Blockchain & Cryptocurrency Terms
Introduction
This glossary provides clear definitions of blockchain, cryptocurrency, and distributed ledger technology terms. Understanding these concepts is increasingly important as blockchain technology influences financial markets, digital assets, and trading infrastructure.
This glossary is designed for traders and investors seeking to understand blockchain technology and cryptocurrency markets. Terms are explained in accessible language while maintaining technical accuracy.
Core Blockchain Concepts
Blockchain
A distributed digital ledger that records transactions across multiple computers in a way that makes records virtually impossible to alter retroactively. Data is organized into blocks that are cryptographically linked together in a chronological chain. Each block contains a cryptographic hash of the previous block, timestamp, and transaction data.
Key Properties:
- Decentralized (no single point of control)
- Transparent (transactions visible to participants)
- Immutable (extremely difficult to alter historical records)
- Secure (cryptographically protected)
Public Blockchain (Permissionless)
A blockchain network that anyone can join, read, and write to without requiring permission from a central authority. Examples include Bitcoin and Ethereum. Public blockchains are:
- Open to all participants globally
- Maintained by distributed network of nodes
- Secured through consensus mechanisms
- Transparent (all transactions publicly visible)
- Censorship-resistant
Private Blockchain (Permissioned)
A blockchain network restricted to specific participants who have been granted permission to access and transact. Typically used by enterprises and consortiums where:
- Access is controlled by administrators
- Participants are known and vetted
- Transactions may be private or selectively visible
- Often faster and more scalable than public blockchains
- Trade-offs include reduced decentralization and censorship resistance
Distributed Ledger Technology (DLT)
The broader category of technology encompassing blockchain and other distributed database systems. DLT refers to any system where records are stored across multiple locations simultaneously, with no central data store or administrator. Blockchain is the most well-known type of DLT, but not all DLTs use blockchain architecture.
Block
A data structure containing a collection of transactions bundled together and added to the blockchain. Each block typically contains:
- Transaction data
- Timestamp
- Cryptographic hash of previous block
- Nonce (for proof-of-work systems)
- Merkle tree root of transactions
Analogous to a page in a ledger book, once written, it becomes part of the permanent record.
Genesis Block
The very first block in a blockchain, serving as the foundation for all subsequent blocks. The genesis block is unique because it has no previous block to reference. It's hardcoded into the blockchain protocol and often contains special data or messages from the creator.
Node
A computer that participates in a blockchain network by maintaining a copy of the ledger and validating transactions according to the network's rules. Nodes can be:
- Full Nodes: Store complete blockchain history and validate all rules
- Light Nodes: Store only essential data, rely on full nodes for validation
- Mining Nodes: Participate in creating new blocks (in proof-of-work systems)
- Validator Nodes: Participate in consensus (in proof-of-stake systems)
Hash Function
A mathematical function that takes input data of any size and produces a fixed-size output (hash) that uniquely represents the input. Cryptographic hash functions used in blockchain have special properties:
- Deterministic (same input always produces same output)
- Quick to compute
- Infeasible to reverse (one-way function)
- Small input changes produce dramatically different outputs
- Collision-resistant (extremely difficult to find two inputs with same output)
Common hash functions: SHA-256 (used by Bitcoin), Keccak-256 (used by Ethereum)
Merkle Tree (Hash Tree)
A tree data structure where every leaf node represents the hash of a data block, and every non-leaf node represents the cryptographic hash of its children. This structure allows:
- Efficient verification of data integrity
- Proof that specific transactions are included in a block
- Scalable verification without downloading entire blockchain
- Foundation for "light clients" that can verify transactions with minimal data
Immutability
The property of blockchain records being extremely difficult to alter once written. While not absolutely impossible to change (see 51% Attack), the cryptographic linking of blocks and distributed consensus makes retroactive alterations impractical and immediately detectable. This creates:
- Permanent audit trail
- Historical data integrity
- Trust through verifiability rather than authority
- Foundation for trustless systems
Consensus Mechanisms
Consensus mechanisms are protocols that ensure all nodes in a distributed network agree on the current state of the blockchain, even when some nodes may be unreliable or malicious.
