing large-scale applications. Use cases help describe a user’s engagement with an application. It shows engineers how system users achieve their aims. It promotes communication between internal and external project stakeholders by
170
Video Games NFT of number of employees, annual revenue, scale of operations, etc.). Venture capitalists finance risky start-ups in hopes that some will succeed. These early-stage enterprises are funded by venture capital firms or funds in return for equity, or an ownership share. After a first seed funding round, typical venture capital investments are made in a series A round to finance expansion. Nevertheless, venture capitalists’ judgments are often influenced by biases, such as overconfidence and the illusion of control, like entrepreneurial decisions in general. Verification Code, A verification code is a security measure used to prevent internet bots from exploiting or spamming different online services. A captcha is a verification code that is produced at random and shown as an image above a text area. A Google Verification number is a brief numeric code provided directly to the user by phone or email to authenticate their identity. Verification codes are often used for both conventional banking and cryptocurrency wallets, such as two-factor authentication (2FA), which requires a high level of security. Verification Process, A verification process offers proof that a system or system element performs its intended tasks and fulfills all performance standards defined in the system, performance specifications, functional baselines, and allocated baselines. Verification addresses the question, was the system appropriately constructed? Verification is a crucial risk-reduction activity in the development and integration of a system, since it allows the program to detect errors in system parts prior to reaching the next level of integration, hence eliminating expensive troubleshooting and rework. Vesting Period, Vesting period, also known as the token lockup period, is a period during which tokens issued in the pre-sale ICO stage and provided to partners and project team members as a reward for their participation cannot be traded for a certain duration. A project usually announces a vesting plan to issue these tokens at intervals throughout a defined time. Video Games NFT, In Axie Infinity, players battle with their team of Axies against the team of an opponent player, in which each Axie is represented by a non-fungible token (NFT) that allows a player to hold it as a digital asset. Square Enix and Sega have also showed interest in using NFTs into forthcoming video
consumers utilize Filecoin’s decentralized data storage infrastructure. UTXO, → “Unspent Transaction Output” Validator, As a vital component of a blockchain consensus system, a validator is responsible for verifying blocks to collect rewards. Proof-of-Work (PoW) and Proof-of-Stake (PoS) are the two most prevalent validation mechanisms. Like a banker who must check a transaction before processing it, a validator verifies each incoming transaction. A transaction cannot be finalized and its record uploaded to the blockchain until its correctness and legal legitimacy have been verified by a validator. vAMMs, → “Virtual Automated Market Makers” Vanity Address, Vanity addresses are addresses of cryptocurrencies that are customized and generated based on a set of attributes provided by the addresses’ users. The goal is to make them more personal and immediately recognized without sacrificing the security they offer. Vaporware, In the computer business, vaporware (or vapourware) refers to a product, often computer hardware or software, that is advertised to the public but is either delayed, never created, or is formally discontinued. VAR, → “Vector Autoregression” Variance, The variance is an error which arises due to the model being too sensitive to fluctuations in the training data. High variance is therefore closely linked to overfititng. Increasing bias tends to reduce the variance. High variance can occur, for example, when asking ambiguous questions about income (e. g., not specifying pre/after tax). VASP, → “Virtual Asset Service Provider” VCA, → “Virtual Commodity Association” Vector Autoregression (VAR), A vector autoregression (VAR) is a generalization of the autoregressive model, which can forecast many different time series at once. Mutual relationships between the different time series are also considered. Venture Capital (VC), Venture Capital (VC) is a private equity investment given by venture capital firms or funds to startups, early-stage, and emerging companies that have been deemed to have high growth potential or which have demonstrated high growth (in terms
171
Virgin Bitcoin bypass government censorship. Most people use VPNs to preserve their privacy while using public Wi-Fi. Virtual Reality (VR), Virtual reality (VR) technology simulates a realistic artificial environment. Virtual reality use cases include entertainment, commerce, education, and training. Virtual reality requires a headset as of Oculus, Sony, or HTC, which offer an immersion experience in a digital environment. Special lenses provide the illusion of depth and dimension, while handheld controllers and external cameras capture user motions and reactions. VR’s split-screen display creates stereoscopic 3D with stereo sound. Together, they produce an immersive and convincing experience. Some VR headsets contain a built-in computer that can run applications. Most VR apps need a separate computer to support headsets. Virus, A computer virus infiltrates a user’s computer without their knowledge. Users may accidentally activate a virus by downloading it. The virus connects to other software and its execution triggers its functions. Some infections utilize stealth techniques to evade anti-virus software. Others can prevent detection by destroying the task in the task manager of antivirus software. Vitalik Buterin, Vitalik Buterin created Ethereum, the second-largest cryptocurrency, and co-founded Bitcoin Magazine. Vitalik Buterin was born in Russia in 1994 and immigrated to Canada as a kid. He dropped out of college after receiving a $100,000 Thiel Fellowship scholarship for innovators under 20. Buterin and his colleagues founded and grew Ethereum into the second-largest cryptocurrency by market capitalization in the world. The University of Basel awarded Buterin an honorary doctorate in 2018 for his work and contributions to cryptocurrencies. Vladimir Club, Vladimir Club members own.01 % of a cryptocurrency’s supply. A post in a forum by a user with the name of Vladimir proposed buying Bitcoin when it was $11. Having 0.01 % or 2,100 bitcoins out of the maximum supply of 21 million Bitcoins were worth $23,100 at the time, but would be $ 33 million today. Volatility, Any coin with huge price swings is volatile. Bitcoin for example is a volatile cryptocurrency. Cryptocurrency volatility may
games. The creators of Assassin’s Creed and Far Cry have – not very successfully yet – included NFTs into one of their flagship titles, Ghost Recon Breakpoint. Other ambitions include integrating an open-world multiplayer game with player-owned NFT characters and NFT land plots. However, it remains to be seen how effectively NFTs will perform in games and whether players would adhere to this trend. Virgin Bitcoin, A Bitcoin that has never been spent because it was acquired as a block reward by a miner. However, there is no real advantage to a Bitcoin being brand new or virgin. But since they lack a transactional history, virgin Bitcoins are regarded as flawless. Virtual Asset Service Provider (VASP), In the context of virtual assets, transfer refers to the act of moving a virtual asset from one virtual asset address or account to another on behalf of another individual or entity. Thus, virtual asset service providers (VASPs) is a general word that refers to organizations that provide cryptocurrency-related services. Virtual Automated Market Makers (vAMMs), Virtual Automated Market Makers (vAMMs) are modeled after the automated market maker idea (AMM). The AMM is a technology that offers an automated smart contract platform on which traders may engage in token swaps using liquidity from liquidity providers. The virtual Automated Market Maker (vAMM) is a new sort of Automated Market Maker (AMM) that extends its use beyond token swaps to derivatives such as perpetual contracts. Virtual Commodity Association (VCA), The Virtual Commodity Association (VCA) was established in 2018 with the intention of creating an industry-sponsored, self-regulatory organization for the virtual currency sector in the US. The VCA is governed by a board of directors and backed by its members. It does not provide regulatory initiatives for security tokens or platforms for security tokens. Bitstamp, bitFlyer USA, Bittrex, and Gemini Trust Company are among the founding members of the VCA. Virtual Private Network (VPN), A Virtual Private Network (VPN) encrypts internet traffic and sends it via a server of choice. This means local network snoopers cannot see what people do online. A VPN may also fake computer’s location to access region-locked information like streaming video services and
172
Weak Hands the GameStop short squeeze in early 2021. This subreddit has a reputation for using aggressive trading tactics. Some of the community’s most well-known slang terms include tendies for gains or profits and stonks for stocks. WannaCry Ransomware, WannaCry is ransomware that may swiftly attack and propagate across a variety of computer networks. WannaCry comprises of numerous components and infiltrates the target machine as a doppler. Once started, the ransomware tries to reach a hard-coded URL known as the kill switch. If this is unsuccessful, it encrypts data in specified formats, such as Microsoft Office or MP3 files. This encryption renders the data unavailable to computer users. The ransomware then shows a ransom note requesting payment of a specified amount of cash, often Bitcoin (BTC), to unlock and retrieve the encrypted data. Wasabi Wallet, Wasabi is a free, open-source wallet for Windows, Linux, and macOS that prioritizes anonymity. It is the first comprehensive implementation of the CoinJoin protocol, which enables anonymity for inputs and outputs of transactions by mixing them with those of other users. One of the primary justifications for the widespread acceptance of cryptocurrencies is that it enables totally private, but transparent transactions. Thus, anything that enables individuals to be safer and more independent, as well as freer and more independent, is embraced by the community. Wash Trade, A kind of market manipulation in which speculators generate false market activity by simultaneously selling and purchasing the same cryptocurrency. Watchdog Organization, A watchdog is an organization that watches, inspects, or monitors another organization or person (such as HNWIs, governments, political groups, and corporations). Some watchdog groups have been accused for getting too closely affiliated with their target businesses or industry. Watchlist, A watchlist in crypto is a website or app feature that allows users to construct their own lists of cryptocurrencies and tokens to track. WCT, → “WIPO Copyright Treaty” Weak Hands, The tendency of an investor to sell at the first hint of a price fall.
be 20 % or even higher. Thus, their volatility is much greater than other asset types’ volatility. Volume, The volume of a security, asset, or cryptocurrency may indicate its direction and movement, as well as its future price and demand. The 24-hour volume displays the total value of cryptocurrencies exchanged in the last 24 hours. Volume is a crucial signal for traders in crypto attempting to forecast the future price of cryptocurrencies. Volume is the total number of real deals, while liquidity is the quantity available for trading at any given price. A low volume indicates inefficient or low deals and opportunities. VPN, → “Virtual Private Network” VR, → “Virtual Reality” WAGMI, The term We Are Going to Make It (WAGMI) is often used by individuals striving to remain optimistic in the cryptocurrency or NFT markets. For example, when a sale occurs or a new collection is introduced. Wallet Address, A wallet address is a string of numbers and letters that is typically between 26 and 35 alphanumeric characters and is produced at random. It is ideally a one-time link produced by a wallet containing the private and public keys required to access a wallet address. To transfer or receive digital assets, wallet addresses are required. Wallet, Similarly, to how one would store cash and coins in a wallet, one can do the same with cryptocurrencies. Cryptocurrency wallets come in a variety of designs and sizes. Some wallets only support a single digital asset, such as Bitcoin, but others permit the storage of several currencies. Hardware wallets are actual devices on which the private keys of cryptocurrencies may be stored, while alternatives include web wallets, smartphone wallets, and even paper wallets. It is also essential to differentiate between hot wallets and cold wallets. Cold wallets are not linked to the internet, but hot wallets are. The data wallets keep only allows users to access their assets on the blockchain. In this sense, it is like a PIN one would input to access a bank account. Desktop wallets are often installed on PCs and Macs, but mobile wallets enable cryptocurrency transactions to be done on the go. Wallstreetbets (WSB), Wallstreetbets is a forum for stock and options trading discussions. The community had a significant influence in
173
Web 1.0 WebSocket, WebSockets are two-way, always-open communication channels. A client makes an HTTP request to the server to create a WebSocket connection. As tons of data are sent between the browser and server, it is sometimes simpler to keep the connection open. Utilizing WebSockets enables web applications to work more effectively by decreasing latency, which may result in enhanced user experiences. Wei, The smallest fraction of an Ether, with each Ether being 1,000,000,000,000,000,000 or 1018 Wei, which is one billion billions. Whale, Whales are people and organizations with enough cryptocurrencies to impact the market price. When liquidity or volatility are low, they have an outside influence. Many official and public organizations or funds have invested millions in cryptocurrencies, but many cryptocurrency whales also have unknown identities. This may lead to a cycle where cryptocurrency prices increase separated from cryptocurrency market fundamentals. When Lambo, When Lambo was a typical term among Bitcoin’s early adopters. Lamborghinis cost at least $200,000 and were a show of desire for cryptocurrency owners. As a show of their success, several affluent bitcoin investors purchased Lamborghinis. When Lambo gained popularity following the November 2018 bitcoin Consensus Investment Conference in New York. VinWiki co-founder Peter Saddington then bought a Lamborghini using 45 Bitcoin he bought for $115. As of today, 12 Bitcoins would have been sufficient. When Moon/Wen Moon, In crypto culture, the moon is important. If someone asks when moon they are generally an anxious trader trying to predict when a cryptocurrency’s value will soar. When Bitcoin’s value soared in 2017, optimism spread about the crypto markets’ future. Bitcoin aficionados sometimes exclaim, it is gone to the moon. Some bitcoin aficionados joke that Bitcoin to the moon may mean when its price is high enough to support a return trip to the moon. White Hat Computer Hacker, White hat computer hackers protect the system, whereas black hat hackers exploit vulnerabilities for personal gain. Most hackers identify faults that enable them to access the system or make it behave in ways developers never intended. White hat hackers are hired specialists who enhance
Web 1.0, Web 1.0 is a name often used to characterize the first iteration of the internet, which had its roots in the Defense Advanced Research Projects Agency (DARPA) and ultimately evolved into a worldwide network that symbolized the future of digital communication at the time. This early form of the Internet consisted of hyperlinked web pages. These web sites lacked aesthetic characteristics, controls, and forms that we may encounter while using the internet today. Throughout these years, the web experienced significant changes. Web 2.0, Web 2.0 is the current state of the Internet, which enables more user-generated content and stability for front-end users than Web 1.0. Participants share more information with one another and are more linked. A user may access information and give information back to the server to obtain more tailored information. This technology makes it easy and common to communicate with a small group or a large audience. Web 3.0, Web 3.0 is the future generation of internet services that integrate online-based apps using powerful machine learning and artificial intelligence to produce a more customized web. Web 3.0 is aimed to provide consumers with more personalized material at a quicker pace than ever before. The new web will use AI-powered search engines, virtual reality (VR), augmented reality (AR) and better data analytics. Internet titans such as Google and Facebook will no longer be able to access or control consumer data as monopolists. Web3 Foundation, The Web3 Foundation promotes decentralized web software protocols and innovative technologies. These protocols employ cryptography to protect Web3’s decentralization and stability. The Web3 Foundation believes in a decentralized internet where individuals, not businesses, control their data. Web 3.0 is layered. Layer 4 is the browser’s user-interface cradle. Layer 3 includes protocol-extensible developer APIs and languages. Layer 2 features state channels, plasma protocols, encrypted storage, intensive computing, distributed secret management, and oracles. Layer 1 protocols include Bitcoin (BTC) or Ethereum (ETH), parachains, data distribution protocols, and transitory data pub/sub messaging. Layer 0 includes low-trust meta protocols (e. g., Polkadot), P2P internet overlay protocols, and a platform natural language.
174
World Intellectual Property Organization (WIPO) mation. Regarding withdrawal addresses, a whitelist refers to a list of deemed-trustworthy cryptocurrency addresses. Whitepaper, Whitepapers describe a project’s objective and underlying technologies. They use data, infographics, and facts to persuade potential investors to invest in the project or acquire a cryptocurrency or token. A whitepaper is a crucial need for a crypto firm to be deemed genuine and professional. Litepapers are often shorter, less technical, and simpler to grasp. Winding Down, In decentralized finance (DeFi), winding down is the process of unwrapping tokens to their original form, which include numerous platforms and additional tokens. Thus, the distinction between winding down and basic token unwrapping is that the former utilizes numerous tokens along the route, whilst the latter often utilizes just two tokens. Winding Up, In decentralized finance (DeFi), winding up refers to the process of wrapping crypto tokens across many projects in order to get the highest payout. Wrapped tokens are ones that exist natively on another blockchain, such as Ethereum, and provide interoperability throughout the DeFi ecosystem. To get the most possible return on their tokens, holders of cryptocurrencies must follow a series of sometimes complicated actions. WIPO, → “World Intellectual Property Organization” WIPO Copyright Treaty (WCT), The WIPO Copyright Treaty (WCT) is a special agreement under the Berne Convention which deals with the protection of works and the rights of their authors in the digital environment. In addition to the rights recognized by the Berne Convention, they are granted certain economic rights. The Treaty also deals with two subject matters to be protected by copyright. First, computer programs, whatever the mode or form of their expression. Second, compilations of data or other material (databases). World Intellectual Property Organization (WIPO), The World Intellectual Property Organization (WIPO) is a specialized agency of the United Nations with 193 member states. The mission of WIPO is to develop a balanced and accessible international intellectual property (IP) system, which rewards creativity, stimulates innovation and contributes to economic
security to safeguard users’ privacy and personal information. The EC-Council offers a CEH ethical hacking certification. The training teaches how to analyze the security posture of a target system by looking for flaws and vulnerabilities using the same knowledge and tools as a malicious hacker, but in a legal and legitimate way. White Label, A white label product is a market-ready, ready-to-deploy solution with an easily-customizable front end. The UI/UX can be immediately tailored to the buyer’s brand specifications, and the software can then be rapidly introduced to the market. In the blockchain industry, white label goods often consist of generic software that has been conceived, produced, and tested by one business, and is ready to be deployed by another following customization. With this software, buyers, often businesses, may choose their chosen modifications and launch their own digital asset company. White label goods are often infrastructure toolkits, coin/token launchers, wallets, and exchanges. White Swan Event, A white swan occurrence may be predicted with great confidence. Typically, it contains three characteristics: It will occur, it is straightforward to measure its influence, and typically, human mistake is regarded to be the source of such occurrences. Recessions are usually white swan events as recession indicators include growing unemployment, inflation, and negative GDP growth. Recessions are one reason cryptocurrency use is rising. They are an excellent inflation hedge in countries with collapsing currencies. The crypto market’s rebound is predictable, like a pendulum that swings both ways after achieving equilibrium. Today, only a tiny proportion of the globe has engaged with crypto. Whitelist, In the field of cryptocurrencies, the term whitelist has many connotations. Users who join up for a cryptocurrency company’s mailing list are often prompted to put the company’s emails to their whitelists to prevent emails from being sent to the spam folder. Additionally, cryptocurrency firms might pay to be included to an internet service provider’s whitelist. Whitelists are particularly prevalent in the context of initial coin offerings (ICOs) and withdrawal addresses. Investors who want to participate in ICOs are often added to a whitelist after providing their personal infor-
175
WSB maturities. This situation is referred regarded be normal since it often reflects an economic climate in which individuals are ready to spend for the long term at greater risk for higher profits. When the yield curve is inverted, or when short-term interest rates are greater than longterm interest rates, the economic outlook is bad. A yield curve inversion may foreshadow a recession. Yield Farming, In its simplest form, yield farming involves attempting to obtain the most potential return from cryptocurrencies. This might entail generating income by lending digital assets to third parties or bringing the cryptocurrency in a liquidity pool. Yield farmers assess their profits using the annual percentage yield (APY). In the summer of 2020, this approach skyrocketed in popularity. Compound, Aave, Balancer, and Curve are some of the most prominent yield farming initiatives. Yield Sensitivity, Yield sensitivity is a measure of how much the price of an asset will vary in response to a change in the interest rate. The greater the yield sensitivity, the greater the likelihood that the asset’s price would fall when interest rates increase. The yield sensitivity may be positive or negative depending on whether a change in interest rates has a positive or negative effect on the price of a bond. It is commonly determined by estimating the percentage price change that would result from a one percentage point rise in a bond’s coupon rate. Year-to-Date (YTD), Year-to-Date (YTD) is a measure that assesses the performance of an asset thus far in a calendar year, from January 1 to the present. Ethereum began 2022 at $3,314 and reached $1,121 by December 31. This would have resulted in year-to-date gains for the world’s second largest cryptocurrency of -66 %. YTD is distinct from Year-to-Year (YTY), which compares two specific dates one year apart. When traders evaluate the performance of cryptocurrencies, both comparisons are equally useful. Zcash, → “T-address” Zero Confirmation Transaction/Unconfirmed Transaction, Transactions with zero confirmation are also known as unconfirmed transactions. As each transaction must be contained in a block for the network to recognize it as a genuine transfer of money. Concurrent transactions are grouped into blocks, which
development while safeguarding the public interest. WSB, → “Wallstreetbets” x86 Virtual Machine (Qtum), The Qtum team has developed an x86 virtual machine (x86 VM) for running smart contracts written in several programming languages. This provides dApp developers with far greater smart contract creation options. The x86 VM supports x86 registers and memory operations using an uniform 16-bit instruction encoding method. It also cuts gas fees by a large margin compared to the previous Ethereum VM. XBANQ, XBANQ is a premium NFT marketplace for photography, illustrations, collectibles, arts, and sports. The founders aim to disrupt the traditional and unfair creative stock market business model and provide a fair distribution channel for professional creators. The marketplace was founded by Nikolas Beutin, Melanie Beutin, Daniel Boran and Karolina Parot in 2022 and was developed by Accubits Technologies Inc. XRP Ledger (XRPL), The XRP Ledger is a public and decentralized blockchain. Connecting a computer to the peer-to-peer network that runs the ledger is possible for everyone. The ledger is maintained by the worldwide XRP Ledger community, which consists of software engineers, server operators, users, and enterprises. XRPL employs a consensus system in which validators reach an agreement every 3-5 seconds about the sequence and outcome of XRP transactions. Many developers use the ledger’s unique qualities, including its rapid and efficient consensus mechanism and censorship-resistant transaction processing. The XRP ledger resolves transactions in seconds at a cost of fractions of a cent per transaction, enabling a diverse range of use cases. XRPL, → “XRP Ledger” Yield Curve, In fixed income markets, the yield curve is the graphical depiction of the relationship between yields and maturities. It is a graphical representation of the expected rates of return on different maturities of fixed-income instruments, such as bonds and treasury bills, for investors. The current level of interest rates in the economy determines the form of the curve. A normal yield curve has an upward slope, indicating that longer-term maturities have higher interest rates than shorter-term
176
Zk-SNARKs a transaction, while concealing information from the public. Zero knowledge indicates that a party wishes to verify the truth of a statement without explaining why it is true. Before completing a transaction, a user may be required to demonstrate that certain requirements have been fulfilled while engaging with a blockchain. Zk-SNARKs only stores the transaction’s proof on the blockchain node, protecting the sender, recipient, and other information connected with the transaction.