Consensus Mechanism (Protocol)
The process used to achieve agreement among distributed network participants on which transactions are valid and should be added to the blockchain. Essential for maintaining blockchain integrity without central authority. Different consensus mechanisms make different trade-offs between:
- Security
- Decentralization
- Energy efficiency
- Transaction speed
- Scalability
Byzantine Fault Tolerance (BFT)
The ability of a distributed system to continue functioning correctly even when some participants (nodes) fail, act maliciously, or provide contradictory information. Named after the Byzantine Generals Problem, this property ensures:
- Network resilience against failures
- Protection against malicious actors
- Consensus despite imperfect information
- Foundation for trustless systems
Most blockchain consensus mechanisms aim to achieve Byzantine Fault Tolerance.
Proof of Work (PoW)
A consensus mechanism where miners compete to solve computationally intensive mathematical puzzles to create new blocks. The first miner to solve the puzzle gets to add the next block and receives a reward.
Process:
- Miners collect pending transactions
- Repeatedly hash block data with different nonces
- Search for hash meeting difficulty requirements
- First successful miner broadcasts solution
- Other nodes verify and accept valid block
Characteristics:
- High energy consumption
- Very secure when network hash power is high
- Proven track record (Bitcoin since 2009)
- Barrier to entry based on hardware and electricity costs
- Used by: Bitcoin, Ethereum (before merge), Litecoin
Trade-offs:
- ✓ Proven security model
- ✓ True permissionless participation
- ✗ High energy consumption
- ✗ Relatively slow transaction processing
- ✗ Hardware arms race
Proof of Stake (PoS)
A consensus mechanism where validators are chosen to create blocks based on the amount of cryptocurrency they "stake" (lock up) as collateral. Validators risk losing their stake if they act maliciously or validate fraudulent transactions.
Process:
- Validators stake cryptocurrency as collateral
- Algorithm selects validators to propose blocks (often weighted by stake size)
- Other validators attest to validity
- Validators earn rewards for honest participation
- Malicious behavior results in "slashing" (losing part or all of stake)
Characteristics:
- Energy efficient (no intensive computation)
- Barrier to entry based on capital stake
- Validators have "skin in the game"
- Used by: Ethereum (post-merge), Cardano, Polkadot
Trade-offs:
- ✓ Energy efficient
- ✓ Faster block times possible
- ✓ Lower hardware requirements
- ✗ "Rich get richer" potential
- ✗ Less proven long-term than PoW
- ✗ Complexity in implementation
Proof of Authority (PoA)
A consensus mechanism where validators stake their reputation and identity rather than cryptocurrency. Validators are pre-approved, vetted entities whose identities are publicly known.
Characteristics:
- Requires thorough KYC (Know Your Customer) verification
- Validators' real-world identities are at stake
- High throughput and efficiency
- More centralized than PoW or PoS
- Suitable for enterprise and consortium blockchains
- Malicious behavior damages validator's reputation
Trade-offs:
- ✓ Very efficient and fast
- ✓ Suitable for private/consortium blockchains
- ✗ More centralized
- ✗ Requires trust in validator identities
- ✗ Limited by number of validators
Proof of Capacity (PoC) / Proof of Space
A consensus mechanism that uses available hard drive storage space rather than computational power or staked cryptocurrency. Miners pre-generate and store solutions, then search their storage when mining.
Characteristics:
- Energy efficient compared to PoW
- Uses existing storage capacity
- Lower barrier to entry than specialized mining hardware
- Examples: Chia, Burst
Proof of Burn (PoB)
A consensus mechanism where miners deliberately destroy (burn) cryptocurrency to earn the right to mine blocks. Burning is accomplished by sending coins to a provably unspendable address.