together create a blockchain. After a transaction has been sent, it will enter one of three states: unconfirmed awaiting confirmation, confirmed, or rejected. If the transaction fee is insufficient for the miners who verify transactions or if there are many transactions waiting to be processed, confirmation may be delayed. A zero-confirmation transaction can be seen in some circumstances, such as when a seller delivers products or tokens before a cryptocurrency payment has been verified by the network. Zero Knowledge Proof, Zero-Knowledge Proof (ZKP), sometimes known as Zero-Knowledge Password Proof, is an authentication system in which passwords are never revealed, making them impossible to steal. This approach protects and safeguards private conversations and transactions, since the information may be validated using ZKPs without giving the data to anybody who does not share authentication with the network. In contrast to conventional messaging programs, software based on the ZKP protocol enables users to keep their personal information private and only disclose required information with the recipient. ZKPs have been the most popular unit of Z-Cash, a cryptocurrency that permits private transactions. The AdEx Network provides decentralized ZKP ad auctions, whereby a user may bid on the cost of showing an advertisement without revealing the amount. Zero-Knowledge Rollup, A zero-knowledge rollup is a sort of layer 2 scaling solution that uses zero knowledge cryptography (e. g., ZKsnarks or ZK-starks) to record and verify layer 2 transactions using a cryptographic proof system and a smart contract on the main blockchain. As they rely on smart contracts to check the validity of the transactions in layer 2, the system offers unique advantages, including a greater transaction throughput and shorter finality time than optimistic rollups. DeversiFi DEX and the Immutable X NFT exchange are examples of applications that use zero-knowledge rollups. A few rollup projects are in the process of releasing zero-knowledge rollups that will enable smart contracts on layer 2 without extra code development. Zk-SNARKs, Zero-Knowledge Succinct Non-Interactive Argument of Knowledge is the full term for Zk-SNARKs. They assist create confidence while engaging in a blockchain and significantly accelerate the verification of
177
Index Acquisition Premium 7 Acquisition 6, 7, 93, 153 Active Management 7 Activist Investor 7 Adam Back 7, 56 Adaptive State Sharding 7 Address 7, 41, 95, 132, 148, 158, 171, 173 Administrative Expenses 8 Adoption Curve 8 ADTV 8, 21 Advance/Decline Line (A/D Line; ADL) 8 ADX 8, 17, 22 AEA 8, 21 Aeternity Blockchain 8 Affiliate Marketing 9 Affiliate 8, 9 Agency Problem 9 Agency Theory 9 Agent 8, 9, 21, 48, 70, 93 Aggregate Demand 9 Aggressive Investment Strategy 9 AI 9, 18, 21, 42, 49, 71, 102, 115, 134, 174 Air Gap 10 Airdrop 10, 68, 162 Airnode 10 Alan Greenspan 10 Algorithm 10, 60, 65, 68, 69, 78, 108, 147 Algorithmic Market Operations (AMOs) 10 Algorithmic Stablecoin 11 Algorithmic Trading 11 Algo-Trading (Algorithmic Trading) 11 All Risks Coverage 11 Allocation Efficiency 11 Allocation 11 Allotment 11 All-Time High (ATH) 12 All-Time Low (ATL) 12 Alpha NFT 12
# 0x Protocol 1 1:1 NFT 1 10k Project 1 2FA 1, 20, 84, 96, 125, 136, 168, 171 401(k) Plan 1, 55 51 % Attack 1, 39, 149 80/20 Rule (Pareto Principle) 1, 2
A AAGR 2, 21 AAR 2, 21 Abenomics 2 Abnormal Return 2 Absolute Advantage 2 Absolute Return 2, 3 Abstract 3 Accepting Risk (Acceptance) 3 Account Balance 3 Account Number 3 Account 3, 48, 120 Accountability 4 Accounting Conservatism 4 Accounting Method 4 Accounting Token 4 Accredited Investors 4 Accretion (of a Discount) 5 Accrual Accounting 5 Accrue 5 Accrued Income 5 Accrued Interest 5 Accrued Liabilities 6 Accrued Revenue 6 Accumulation Phase 6 Accumulation/Distribution Indicator 6 Acid Test Ratio 6 Acquisition Cost 6
179
Index ARIMAX 17 Arm Virtual Machine (Qtum) 17 Aroon Indicator 17, 97 ARR 14, 18 Artificial General Intelligence 18 Artificial Intelligence (AI) 18, 71 Artificial Narrow Intelligence 18 Arweave 16, 17, 18 Ascending Channel 18 Ashdraked 18 ASIC 16, 18, 50, 73, 77, 109 ASIC-Resistant 18 Ask Price 19 Asset-Backed Tokens 19 Assets Under Management (AUM) 19 Astroturfing 19 Asynchronous 19 ATH 12, 19 ATL 12, 19 Atomic Swap 19 AtomicDEX 20, 62, 94, 113, 124, 148, 152 Attestation Ledger 20 Auction 20 Audit 20, 150 Augmented Reality (AR) 20 AUM 19, 20 Authentication 1, 20, 168 Author 21 Authority Masternode (VeChain) 21 Automated Market Makers (AMMs) 21 Autonomous Economic Agent (AEA) 21 Auto-Regressive-Integrated-Moving-Average (ARIMA) 21 Avatar NFT Project 21 Average Annual Growth Rate (AAGR) 21 Average Annual Return (AAR) 21 Average Daily Trading Volume (ADTV) 21 Average Directional Index (ADX) 22 Average Return 22
Alpha Version 12 Alphanumeric 12 Altcoin Trader 12 Altcoins 12 Alternative Investments 12 Amalgamation 12 Amazon S3 13 Amended Return 13 AML 4, 13, 15, 39, 53, 76, 77, 97, 111, 119 AMLD5 13 AMMs 13, 21, 103, 146, 150 AMOs 10, 11, 13, 60 Anarcho-Capitalism 13 Anchoring and Adjustment 13 aNFT (Autonomous NFT) 14 Angel Investor 14 Annual Percentage Rate (APR) 14 Annual Percentage Yield (APY) 14 Annual Report 14 Annualized Rate of Return (ARR) 14 Anonymous 15 Anti-Dump/Anti-Dumping Policy 15 Anti-Fragile 15 Anti-Malware 15 Anti-Money Laundering (AML) 15 Antitrust Law 15 Antivirus 16 Apeing/Ape In 16 API 1, 10, 16, 20, 33, 46, 58, 63, 72, 73, 117, 148, 166 Application Layer 16 Application Programming Interface 16 Application-Specific Integrated Circuit (ASIC) 16 APR 14, 16, 93 APT 16, 17 APY 14, 16, 93, 154, 176 AR Token (Arweave) 16 Arbitrage Pricing Theory (APT) 17 Arbitrage 16, 17, 34 Arbitrageur 17 ARIMA 17, 21, 110, 155
180
Index
B
Bid-Ask Spread 26 Big Tech 27 Binance Labs 27 Binance Launchpad 27 Binance Smart Chain 26, 27, 72, 79 Binance 7, 9, 15, 26, 27, 32, 41, 42, 53, 72, 74, 79, 96, 97, 107, 112, 158 Binary Code 27 Biometrics 28 BIP 28, 29, 73 BIS 24, 28 Bit 28, 106, 116, 134, 135 Bitcoin ATM (BTM) 28 Bitcoin DApps 28 Bitcoin Dominance (BTCD) 28 Bitcoin Improvement Proposal (BIP) 28 Bitcoin Misery Index (BMI) 29 Bitcoin NFTs 29 Bitcoin Pizza 29 Bitcoin 1, 7, 9, 10, 11, 12, 15, 18, 20, 23, 24, 25, 28, 29, 30, 31, 32, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 46, 47, 48, 49, 50, 52, 53, 54, 56, 58, 60, 61, 62, 63, 64, 67, 68, 69, 70, 71, 73, 76, 77, 78, 79, 80, 81, 82, 83, 86, 87, 88, 89, 90, 91, 93, 94, 96, 97, 98, 100, 103, 104, 105, 107, 108, 109, 112, 113, 114, 115, 116, 118, 120, 122, 124, 125, 126, 127, 128, 131, 132, 134, 135, 138, 139, 140, 142, 143, 145, 147, 148, 151, 154, 155, 156, 157, 158, 159, 160, 161, 162, 164, 165, 166, 167, 168, 169, 172, 173, 174 Bitcoiner 29 Bitcointalk 29 BitLicense 29, 64 BitPay 29, 30, 170 Bits 30 Bitstream 30 Black Hat Hacker 30 Black Swan Event 30 Blake-256 30 Block Explorer 31 Block Header 31 Block Height 31