Concept:
- Miners "burn" coins to acquire virtual mining power
- More coins burned = more mining power
- Represents commitment without energy waste
- Burning can be of native currency or alternative chain currency
Use cases:
- Bootstrap new blockchains
- Transition from one blockchain to another
- Reduce circulating supply
Cryptocurrency Fundamentals
Cryptocurrency
Digital or virtual currency that uses cryptography for security and operates on decentralized networks, typically blockchains. Key characteristics:
- No central issuing authority (generally)
- Cryptographically secured transactions
- Transparent transaction history
- Peer-to-peer transfer capability
- Programmable (in smart contract platforms)
Unlike traditional currencies, cryptocurrencies are not issued by governments and typically operate independently of central banks.
Bitcoin
The first and most widely recognized cryptocurrency, created in 2009 by the pseudonymous Satoshi Nakamoto. Bitcoin introduced:
- First successful implementation of blockchain
- Proof of Work consensus mechanism
- Limited supply (21 million maximum)
- Peer-to-peer digital cash system
- Foundation for entire cryptocurrency industry
Bitcoin remains the largest cryptocurrency by market capitalization and is often called "digital gold" due to its store-of-value properties.
Altcoin
Any cryptocurrency other than Bitcoin. The term encompasses thousands of projects with varying purposes:
- Platform cryptocurrencies (Ethereum, Cardano)
- Payment-focused coins (Litecoin, Bitcoin Cash)
- Privacy coins (Monero, Zcash)
- Stablecoins (USDT, USDC)
- Utility tokens (Chainlink, Uniswap)
- Meme coins (Dogecoin, Shiba Inu)
Token
A digital asset created on an existing blockchain platform (most commonly Ethereum) through smart contracts. Tokens represent:
- Utility Tokens: Access to services or products
- Security Tokens: Ownership or investment rights
- Governance Tokens: Voting rights in protocols
- Non-Fungible Tokens (NFTs): Unique digital assets
Unlike coins which have their own blockchain, tokens leverage existing blockchain infrastructure.
Fungible
The property of an asset being interchangeable with other identical assets. Each unit is equivalent and can be exchanged one-for-one. Examples:
- Currencies (one dollar = one dollar)
- Most cryptocurrencies (one Bitcoin = one Bitcoin)
- Commodities (one barrel of oil = one barrel of oil)
Fungibility is essential for currencies and most financial instruments.
Non-Fungible (NFT)
Assets that are unique and not directly interchangeable with others. Each non-fungible token represents a distinct item with its own properties and value. Examples:
- Artwork and collectibles
- Real estate
- Domain names
- Game items
- Intellectual property rights
ERC-721 Standard: The most common standard for NFTs on Ethereum, defining how unique tokens are created and managed.
Stablecoin
A cryptocurrency designed to maintain a stable value by being pegged to a reserve asset, typically:
- Fiat currency (USD, EUR)
- Commodities (gold)
- Other cryptocurrencies
- Algorithmic mechanisms
Types:
- Fiat-Collateralized: Backed 1:1 by fiat reserves (USDT, USDC)
- Crypto-Collateralized: Backed by cryptocurrency reserves (DAI)
- Algorithmic: Maintain peg through supply mechanisms (historically risky)
Purpose: Provide stability in volatile crypto markets, facilitate trading, and enable DeFi applications.
Fiat
Government-issued legal tender not backed by physical commodities but by the government that issued it. Examples: US Dollar (USD), Euro (EUR), Japanese Yen (JPY). The term "fiat" comes from Latin meaning "let it be done," reflecting that fiat currency has value because governments declare it does.
Addresses, Keys & Wallets
Address
A unique identifier, similar to an email address or bank account number, that represents a destination on a blockchain where cryptocurrency can be sent. Addresses are:
- Derived from public keys through cryptographic operations
- Publicly shareable (safe to give to others)
- Used to receive transactions
- Often represented as alphanumeric strings or QR codes
Different blockchains use different address formats.