BaaS 22, 24 Backflush Costing (Backflush Accounting) 22 Backlog 22 Backorder 22 Backstop 22 Backtesting 22 Back-to-Back Letters of Credit 22 BaFIn 23 Bag 23 Bagholder 23 Bait and Switch Scam 23 Bakers 23 Baking 23 Balanced Investment Strategy 23 Balloon Loan 23 Balloon Payment 23 Bandwidth 24 Bank for International Settlements (BIS) 24 Banking as a Service (BaaS) 24 Banking Secrecy Act (BSA) 24 Basket 24 Batch Auctions 24 Beacon Chain 25 Bear Market 25 Bear Trap 25 Bear/Bearish 25 Bearwhale 25 Beeple 25 Benchmark Index 25 Benchmark/Benchmarking 25 BEP-2 (Binance Chain Tokenization Standard) 26 BEP-20 20, 26 BEP-721 26 BEP-95 (Bruno Hard Fork Upgrade) 26 Beta (Release) 26 BFA 26, 35 BFT 26, 37, 131, 142 Bias 26 Bid Price 26
181
Index BTM 28, 35 BTP 33, 35 Bubble 35 Bug Bounty 35 Bug Exploit 35 BUIDL/Buidlers 35 Bull Market 36 Bull Run 36 Bull Trap 36 Bull/Bullish 36 Bundesanstalt für Finanzdienstleistung (BaFin) 36 Burn/Burned 36 BURST 36 Business Cycle 36 Buy The (F*******) Dip (BTD/BTFD) 36 Buy Wall 36 Byron Phase 37 Byzantine Fault Tolerance (BFT) 37, 131 Byzantine Generals’ Problem 37, 47 Byzantium Fork 37
Block Producer 31 Block Reward 31 Block Size 31 Block Time 31 Block Trade 31 Block 13, 30, 31, 37, 83, 123, 154, 161, 166, 168 Blockchain 1.0 32 Blockchain 2.0 32 Blockchain 3.0 32 Blockchain Explorer 32 Blockchain Mutual Credit 33 Blockchain Transmission Protocol (BTP) 33 Blockchain Trilemma 33 Blockchain 1, 7, 8, 11, 13, 20, 21, 25, 31, 32, 33, 34, 35, 42, 47, 48, 49, 59, 60, 64, 70, 74, 80, 81, 82, 86, 89, 94, 98, 115, 118, 119, 121, 130, 132, 137, 144, 150, 151, 153, 159, 162, 169 Blockchain-Enabled Smart Locks 33 Blue Chip (NFTs) 33 Bluesky Crypto Protocol 33 BMI 29, 34 Bollinger Band 34 Bonding Curve 34 Bots 34 Bounty 34, 35, 89, 90 Brave Browser 34 Breaking 34 Breakout 34 Brian Armstrong 34 Bridges 35 Browser Extension 35 Brute Force Attack (BFA) 35 BSA 24, 35, 77, 111, 112, 119 BTC 1, 11, 15, 18, 28, 29, 31, 32, 34, 35, 36, 37, 38, 39, 40, 41, 43, 44, 47, 48, 50, 51, 52, 53, 54, 56, 58, 63, 70, 76, 78, 79, 81, 82, 86, 87, 88, 96, 97, 98, 107, 109, 116, 124, 138, 142, 156, 158, 173, 174 BTCD 28, 35 BTD 35, 36 BTFD 35, 36
182
C C++ 37, 84, 107, 141, 143, 152 Call Options 37 Candidate Block 37 Candlesticks 37 Cantillon Effect 38 CAP 38 Capital Efficiencies 38 Capital Funds 38 Capital 17, 38, 105, 144, 171 Capitulation 38 Captcha 38 Casascius Coin 38 Cascading Liquidations 39 Cash 4, 24, 39, 41, 46, 86, 177 Casper (Ethereum) 39 CAT 39, 53 Cathie Wood 39 CBDC 39, 40
Index Code 27, 43, 84, 92, 134, 152, 171 Coin Mixer 44 Coin 38, 40, 41, 42, 44, 51, 56, 57, 58, 68, 89, 90, 96, 97, 107, 113, 158 Coinbase Transaction 44 Coinbase 24, 34, 35, 40, 44, 53, 74, 119, 170 Coincident Indicator 44 Cold Storage 44 Cold Wallet 44 Collateral Cap 45 Collateral Factor 45 Collateral Tokens 45 Collateral 44, 45, 58 Collateralization 45, 105, 108, 118, 123 Collateralized Debt Obligation (CDO) 45 Collateralized Debt Position (CDP) 45 Collateralized Mortgage Obligation (CMO) 45 Collateralized Stablecoin 46 Commercial Use 46, 117 Commingling 46 Commodity Futures Trading Commission (CFTC) 46 Community Designated Sellers (CDS) 46 COMP Token 46 Composable DeFi 46 Composable Token 47 Concentrated Liquidity 47 Confirmation 47, 176 Confirmations 47 Confirmed 47 Consensus Mechanism 47, 87 Consensus Process 48 Consensus 47, 48, 65, 87, 98, 121, 174 ConsenSys 48, 167 Consortium Blockchain 48 Consumer Price Index (CPI) 48 Contract Account 48 Contract for Difference (CFD) 48 Contract 41, 48, 51, 74, 81, 87, 88, 108, 135, 150 Conversational Agent 48 Coordinator 49
CC 39, 50 CD 39, 41 CDO 39, 45, 46 CDP 39, 45 CDS 39, 46 CeDeFi 39 Censorship 39 Censorship-resistance 39 Central Bank Digital Currency (CBDC) 40 Central Bank 24, 39, 40, 111 Central Ledger 40 Central Processing Unit (CPU) 40 Centralized Exchange (CEX) 40, 154 Centralized 39, 40, 41, 59, 60, 154 Centre (Consortium) 40 Certificate of Deposit (CD) 41 CEX 7, 40, 41, 59, 73, 74, 75, 85, 153, 154 CFD 41, 48 CFTC 41, 46, 166 Chain Linking 41 Chain Reorganization 41 Chain Split 41 Change Address 41 Change 41 Changpeng Zhao (CZ) 41 Chargeback 42 Chatbots 42 Chicago Mercantile Exchange (CME) 42 Chunk (NEAR) 42 Cipher 42 Ciphertext 42 Circle 40, 42 Circulating Supply 43 CJEU 43, 50 Client 43 Close 43, 121 Cloud Mining 43 Cloud 31, 43, 87, 156 CME 42, 43 CMO 43, 45, 46 Code is Law 43
183
Index Cryptocurrency Pairs 53 Cryptocurrency 19, 34, 35, 41, 43, 45, 48, 52, 53, 67, 69, 76, 80, 84, 97, 110, 149, 172, 173 Cryptographic Hash Function 54 Cryptography 54, 133 Cryptojacking 54 CryptoKitties 39, 53, 54, 55, 118 Cryptology 54 CryptoPunks 1, 33, 54, 55 Currency Crisis 55 Currency 17, 24, 39, 40, 55, 59, 64, 77, 118, 119, 121, 126, 169 Curve AMO 55 Custodial 55, 117 Custodian 55, 63 Custody 55 Cypherpunk 56 CZ 41, 56
Copyright Infringement 49, 90 Copyright 49, 64, 66, 90, 99, 118, 173, 175 Core Wallet 49 Corporate Digital Responsibility 49 Corporate Treasury 49 Correction 50 Co-Signer 50 Country of Protection Principle 50 Court of Justice of the European Union (CJEU) 50 CPI 48, 50 CPU Miner 50 CPU 40, 50, 88, 143 Craig Wright 50, 142 Creative Commons (CC) 50 Creator Economy 50 Credit Rating 50 Credit Risk 51 Cross Margin 51, 96 Cross-Border Trading 51 Cross-Chain Communication 51 Cross-Chain Contract Calls 51 Cross-Chain 51 Crowdfunding 51 Crowdloan 51 Crowdsales 52 Crypto Artist 52 Crypto Collectables 52 Crypto Debit Card 52 Crypto Deposit 52 Crypto Game 52 Crypto Invoicing 52 Crypto Law 53 Crypto Loan 53 Crypto Winter 53 Crypto 11, 17, 29, 33, 45, 48, 52, 53, 56, 62, 67, 93, 95, 104, 106, 112, 126, 134, 146, 154 Cryptoasset 53 Cryptocollectable Asset Token (CAT) 53 Cryptocollectibles 53 Cryptocurrency Money Laundering 53
184
D Daedalus Wallet 56 DAG 56, 60, 65 DAICO 56, 58, 59 DAO Summoning 56 DAO 55, 56, 58, 59, 68, 110, 131, 135, 156, 164 Dapps 56, 58 Dark Web 56, 167 Darknodes 56 Data Mining 56 Data Privacy 57 Data Scraping 57 Date of Launch 57 Day Traders/Day Trading 57 DdoS 57, 65, 66, 88 Dead Cat Bounce 57 Dead Coin 57 Death Cross 57 Decentralization Maximalism 58 Decentralization Ratio (DR) 58 Decentralization 10, 39, 58, 67