Public Key / Private Key
A cryptographic key pair fundamental to blockchain security:
Public Key:
- Derived mathematically from private key
- Can be shared freely
- Used to generate blockchain addresses
- Allows others to send you cryptocurrency
- Cannot decrypt data encrypted with it
Private Key:
- Must be kept absolutely secret
- Grants full control over associated funds
- Used to sign transactions (prove ownership)
- Can decrypt data encrypted with public key
- Loss means permanent loss of access to funds
Critical Security Principle: "Not your keys, not your coins" - only the holder of private keys truly owns the cryptocurrency.
Digital Signature
A cryptographic method to verify:
- Authenticity: Message comes from claimed sender
- Integrity: Message wasn't altered in transit
- Non-repudiation: Sender cannot deny sending
In blockchain, digital signatures prove ownership and authorize transactions without revealing private keys.
Multisignature (Multisig)
A security mechanism requiring multiple private keys to authorize a transaction rather than just one. Common configurations:
- 2-of-3: Two out of three keys required
- 3-of-5: Three out of five keys required
- M-of-N: Any M keys out of N total keys
Benefits:
- Enhanced security (no single point of failure)
- Shared control (corporate treasuries, partnerships)
- Backup keys (in case one is lost)
- Protection against theft (attacker needs multiple keys)
Ring Signature
A type of digital signature where any member of a group can sign on behalf of the group, but it's cryptographically impossible to determine which specific member signed. Used in privacy-focused cryptocurrencies like Monero to obscure transaction origins while proving the transaction came from a valid group member.
Wallet
A software application or hardware device that stores private keys and enables users to:
- Send and receive cryptocurrency
- View balance and transaction history
- Sign transactions
- Interact with blockchain applications
Important: Wallets don't actually "store" cryptocurrency (which exists on the blockchain) - they store the private keys that control access to it.
Hot Wallet
A cryptocurrency wallet connected to the internet, offering:
Advantages:
- Convenient for frequent transactions
- Easy access from multiple devices
- Integration with exchanges and DApps
- Quick transaction execution
Disadvantages:
- More vulnerable to hacking
- Risk from malware/phishing
- Dependent on service provider security
Examples: Exchange wallets, mobile apps, browser extensions (MetaMask, Trust Wallet)
Cold Wallet
A cryptocurrency wallet not connected to the internet, providing maximum security:
Advantages:
- Immune to online hacking attempts
- Protected from malware
- Best for long-term storage (HODLing)
- User maintains complete control
Disadvantages:
- Less convenient for frequent transactions
- Can be lost or damaged physically
- Requires careful backup management
Types: Hardware wallets (Ledger, Trezor), paper wallets, air-gapped computers
Seed Phrase (Recovery Phrase)
A sequence of 12-24 random words that serves as a master backup for a cryptocurrency wallet. The seed phrase can restore access to all private keys and funds if:
- Wallet software is deleted
- Device is lost or damaged
- User forgets password
Critical Security:
- Never share your seed phrase
- Never store digitally (no photos, cloud storage)
- Write on paper and store securely
- Never enter into websites or suspicious applications
- Consider metal backup for fire/water resistance
Warning: Anyone with your seed phrase has full access to your funds.
Mining & Validation
Mining
In proof-of-work blockchains, the process of:
- Collecting pending transactions
- Solving computationally intensive cryptographic puzzles
- Creating new blocks
- Adding blocks to the blockchain
- Receiving rewards (newly created cryptocurrency + transaction fees)
Purpose:
- Secures the network
- Processes transactions
- Creates new coins (in many systems)
- Achieves distributed consensus
Requirements:
- Specialized hardware (ASICs for Bitcoin)
- Significant electricity consumption
- Technical knowledge
- Initial capital investment
Gas
A unit measuring computational work required to execute operations on blockchain networks (primarily Ethereum). Users pay gas fees to:
- Process transactions
- Execute smart contracts
- Deploy contracts
- Interact with decentralized applications
Gas Price: Amount user willing to pay per unit of gas (in Gwei for Ethereum) Gas Limit: Maximum gas user willing to consume for operation
Formula: Total Fee = Gas Used × Gas Price
Higher gas prices incentivize faster transaction processing by miners/validators.