Index Dharma Protocol 63 Diamond hands 63 DID 59, 60, 63 Difficulty 63, 108 Digital (Technologies) 63 Digital Art 63 Digital Asset Custodian 63 Digital Asset Ecosystem 64 Digital Asset 63, 64 Digital Barter Economy 64 Digital Commodity 64 Digital Currency 39, 40, 64 Digital Dollar 64 Digital Identity 64 Digital Millennium Copyright Act (DCMA) 64 Digital Rights Management 65 Digital Signature Algorithm (DSA) 65, 69 Digital Signature 60, 65, 68, 69 Dildo 65 Dip 35, 36, 63, 65 Directed Acyclic Graph (DAG) 65 Discord 19, 61, 65, 133 Distributed Consensus 65 Distributed Denial of Service (DdoS) Attack 65 Distributed Ledger Technology (DLT) 66 Distributed Ledger 66 Distributed Network 66 Diversification 66 DLT 32, 33, 40, 60, 66, 70, 126, 159, 163, 164 DMCA Takedown 65, 66 DMCA 64, 65, 66 Do Your Own Research 66, 68 Documentation 66, 162 Dolphin 67 Dominance 28, 35, 67 Dorian Nakamoto 67, 86 DoS 30, 31, 61, 62, 67 DotSama 67 Double Spend Attack 67 Double Spending 67
Decentralized API (dAPI) 58 Decentralized Applications (Dapps) 58 Decentralized Autonomous Initial Coin Offerings (DAICO) 58 Decentralized Autonomous Organization (DAO) 59 Decentralized Currency 59 Decentralized Database 59 Decentralized Exchange(s) (DEXs) 59 Decentralized Finance (DeFi) 59 Decentralized Governance 59, 134 Decentralized Identifier (DID) 59, 60 Decentralized Marketplace 60 Decentralized Network 60 Decentralized Payment Network 60 Decentralized Social Media 60 Decentralized Stablecoin 60 Decentralized 8, 11, 15, 39, 40, 46, 56, 57, 58, 59, 60, 61, 63, 71, 74, 85, 99, 101, 131, 134, 155, 161, 162 Decryption 42, 54, 60 Deep Learning 60 Deep Web 61 DeFi Aggregator 61 DeFi Degens 61 DeFi 7, 16, 19, 20, 21, 26, 27, 28, 35, 45, 46, 47, 55, 58, 59, 61, 63, 78, 79, 82, 85, 88, 90, 95, 100, 115, 122, 123, 125, 129, 136, 137, 146, 148, 150, 161, 165, 168, 175 Deflation 61 Delegated Proof-of-Stake (dPoS) 61 Delist/Delisting 61 Denial-of-Service (DoS) Attack 61 Depth Chart 62 Derivative NFT 62 Derivative 62 Derivatives Market 62 Design Flaw Attack 62 Desktop Wallet 62 Deterministic Wallet 62, 88 Dex Aggregator 62 DEXs 19, 47, 59, 61, 63, 74, 90, 101, 104, 123, 124, 128, 141, 146, 150
185
Index Enterprise Ethereum Alliance (EEA) 71 Epoch 71 Equity 71, 164 Erasure Encoding 71 ERC Standards 71 ERC 20, 26, 47, 54, 55, 71, 72, 73, 84, 91, 99, 106, 128, 130, 135, 146, 163, 166 ERC-1155 71, 146 ERC-20 20, 26, 47, 55, 71, 72, 84, 91, 99, 106, 128, 135, 163, 166 ERC-223 72 ERC-4626 71, 72 ERC-721 26, 47, 54, 55, 71, 72, 130 ERC-777 71, 72 ERC-827 72 ERC-884 72 ERC-948 72 Escrow 73 E-Signature 73 ETF 39, 73, 74, 87 ETH 11, 17, 32, 33, 37, 40, 44, 47, 48, 52, 53, 56, 58, 63, 72, 73, 74, 79, 81, 82, 83, 85, 86, 89, 98, 99, 109, 124, 141, 158, 163, 174 Ethash 73 Ether 45, 46, 72, 73, 79, 82, 83, 85, 86, 97, 105, 106, 124, 158, 164, 169, 174 Ethereum Improvement Proposal (EIP) 73 Ethereum Request For Comment (ERC) 73 Ethereum Transaction 73 Ethereum Virtual Machine (EVM) 74, 134, 152, 157 Ethereum 1, 8, 12, 17, 20, 24, 25, 26, 27, 28, 29, 31, 32, 35, 37, 39, 40, 41, 44, 46, 47, 48, 52, 53, 54, 55, 58, 69, 71, 72, 73, 74, 76, 78, 79, 80, 82, 83, 84, 90, 91, 94, 96, 97, 98, 100, 101, 102, 103, 110, 113, 114, 115, 116, 117, 118, 120, 124, 126, 128, 130, 131, 134, 135, 142, 144, 148, 149, 150, 151, 152, 153, 155, 156, 157, 158, 160, 162, 163, 164, 166, 168, 169, 172, 174, 175, 176 Etherscan 74, 88, 131 ETS 74, 75, 155, 167 EUIPO 74 EULA 70, 74
dPoS 61, 67 dPoSec (Distributed Proof of Security) 67 dPoSec 67 DR 58, 67 Drawdown 67 Drift 67, 155 Drizzle 68 Drop 68 DSA 65, 68, 69 Dual-Token Economy/Model (Two-Token Economy) 68 Dump 15, 68, 124, 128, 133 Dumping 15, 68 Dust Transaction 68 Dusting Attack 68 DYCO 68 Dynamic Coin Offering 68 DYOR 66, 68
E Economic Utility 68 Edge Nodes 69 EEA 69, 71 Effective Proof-of-Stake 69 EFT 69 EIP 26, 69, 73 Electronic Fund Transfer 69 Electrum Wallet 69 ElGamal 69 ELI5 69 Elliott Waves 69 ELM 70, 75 EMA 70, 75, 97, 113 Email Spoofing 70 Embodied Agents/Embodied Conversational Agents 70 Emission 70 Encryption 54, 70, 76, 81, 121 End User License Agreement (EULA) 70 Ensemble Model 70 Enterprise Blockchain 70
186
Index Financial Crime Enforcement Network (FinCEN) 77 Financial Instruments 78 Financial Transactions and Reports Analysis Centre (FINTRAC) 78 FinCEN 77, 78, 111 FINTRAC 78 First In, First Out (FIFO) 78 First-Mover Advantage (FMA) 78 Fish 78 Flash Crash 78 Flash Loan Attack 79 Flash Loan 78, 79 Flippening 79 Flipper Token 79 Flipper 79 Flipping 79 Floor Price 79 Floor Sweep 79 FMA 78, 79 FOK 77, 79 FOMO 79, 96 Forecasting 79 Fork (Blockchain) 80, 86, 151 Fork (Software) 80 Fork 26, 37, 79, 80, 86, 120, 151 FPGA 30, 77, 80 Fractional Ownership 80 Fractional Stablecoins 80 Fraud Proof 80 Fren 80 Frictionless 80 Front Running 80 FT 80, 81, 162 FUD 53, 80 FUDster 80 Full Node 80 Fully Diluted Value (FDV) 80 Fully Homomorphic Encryption (FHE) 81 Fundamental Analysis (FA) 81 Funding Payments 81 Fungibility 81, 117
European Union Intellectual Property Office (EUIPO) 74 Event Triggers 74 EVM 42, 74, 82, 115, 134, 152, 157, 167 Exchange Traded Fund (ETF) 74 Exchange 27, 32, 40, 41, 42, 43, 46, 50, 59, 62, 63, 64, 73, 74, 89, 90, 91, 92, 93, 100, 105, 134, 139, 143, 144, 154, 162, 164, 170 Exclusive Rights 74, 117 Exit Scam 75 Exponential Moving Average (EMA) 75 Exponential Smoothing (ETS) 75 Extreme Learning Machine (ELM) 75
F FA 75, 81, 124, 146 Facebook Prophet 75 Fair Use 75 Falling Knife 75 Falling Wedge 75 Fan Token 75 Farm/Farming 75 FATF Travel Rule 76 FATF 13, 76, 77 Faucet 76 FBGA 76 FDV 66, 76, 80, 81 Federated Side Chain 76 Fee Tiers 76 Fees 14, 76 FHE 76, 81 Fiat On-Ramp 76 Fiat 55, 76, 111, 119, 124, 154 Fiat-Pegged Cryptocurrency 76 Fibonacci Retracement Level 77 Field Programmable Gate Array (FPGA) 30, 77 FIFO 77, 78, 88, 97 Fill Or Kill Order (FOK) 77 Finality 77 Financial Action Task Force (FATF) 76, 77
187
Index Fungible Tokens (FT) 81 Fungible 80, 81, 117, 118 Futures Contract 81 Futures 41, 46, 62, 81, 127, 153
GSN 83, 85 Gwei 76, 85
G
Hacking 30, 85, 86 Hal Finney 50, 67, 86 Halving 86 Hard Cap 86 Hard Fork (Blockchain) 86 Hard Fork Combinator 86 Hard Peg 86 Hardware Security Module 87 Hardware Wallet 87 Hash Function 54, 87 Hash Rate 87 Hash 20, 54, 87, 106, 145 Hashed Timelock Contract (HTLC) 87 Hashgraph Consensus Mechanism 87 Hashing Power 87 HBTC 87, 88 Hedge Contract 87 Hidden Cap 88 Hierarchical Deterministic Wallet (HD Wallet) 88 HIFO 88 Highest In, First Out (HIFO) 88 HODL 35, 88 Hodlers (HODL) 88 Honeyminer 88 Hostage Byte Attack 88 Hosted Wallet 88 Hot Storage 88 Hot Wallet 88 Howey Test 88, 170 HTLC 20, 87, 88 Huobi BTC (HBTC) 88 Hybrid PoW/PoS 88 Hyperinflation 89 Hyperledger (Hyperledger Foundation) 89
H
GAFA 27, 81 Gains 81 Game Channels 81 Game Theory 82 GameFi 82, 90 Ganache 82 Gas Fees 82 Gas Limit 82 Gas Price 82 Gas Station Networks (GSN) 83 Gas Wars 83 Gas 76, 82, 83, 85 Gavin Wood 83 Gems 83 Generative Art 83 Genesis Block 83 Geotagged NFT 83 Geth 27, 83, 84 GitHub 29, 84 GM 84 GMI 84 Goguen Phase 84 Gold-Backed Cryptocurrency 84 Golden Cross 84 Google Authenticator 84 Google Verification Code 84 Governance Token 85 Governance 59, 84, 85, 119, 120, 134, 135 GPU 40, 50, 73, 75, 85, 88 Graphical Processing Unit (GPU) 85 Graphics Card 85 Gray Swan Event 85 Greater Fool Theory 85 Green Candle 85 Group Mining 85
188
Index
I
Intermediary/Middleman/Agent 93 Internal Transaction 93 International Private Law 93 Internet Layer 93 Internet Memes 94 Internet of Things (IoT) 94, 150, 159 Internet of Trust (IoTr) 94 Internet of Value (IoV) 94 Internet Service Provider (ISP) 94 Interoperability 35, 94 InterPlanetary File System (IPFS) 94, 155 In-the-Money/Out-of-the-Money 95 Intrinsic Value 95 Invest 39, 95 Investment Vehicles (Crypto-tied) 95 IOHK 86, 91, 95, 102, 104, 123 IoT 60, 94, 95, 150, 159 IoTr 94, 95 IOU 4, 89, 95, 139 IoV 94, 95 IP Address 95 IP 19, 74, 92, 93, 95, 125, 152, 175 IPFS 33, 94, 95, 99, 155, 156, 169 IPO 11, 79, 90, 91, 95, 129, 153 Irregular Time Series Decomposition 95 Isolated Margin 95, 96 ISP 94, 96 ISPO 91, 96 ITO 91, 96
I Owe You (IOU) 89 IBO 89, 90 ICE 89, 93 ICO 12, 19, 42, 51, 57, 58, 59, 66, 71, 75, 79, 84, 88, 89, 90, 96, 129, 133, 139, 151, 162, 163, 171 IDE 89, 92 IDO 12, 89, 90, 129 IFO 89, 90 IGO 89, 90 Immutability 89, 128, 131 Immutable 89, 177 Impermanent Loss 89 Infinite Approval 89 Infinite Mint Attack 89 Inflation 55, 89, 90 Infringement 49, 90, 165 Initial Bounty Offering (IBO) 90 Initial Coin Offering (ICO) 51, 90 Initial Dex Offering (IDO) 90 Initial Exchange Offering 27, 90 Initial Farm Offering (IFO) 90 Initial Game Offering (IGO) 90 Initial NFT Offering (INO) 91 Initial Public Offering (IPO) 91 Initial Stake Pool Offering (ISPO) 91 Initial Token Offering (ITO) 91 INO 91 Input-Output Hong Kong (IOHK) 91, 104 Insider Trading 91 Instamine 91 Instant Settlement Network Layer 92 Institutional Investor 92 Insurance Fund 92 Integrated Development Environment (IDE) 92 Intellectual Property (IP) 92 Intelligent Automation 92 Intercontinental Exchange (ICE) 93 Interest Rates 93
J Jager 96 Java 27, 96, 107 JavaScript 35, 37, 54, 96, 117, 143, 168 JOMO 96 Joy of Missing Out 96 Jurisdiction 96
K Keylogger 96
189
Index Liquidity Bootstrapping Pool (LBP) 101 Liquidity Mining 101 Liquidity Pool 101 Liquidity Provider Tokens (LP Tokens) 101 Liquidity Provider 101 Liquidity 47, 98, 100, 101 Liveness 101, 102 Loan-to-Value (LTV) 102 Location Swap 102 Locktime 102, 161 Long 78, 102, 134, 160, 162 Longing/Long Position 102 Lovelace 86, 102 LTV 45, 102
Kimchi Premium 96 Klinger Oscillator 97 Know Your Customer (KYC) 53, 72, 97 KYC 4, 21, 39, 53, 58, 72, 97, 111, 126
L Labelled Data 97 Lachesis 97, 122 Lagging Indicator 97 LAMBO 97 Large Cap 97 Laser Eyes 97 Last In, First Out (LIFO) 97 Latency 97, 98, 115 Law of Accelerating Returns 98 Layer 0 98, 174 Layer 1 Blockchain 98 Layer 1 Protocols 98 Layer 2 Protocols 98 Layer 2 98, 174 LBP 98, 101 Leading Indicator 98 Ledger 20, 40, 66, 69, 76, 87, 99, 119, 120, 121, 126, 130, 138, 159, 164, 169, 176 Legal Tender Currencies 99 Leverage 99 Leveraged Tokens 99 LFG 99 Libp2p 99 License Agreement 70, 74, 100 License 70, 74, 99, 100, 111, 113 LIFO 88, 97, 100 Light Node 100 Lightning Network 28, 100, 155 Limit Buy/Limit Sell 100 Limit Order 100 LINK (Chainlink) 100 Liquid Market 100 Liquid Staking (Fantom) 100 Liquid Staking 100 Liquidation 101
190
M MA 21, 34, 102, 112 MaaS 102, 106, 108 MACD 58, 75, 77, 97, 102, 111, 113 Machine Learning (ML) 102 Mainchain 102 Mainnet Swap 103 Mainnet 102, 103, 122, 155 Maker Protocol (MakerDAO) 103 Malware/Malicious Software 103 Man-in-the-Middle Attack (MITM) 103 Margin Bear Position 103 Margin Bull Position 103 Margin Call 103 Margin Trading 103 Market Balances 103 Market Capitalization (Market Cap/ MCAP) 104 Market Maker/Market Taker 104 Market Order/Market Buy/Market Sell 104 Market Signal 104 Market 10, 11, 13, 21, 25, 36, 38, 53, 62, 83, 100, 103, 104, 105, 107, 111, 118, 122, 129, 143, 153, 161, 168, 171, 172 Marketcap 104 Markets in Crypto-Assets (MiCA) 104
Index Mining as a Service (MaaS) 108 Mining Contract 108 Mining Difficulty 108 Mining Farm 109 Mining Pool 109 Mining Reward 109 Mining Rig 109 Mining 30, 43, 56, 85, 101, 102, 108, 109, 114, 129, 145, 154, 155 Minnow 109 Minting Interval 109 Minting 109 MITM 103, 109 ML 60, 102, 109 MLM 109, 113 MLP 109, 113 Mnemonic Phrase 109 Mnemonics 109, 110 Mobile Wallet 110 Model 17, 68, 70, 110, 114 Moloch DAO 56, 110, 135 Monetary Authority of Singapore (MAS) 110 Monetary Policy 110 Monetization Rights 110 Money Flow Index (MFI) 111 Money Laundering 4, 13, 15, 53, 78, 111 Money Market 111 Money Services Business (MSB) 111 Money Transfer License (MTL) 111 Money Transmitter 111 Money 4, 13, 15, 47, 53, 55, 78, 95, 106, 111, 113 Moon 112, 174 Moore’s Law 98, 112 Motoko Programming Language (DFINITY) 112 MoU 105, 112 Move (Programming Language) 112 Move-to-Earn 112 Moving Average (MA) 112 Moving Average Convergence Divergence (MACD) 77, 111, 113
Marlowe 104 MARS 104, 114 MAS 104, 110 Masternodes 104 Max Supply 105 MCAP 104, 105 MCR 105, 108 Mean 105, 126, 143, 155 Medium of Exchange 105 Megahashes Per Second (MH/s) 105 Meme Economy 105 Memecoin 105 Memorandum of Understanding (MoU) 105 Mempool 31, 105 Mercenary Capital 105 Merkle Tree 106, 149, 161 Metadata 106, 119, 121 MetaMask 48, 82, 104, 106, 121, 164 Metatransaction 106 Metaverse 102, 106, 115 Metaverse-as-a-Service (MaaS) 106 Metaverses 106 Metcalfe’s Law 106 MEV 24, 106, 107, 108 MFI 106, 111 MH/s 105, 106 MiCA 104, 106 Micro Cap 106 MicroBitcoin (uBTC) 107 Micropayment 107 Microtransaction 107 Mid Cap 107 MilliBitcoin 107 Mimetic Theory 107 Mineable 107 Minecraft 107 Miner Extractable Value (MEV) 24, 107 Miners 17, 54, 105, 108, 138, 139, 155 Minimum Collateralization Ratio (MCR) 108 Minimum Viable Product (MVP) 108 Mining Algorithm 108
191
Index NIST 65, 115, 116 NLP 42, 49, 93, 115, 116, 146 No-Coiner 116 Node 69, 80, 100, 116, 117, 125, 143, 156 Node.js 117, 143 Nominators 117 Nonce 117 Non-Commercial Use 117 Non-Custodial Wallet 117 Non-Custodial 117 Non-Exclusive Rights 117 Non-Fungible Assets 117 Non-Fungible Token (NFT) 118 Noob 118 Notarization on Blockchain 118 Notice and Stay Down 118 Notice and Take Down 118 Nuclear NFTs 118 NVI 115, 118
MPC 113, 114 MSB 111, 113 Mt. Gox 86, 113 MTL 111, 113 Multi-Coin Wallet 113 Multilayer Perceptron (MLP) 113 Multi-Level Marketing 109, 113 Multi-Party Computation as-a-Service 113 Multi-Party Computation 113, 144, 150 Multipool Mining 114 Multisignature (Multi-Sig) 114 Multivariate Adaptive Regression Spline (MARS) 114 Multivariate Regression 114 Mutlicollinearity 114 Mutual Credit Line 114 MVP 108, 114 My Story (VeChain) 114