Smart Contracts & Development
Smart Contract
Self-executing computer code deployed on a blockchain that automatically enforces terms of an agreement when predetermined conditions are met. Smart contracts:
- Execute trustlessly (no intermediary needed)
- Are transparent (code is visible)
- Are immutable once deployed (generally)
- Can hold and transfer value
- Enable complex decentralized applications
Common Uses:
- Decentralized finance (DeFi) protocols
- Token creation and management
- Decentralized exchanges
- Lending/borrowing platforms
- Gaming and NFT marketplaces
- Automated market makers
Limitations:
- Cannot access external data directly (need oracles)
- Code bugs can be catastrophic
- Immutability means errors are permanent
- Gas costs for complex operations
Chaincode
Another term for smart contracts, primarily used in Hyperledger Fabric and other enterprise blockchain platforms. Functionally similar to Ethereum smart contracts but in permissioned network context.
Solidity
The primary programming language for writing smart contracts on Ethereum and EVM-compatible blockchains. Key characteristics:
- Object-oriented, similar to JavaScript
- Statically typed
- Supports inheritance and libraries
- Compiles to EVM bytecode
- Most widely used smart contract language
Learning Curve: Moderate for programmers, but security considerations require deep understanding.
Vyper
An alternative smart contract language for Ethereum designed with security and auditability as primary goals. Characteristics:
- Python-like syntax
- Deliberately omits complex features
- Easier to audit than Solidity
- More readable and explicit
- Growing adoption for security-critical contracts
Philosophy: Simplicity over flexibility to reduce attack surface.
Oracle
A service that connects blockchain smart contracts to external real-world data and events. Oracles solve the "oracle problem" - blockchains cannot natively access external information. They provide:
- Price feeds (for DeFi applications)
- Weather data
- Sports scores
- IoT device data
- Web API responses
- Randomness
Leading Oracle Networks: Chainlink, Band Protocol, API3
Challenge: Maintaining decentralization while accessing centralized data sources.
DApp (Decentralized Application)
An application that runs on a decentralized network (usually blockchain) rather than centralized servers. Characteristics:
- Backend code runs on blockchain (smart contracts)
- Frontend can be hosted traditionally or decentrally
- Open source (typically)
- Uses blockchain for data and logic
- Incentivized through tokens (often)
Examples: Uniswap (DEX), Aave (lending), Axie Infinity (gaming), OpenSea (NFT marketplace)
User Experience: Often requires wallet connection and transaction signing for each interaction.
Ethereum-Specific Terms
Ethereum
The second-largest cryptocurrency platform by market cap and the first blockchain to popularize smart contracts. Features:
- Turing-complete smart contract platform
- EVM (Ethereum Virtual Machine)
- Native cryptocurrency: Ether (ETH)
- Basis for most DeFi and NFT applications
- Transitioned from PoW to PoS in 2022 ("The Merge")
Significance: Enables decentralized applications, making it a "world computer."
ERC-20
The most common token standard on Ethereum for fungible tokens. Defines required functions and events:
totalSupply()- total token supplybalanceOf()- account balancetransfer()- send tokensapprove()- authorize spendingtransferFrom()- authorized transferallowance()- check approval amount
Impact: Standardization enables interoperability - all ERC-20 tokens work with same wallets, exchanges, and contracts.
Examples: USDT, LINK, UNI, AAVE
ERC-721
The primary standard for non-fungible tokens (NFTs) on Ethereum. Each token has:
- Unique identifier
- Individual ownership
- Distinct metadata
- Non-interchangeable value
Required Functions:
balanceOf()- NFT count per ownerownerOf()- find NFT ownertransferFrom()- transfer NFTapprove()- authorize transfersafeTransferFrom()- safe transfer with verification
Use Cases: Digital art, collectibles, gaming items, real estate, identity
Network Architecture
Mainnet
The primary, production version of a blockchain where real value transactions occur. Characteristics:
- Uses real cryptocurrency with market value
- Permanent and immutable (intended)
- Full security measures active
- All participants use real economic value
Examples: Bitcoin mainnet, Ethereum mainnet, Binance Smart Chain mainnet
Testnet
A separate blockchain environment for testing applications before mainnet deployment. Features:
- Uses test cryptocurrency (no real value)
- Allows developers to experiment safely
- May be reset or modified
- Free test tokens available from "faucets"
- Similar functionality to mainnet
Purpose: Test smart contracts, dApps, and network upgrades without risking real funds.
Popular Testnets: Ethereum (Goerli, Sepolia), Bitcoin (Testnet, Signet)
Sidechain
A separate blockchain that runs parallel to a main blockchain and is connected via two-way peg. Purpose:
- Enable asset transfer between chains
- Improve scalability by processing transactions off main chain
- Experiment with different consensus mechanisms
- Add features without changing main chain
- Reduce congestion and costs
Example: Polygon (Ethereum sidechain), Liquid Network (Bitcoin sidechain)
Trade-off: May sacrifice some security for improved performance.
State Channel
A scaling solution where transactions occur off-chain between participants, with only initial and final states recorded on-chain. Benefits:
- Near-instant transactions
- Minimal fees
- High throughput
- Micropayments feasible
- Privacy (intermediate states not broadcast)
Process:
- Open channel with on-chain transaction
- Multiple off-chain transactions between parties
- Close channel with final state on-chain
Example: Bitcoin Lightning Network, Ethereum Raiden Network
Sharding
A scalability technique that divides the blockchain network into smaller partitions (shards) that process transactions in parallel. Each shard:
- Maintains its own transaction history
- Processes subset of total transactions
- Communicates with other shards as needed
- Reduces burden on individual nodes
Goal: Increase transactions per second while maintaining decentralization.
Status: Planned for Ethereum 2.0, implemented in some newer blockchains (Zilliqa, Near)
Layer 2
Scaling solutions built on top of base blockchain (Layer 1) that process transactions off-chain but inherit security from the main chain. Types:
- State Channels: Off-chain transaction channels
- Sidechains: Independent blockchains with bridges
- Rollups: Bundle multiple transactions, post to Layer 1
- Plasma: Child chains with fraud proofs
Benefits:
- Dramatically increased throughput
- Lower transaction costs
- Maintains base layer security
- Reduces main chain congestion
Examples: Arbitrum, Optimism, zkSync (Ethereum L2s)
Interoperability
The ability of different blockchain networks to communicate and exchange data or value. Challenges:
- Different consensus mechanisms
- Varying security models
- Incompatible data structures
- Trust assumptions
Solutions:
- Bridges: Connect two specific blockchains
- Wrapped Tokens: Represent assets from one chain on another
- Cross-Chain Protocols: Enable multi-chain interaction (Cosmos, Polkadot)
- Middleware: Intermediate layers for communication
Importance: Enables ecosystem growth and reduces fragmentation.
Governance & Organizations
DAO (Decentralized Autonomous Organization)
An organization governed by smart contracts and community voting rather than traditional hierarchical management. Features:
- Rules encoded in smart contracts
- Decisions made by token holder votes
- Transparent operations on blockchain
- No central authority
- Automated execution of decisions
Common Uses:
- Protocol governance
- Investment funds
- Collective resource management
- Grant allocation
- Community projects
Challenges:
- Legal status unclear in many jurisdictions
- Voter apathy
- Plutocracy (wealth-based voting power)
- Difficulty changing rules
Notable Examples: MakerDAO, Uniswap DAO, ConstitutionDAO
Governance
The mechanisms and processes through which blockchain protocols evolve and make decisions. Types:
- On-Chain: Voting and execution through smart contracts
- Off-Chain: Discussion forums, polling, social consensus
- Token-Based: Voting power proportional to token holdings
- Delegated: Token holders delegate voting power to representatives
Key Decisions:
- Protocol upgrades
- Parameter adjustments (fees, rewards, etc.)