N
O
Naïve 115, 143 National Institute of Standards and Technology (NIST) 65, 115 Natural Language Processing (NLP) 115 Negative Volume Index (NVI) 115 Network Latency 115 Network 7, 14, 28, 31, 38, 60, 66, 77, 78, 92, 100, 111, 115, 128, 131, 135, 148, 155, 172, 173, 177 Network-Enhanced Virtual Machine (NEVM) 115 Neural Network 115 Newb 116, 118 NFA 116 NFT Marketing Campaign 116 NFT Use Case 116 NFT 1, 12, 14, 20, 21, 25, 26, 29, 33, 46, 51, 52, 54, 55, 62, 68, 79, 80, 82, 83, 84, 91, 95, 109, 110, 115, 116, 117, 118, 121, 122, 127, 130, 136, 140, 143, 151, 162, 163, 170, 171, 172, 173, 176, 177 Nick Szabo 56, 86, 116 Nifty Gateway 116
192
OBV 58, 75, 77, 111, 118, 120 OC 118, 123 OCC 118, 119 OCO 118, 121 Odysee 118, 119 OFAC 119, 170 Off-Chain Governance 119 Off-Chain Metadata 119 Off-Chain Transaction 119 Off-Chain 119 Office of the Comptroller of the Currency (OCC) 119 Off-Ledger Currency 119 Offline Storage 119 Offshore Account 120 OHM Fork 120 On-Balance Volume (OBV) 120 On-Chain Governance 120 On-Chain Metadata 121 On-Chain 120
Index Participation Node 125 Passive Income 125 Password Manager 125 Paul Le Roux 125 Payee 125 Peer-to-Peer (P2P) Lending 126 Peer-to-Peer (P2P) 126 Peg 86, 126, 152 Pegged Currency 126 Period Mean 126 Permanent Records 126 Permissioned Ledger 126 Permissionless 126, 127 Perpetual Contracts 127 Personal Data 127 PFP 21, 127 PGP 56, 65, 69, 86, 127, 129 Phishing 127, 153 Phone Phishing 127 Physical Bitcoins 127 PKI 127, 133 Platform 127 Player Payout 128 Play-to-Earn (P2E) games 128 Plutus (Cardano) 128 PND 128 PoA 17, 47, 128, 131 POAP 128, 130, 131 PoB 128, 131 PoD 128, 131 PoH 128, 131 PoIM 128, 131 Politeia (Decred) 128 Polygon 98, 112, 128, 135, 148 Ponzi Scheme 128 PoRep 128, 131 Portfolio Tracking 128 Portfolio 66, 128, 129 PoS 8, 25, 27, 31, 39, 61, 69, 88, 89, 98, 100, 116, 117, 123, 129, 131, 132, 134, 147, 150, 152, 154, 156, 160, 161, 171 Position Size 129
One Cancels the Other Order (OCO) 121 On-Ledger Currency 121 Online Storage 121 Ontorand Consensus Engine (Ontology) 121 Open Source 121 Open/Close 121 OpenSea 109, 122, 124 Opera Mainnet (Fantom) 122 Operating System (OS) 122 Optimistic Oracle 122 Optimistic Rollup 122 Option 122, 134 Options Market 122 Oracle Manipulation 122 Oracles 8, 122, 123 Order Book 123 Orphan 123 Orphaned Block 123 OS 87, 122, 123, 127 OTC 31, 123, 124, 153, 166 Ouroboros Praos 123 Overbought 123 Over-Collateralization (OC) 123 Overfitting 124, 157 Oversold 124 Over-the-Counter (OTC) Trading 124 Over-the-Counter (OTC) 124
P P&D 124, 133 P&L 51, 124, 130, 169 P2P Bridge 124 P2P DEX 124 P2P Trading 124 P2P 28, 33, 59, 67, 108, 124, 126, 133, 153, 167, 174 Pair 29, 124 Paper Hands 124 Paper Trading 124 Paper Wallet 125 Parachain 125
193
Index Public Domain 133 Public Key 133 Public Sale 133 Public-Key Cryptography 133 Public-Key Infrastructure (PKI) 133 Pump and Dump (P&D) Scheme 133 Pump 124, 128, 133 Pure Proof-of-Stake (PpoS) 133 Put Option 134 Pyramid Scheme 134
PoSt 129, 131 Post-Mine/Post-Mining 129 PoT 129, 132 PoV 129, 132 PoW 8, 25, 32, 39, 47, 58, 61, 69, 73, 77, 88, 89, 98, 104, 108, 116, 129, 131, 132, 138, 139, 142, 143, 156, 160, 161, 171 PpoS 129, 133 Prediction Market 129 Pre-IDO 129 Pre-Mine 129 Pre-Sale 129 Pretty Good Privacy (PGP) 56, 129 Price Impact 129 Privacy by Design 130 Privacy Policy 130 Private Blockchain 130 Private Key 130 Private Ledger 130 Procedural Programming 130 Profit and Loss (P&L) Statement 130 Programmability 130 Proof-of-Attendance Protocol (POAP) 130 Proof-of-Authority (PoA) 131 Proof-of-Burn (PoB) 131 Proof-of-Developer (PoD) 131 Proof-of-Donation 131 Proof-of-History (PoH) 131 Proof-of-Immutability (PoIM) 131 Proof-of-Replication (PoRep) 131 Proof-of-Spacetime (PoSt) 131 Proof-of-Stake (PoS) 31, 39, 61, 100, 132, 154, 171 Proof-of-Time (PoT) 132 Proof-of-Validation (PoV) 132 Proof-of-Work (PoW) 39, 61, 132, 171 Protocol Layer 132 Protocol 1, 33, 35, 63, 68, 79, 93, 94, 99, 103, 128, 130, 132, 134, 152, 164 Pseudonymous 132 Public Address 132 Public Blockchain 132
194
Q QR Code 134 Qtum 17, 134, 176 Quant Zone (FTX Exchange) 134 Quantity 134 Quantum Bit (Qubit) 134 Quantum Computing 134 Quantum Resistant 135 Quasar Smart Contract (OMG Foundation) 135 Qubit 134, 135 Quorum (Governance) 135
R Radio Frequency Identification (RFID) 135 Rage-Quit 135 Raiden Network 135 Random Forest 135 Rank 135 Ransomware 135, 141, 173 Rarible 135 Rarities 136 Rarity 136 Rebalancing 136 Rebase 136 Recovery Seed 136 Redundancy 136 ReFi 136 Regenerative Economy 136
Index
S
Regenerative Finance (ReFi) 136 Regens 137 Regional/Local/Community Currencies 137 Regulated 78, 137 Regulatory Compliance 137 Rehypothecation 137 Reinforcement Learning 137 REKT 137 Relative Strength Index (RSI) 137 Relay Chain 125, 137 Relay Nodes 138 Remint 138 Renewable Energy 138 Repair Miners 138 Replay Attack 138 Replicated Ledger 138 Resistance (Line/Level) 138 Retargeting 138, 139 Revenue Participation Tokens 139 Reverse ICO 139 Reverse Indicator 139 RFID 114, 135, 139 Ring CT (Confidential Transactions) 139 Ring Miners 139 Ring Signature 139 Ripple 119, 139, 144 Rivest-Shamir-Adleman (RSA) 140 Roadmap 140 Roger Ver 140 ROI 2, 140 Role-Playing Game (RPG) 140 Roth IRA 140 Royalties 140 RPA 93, 140, 141 RSA 65, 140, 141, 145 RSI 58, 75, 77, 97, 111, 123, 124, 137, 141, 158 Ruby (Programming Language) 141 Rug Pull/Rug Pulled 141 Rust 141, 152 Ryuk Ransomware 141
S&P 500 (Standard and Poor’s 500) 141 SAFT 141, 149 SALT 141 Satoshi (SATS) 30, 38, 96, 142 Satoshi Nakamoto 8, 28, 29, 32, 50, 63, 67, 86, 116, 125, 132, 142, 161 SATS 142 Scalability 142 Scaling Problem 142 Scaling Solution 142 Scam 7, 23, 75, 142, 149 Scamcoin 142 Scammer 143 Scholarship/Scholar 143 Script 143 Scripting Programming Language 143 Scrypt 108, 143 Seasonal Mean 143 Seasonal Naïve 143 Seasonal Time Series Decomposition 143 SEC 34, 46, 53, 58, 88, 91, 139, 142, 143, 144, 166, 170 Secondary Market 143 Second-Layer Solutions 143 Secret Key 144 Secure Element (SE) 144 Secure Multi-Party Computation (sMPC) 144 Securities and Exchange Commission (SEC) 139, 144, 170 Securities 50, 91, 139, 143, 144, 164, 170 Security Token Offering (STO) 144 Security Token 144, 155 Security 53, 67, 87, 94, 108, 144, 154, 155, 158, 162 Seed Hash 145 Seed Phrase/Secret Recovery Phrase 145 Seed 5, 136, 144, 145 Segregated Witness (SegWit/SEGWIT) 145 SEGWIT 145 Self-Assembly 145
195