- Treasury fund allocation
- Strategic direction
Security & Attacks
51% Attack
An attack where a single entity controls more than 50% of a blockchain network's mining power (PoW) or staking power (PoS), potentially enabling them to:
- Double-spend coins
- Prevent transaction confirmations
- Reverse recent transactions
- Prevent new transactions
Limitations of Attack:
- Cannot steal funds from other wallets
- Cannot change past transactions beyond recent ones
- Extremely expensive on large networks
- Damages network value, harming attacker's investment
Protection: Large, distributed networks are prohibitively expensive to attack.
Double Spending
The risk that digital currency could be spent twice. Blockchain prevents this through:
- Transaction confirmation by multiple nodes
- Cryptographic verification
- Consensus mechanisms
- Immutable transaction history
How Attempted:
- Send transaction to merchant
- Simultaneously send same funds to self
- Try to get self-payment confirmed first
- Merchant never receives funds
Protection: Wait for multiple confirmations before considering payment final.
Data Storage & Privacy
On-Chain
Data stored directly within the blockchain itself. Characteristics:
- Permanently recorded
- Publicly visible (in public blockchains)
- More expensive (uses block space)
- Maximum security and persistence
- Immutable
Typical On-Chain Data:
- Transaction details
- Account balances
- Smart contract code
- Small amounts of critical data
Off-Chain
Data stored outside the blockchain, typically for:
- Large files (images, videos)
- Frequently changing data
- Private information
- Reduced costs
Storage Solutions:
- IPFS (Interplanetary File System)
- Traditional databases
- Decentralized storage networks (Filecoin, Arweave)
- User devices
Trade-off: Lower cost and better scalability vs. reduced decentralization and permanence.
IPFS (InterPlanetary File System)
A peer-to-peer network and protocol for storing and sharing data in a distributed file system. Features:
- Content-addressed (files identified by content hash, not location)
- Decentralized storage
- Deduplication (identical content stored once)
- Permanent file availability (while pinned by nodes)
- No central servers
Use Cases:
- NFT metadata and images
- DApp frontend hosting
- Decentralized storage
- Content distribution
How It Works:
- Add file to IPFS
- Receive unique content identifier (CID)
- File retrievable from any IPFS node with copy
- Content never changes (new version = new CID)
Identity & Verification
Digital Identity (Self-Sovereign Identity)
Blockchain-based digital identity systems giving individuals control over their personal information. Principles:
- User controls own data
- Selective disclosure (share only what's needed)
- No central authority
- Portable across services
- Privacy-preserving
How It Works:
- Identity information stored on blockchain or user-controlled storage
- Cryptographic proofs verify attributes without revealing data
- User grants permission for specific verifications
- No single organization controls identity
Use Cases:
- Age verification without revealing birthdate
- Credential verification (diplomas, licenses)
- Access control
- Know Your Customer (KYC) processes
Projects: Sovrin, uPort, Microsoft ION
Know Your Customer (KYC)
The legal and regulatory process requiring financial institutions to verify customer identities. Requirements vary by jurisdiction but typically include:
- Government-issued ID verification
- Proof of address
- Source of funds documentation
- Ongoing monitoring for suspicious activity
Purpose:
- Prevent money laundering
- Combat terrorism financing
- Reduce fraud
- Comply with regulations
In Crypto:
- Required by centralized exchanges
- Not required for decentralized protocols
- Privacy concern for users
- Compliance burden for businesses
- Ongoing debate about balance between privacy and regulation
Economic Terms
Liquidity
The ease and speed of converting an asset to cash without significantly affecting its price. High liquidity means:
- Many buyers and sellers
- Narrow bid-ask spreads
- Large transactions possible without price impact
- Quick execution at fair prices
In Crypto Markets:
- Major coins (BTC, ETH) have high liquidity
- Small-cap altcoins often have low liquidity
- Liquidity varies across exchanges
- Affects trading strategies and risk
Tokenomics
The study and design of token economics including:
- Supply: Total, circulating, maximum supply
- Distribution: Initial allocation, team shares, public sale
- Inflation/Deflation: Token creation/burning mechanisms
- Utility: What tokens are used for
- Incentives: Rewards for participation
- Governance: Voting rights and mechanisms
Key Metrics:
- Market cap = Price × Circulating Supply
- Fully diluted valuation = Price × Total Supply
- Emission schedule
- Burn rate
Importance: Poorly designed tokenomics can doom projects despite strong technology.