Index Smart Home 150 Smart Token 150 Smart Treasury (Balancer) 150 sMPC 144, 150 Snapshot 150 Social Engineering 151 Social Media 60, 151 Social Token 151 Soft Cap 151 Soft Fork (Blockchain) 151 Soft Peg 152 Software Library 152 Software Stack 152 Software Wallet 152 Solana 41, 100, 112, 131, 152, 161 Solidity 37, 83, 112, 141, 152, 168 Source Code 152 SPAC 153 Spear Phishing 153 Special Purpose Acquisition Company (SPAC) 153 Speculative Investment 153 Spoon (Blockchain) 153 Spot Market 153 Spot Trading 153 Spot 153, 165 SPV 149, 154 Spyware 154 SSL/TLS 65, 154 Stablecoin 11, 46, 60, 154 Stagflation 154 Staking Pool 154 Staking 100, 125, 154 Stale Block 154 State Channel 155 Stationarity 155 STL-ARIMA/STL-ETS/STL-Drift/STL-Naive 155 STO 144, 155 Stochastic Oscillator 155 Stop-Loss Order 155 Storage (Decentralized) 155
Self-Execution 145 Selfish Mining 145 Self-Replication 145 Sell Wall 145 Semantic Web 146 Semi-fungible Token (SFT) 146 Sentiment 146 Ser 146 Service Robots 146 Settlement Layer 147 Settlement 92, 146, 147 SFP 147, 158 SFT 146, 147 SHA-256 54, 108, 143, 147 Shamir’s Secret Sharing 147 Shard Chain 147 Shard 147 Sharding 7, 98, 147 Shelley Phase 147 SHIB 148 Shiba Inu Token (SHIB) 148 Shielded Address 148 Shielded Transaction 148 Shilling 148 Shitcoin 148 SHO 148, 156 Short Squeeze 148 Short 111, 148 Side Channel Attack 148 Sidechain 148 Signal 104, 149 Silk Road 53, 61, 149 Simple Agreement for Future Token (SAFT) 149 Simplified Payment Verification (SPV) 149 SIM-Swap Scam 149 Skynet 149 Slippage 149 Slot (Cardano) 150 Smart Contract Audit 150 Smart Contract 135, 150
196
Index TH/s 159, 160 The Merge (Ethereum 2.0) 160 The Onion Router (Tor) 160 Theta 69, 122, 160 Think Long Term (TLT) 160 This Is Gentlemen 160 Throughput 160 Ticker Symbol 161 Ticker 161 Time Series Linear Regression (TSLM) 161 Timelock/Locktime 161 Timestamp 161 Time-Weighted Automated Market Maker (TWAMM) 161 Time-Weighted Average Price (TWAP) 161 Tipset 162 TLT 160, 162 Token Distribution 162 Token Economy 68, 162 Token Generation Event (TGE) 162 Token Issuance 162 Token Lockup 162 Token Migration 163 Token Sale 163 Token Standard 163 Token Swap 163 Token 4, 16, 18, 33, 39, 46, 47, 53, 58, 68, 75, 79, 80, 85, 91, 96, 116, 118, 141, 144, 146, 147, 148, 149, 150, 151, 155, 160, 162, 163, 166, 169, 170 Tokenization of Everything 163 Tokenize 163 Tokenized Carbon Credits 164 Tokenized Securities 164 Tokenized Stocks 164 Tokenless Ledger 164 Tokenomics 164 TokenSets (Set Protocol) 164 Toll Bridge 164 TOR 160, 164 Tor 56, 61, 86, 160, 164 Total Exchange Volume 164
Storage Mining/Storage Miners 155 Storage Node 156 Store of Value 156 Strong Holder Offering (SHO) 156 Stroop 156 Structured Data 156 Subgraph Manifest 156 Substrate 125, 156, 157 Supercomputer 157 Supervised Learning 157 Supply and Demand 157 Supply Chain Attack 157 Supply Chain 157 Swarm 157 Sweep the floor 157 Swing Failure Pattern (SFP) 158 Swing Trading 158 Sybil Attack 158 Symbol 158, 161 Synthetic Asset 158
T TA 123, 138, 146, 158, 159 T-Address (Zcash) 158 Taint 158 Tamper-Proof Ledger 159 Tangle 159 Taproot 159 Tardigrade (Storj) 159 TBATS 159, 167 T-Bills 159, 166 T-Bonds 159 TCG 159, 165 Technical Analysis/Trend Analysis (TA) 159 Technical Indicators 159 Terahashes Per Second (TH/s) 159 Terms and Conditions 160 Terms of Reference (TOR) 160 Test Data 160 Testnet 160 TGE 11, 160, 162, 164
197
Index
U
Total Supply 165 Total Value Locked (TVL) 165 TPS 31, 161, 165, 166 Trade Volume 165 Trademark Infringement 90, 165 Trademark 90, 165 Trading Bot 165 Trading Card Game (TCG) 165 Trading Tournament 165 Trading Volume 8, 21, 165 TradingView 165 Training Data 166 Transaction (TX) 166 Transaction Block 166 Transaction Fee 166 Transaction Triggers 166 Transactions Per Second (TPS) 166 TRC-10 (TRON) 166 TRC-20 Token 166 Treasury Bills (T-Bills) 166 Treasury Bond (T-Bond) 166 Trend 158, 159, 167 Trend-Cycle Time Series Decomposition 167 Trigonometric Seasonality, Box-Cox Transformation, ARMA Errors, Trend, and Seasonal Components (TBATS) 167 Trojan 167 Truffle 48, 68, 82, 167 Trust 67, 74, 94, 95, 121, 167, 172 Trustless 167 TSLM 161, 167 Tumbler 167 Turing Complete 168 Turing Completeness 167 TVL 165, 168 TWAMM 161, 162, 168 TWAP 161, 168 Two-Factor Authentication (2FA) 168 TX 31, 47, 166, 168 Type Checking 168 TypeScript Programming Language 168 Typosquatting 168
198
Unbanked 168 Uncle Block (Ommer Block) 168 Unconfirmed 47, 168, 176 UNI Token 169 Unlabeled Data 169 Unpermissioned Ledger 169 Unrealized Profit & Loss 169 Unregulated 12, 169 Unspent Transaction Output (UTXO) 169 Unstoppable Domains 169 Unstructured Data 170 Unsupervised Learning 170 US House Committee on Financial Services 169 US Office of Foreign Assets Control (OFAC) 170 US Securities and Exchange Commission (SEC) 139, 170 Use Case 116, 170 User Interface 170 UTC Time 170 Utility NFTs/Utility-focused NFTs 170 Utility Token 170 UTXO 41, 115, 169, 171
V Validator 171 vAMMs 171, 172 Vanity Address 171 Vaporware 171 VAR 171 Variance 171 VASP 171, 172 VCA 171, 172 Vector Autoregression (VAR) 171 Venture Capital (VC) 171 Verification Code 84, 171 Verification Process 171 Vesting Period 171 Video Games NFT 171
Index White Label 175 White Swan Event 175 Whitelist 72, 164, 175 Whitepaper 32, 34, 142, 152, 163, 175 Winding Down 175 Winding Up 175 WIPO Copyright Treaty (WCT) 175 WIPO 173, 175 World Intellectual Property Organization (WIPO) 175 WSB 173, 176
Virgin Bitcoin 172 Virtual Asset Service Provider (VASP) 76, 171, 172 Virtual Automated Market Makers (vAMMs) 172 Virtual Commodity Association (VCA) 172 Virtual Private Network (VPN) 172 Virtual Reality (VR) 20, 172, 174 Virus 15, 16, 103, 145, 172 Vitalik Buterin 33, 35, 58, 83, 172 Vladimir Club 172 Volatility 172 Volume 8, 21, 34, 115, 118, 120, 164, 165, 173 VPN 172, 173 VR 20, 172, 173, 174
X x86 Virtual Machine (Qtum) 17, 134, 176 XBANQ VII, VIII, IX, 109, 124, 176 XRP Ledger (XRPL) 176 XRPL 176
W
Y
WAGMI 173 Wallet Address 57, 74, 130, 134, 163, 169, 173 Wallet 30, 44, 49, 56, 62, 69, 87, 88, 109, 110, 113, 117, 121, 125, 152, 173 Wallstreetbets (WSB) 173 WannaCry Ransomware 141, 173 Wasabi Wallet 173 Wash Trade 173 Watchdog Organization 9, 173 Watchlist 173 WCT 173, 175 Weak Hands 36, 173 Web 1.0 174 Web 2.0 112, 174 Web 3.0 10, 112, 174 Web3 Foundation 83, 174 WebSocket 174 Wei 86, 174 Whale 15, 36, 67, 69, 75, 78, 91, 127, 133, 145, 158, 174 When Lambo 97, 174 When Moon/Wen Moon 174 White Hat Computer Hacker 30, 174
Year-to-Date (YTD) 176 Yield Curve 176 Yield Farming 39, 75, 79, 82, 125, 176 Yield Sensitivity 176
Z Zcash 15, 90, 148, 158, 176 Zero Confirmation Transaction/Unconfirmed Transaction 176 Zero Knowledge Proof 177 Zero-Knowledge Rollup 177 Zk-SNARKs 37, 177
199