Initial Coin Offering (ICO)
The cryptocurrency equivalent of an IPO (Initial Public Offering), where new projects sell tokens to raise capital. Process:
- Project publishes whitepaper
- Sets token price and sale terms
- Accepts cryptocurrency (usually ETH, BTC)
- Distributes tokens to investors
- Lists on exchanges
Historical Context:
- Extremely popular 2017-2018
- Many scams and failed projects
- Increased regulatory scrutiny
- Largely replaced by other fundraising methods
Modern Alternatives: IEO (Initial Exchange Offering), IDO (Initial DEX Offering), Fair Launch
Token Generation Event (TGE)
The moment when a new token is created and begins distribution. May or may not involve public sale. Can include:
- Private sales to investors
- Public sales
- Airdrops to community
- Liquidity provision
- Team and advisor allocation
More neutral term than ICO, doesn't imply fundraising purpose.
Advanced Concepts
Fork
A change to a blockchain's protocol that creates a divergence in the blockchain. Types:
Soft Fork:
- Backwards-compatible upgrade
- Non-upgraded nodes still follow chain
- Only some rules tightened
- Example: Bitcoin SegWit
Hard Fork:
- Non-backwards-compatible change
- Creates two separate blockchains
- Requires all nodes to upgrade
- Can be contentious or planned
- Examples: Bitcoin Cash (from Bitcoin), Ethereum Classic (from Ethereum)
Reasons for Forks:
- Bug fixes
- Feature additions
- Community disagreements
- Reversing hacks (controversial)
- Philosophical differences
Satoshi Nakamoto
The pseudonymous person or group who:
- Created Bitcoin
- Authored the Bitcoin whitepaper (2008)
- Mined the first Bitcoin blocks
- Developed initial Bitcoin software
- Disappeared from public view around 2011
Mysteries:
- True identity unknown
- Estimated to own
1 million BTC ($30+ billion at current prices) - These coins have never moved
- Multiple people claimed to be Satoshi (none proven)
Legacy: Launched entire cryptocurrency and blockchain industry.
Provenance
The complete documented history of an asset from origin to present, including:
- Creation/manufacture
- Chain of custody
- All ownership transfers
- Value-added services
- Authenticity verification
Blockchain Applications:
- Supply chain tracking
- Art and collectibles authentication
- Luxury goods verification
- Food safety
- Pharmaceutical supply chains
- Diamond certification
Benefits:
- Fraud prevention
- Quality assurance
- Regulatory compliance
- Consumer confidence
Trustless
A core blockchain property where transactions can be executed without needing to trust the counterparty or intermediary. Instead, trust is placed in:
- Cryptographic algorithms
- Mathematical proofs
- Transparent code
- Distributed consensus
- Economic incentives
Example: You can send Bitcoin to a stranger without trusting them, because the blockchain ensures they can't steal or double-spend.
Distinction: "Trustless" doesn't mean "no trust" - it means trust is distributed and verifiable rather than concentrated in a central authority.
Transparency
The property of public blockchains where all transactions and state changes are visible to all participants. Benefits:
- Auditability
- Accountability
- Fraud detection
- Open verification
Trade-offs:
- Privacy concerns
- Competitive information exposure
- Transaction tracking possible
- Need for privacy solutions (zero-knowledge proofs, privacy coins)
Note: Private/permissioned blockchains can limit transparency to authorized participants.
Chain of Custody
Documentation tracking an asset's possession and handling throughout its lifecycle. In blockchain:
- Every transfer recorded immutably
- Timestamps prove sequence
- Digital signatures prove authorization
- Creates unbreakable audit trail
Critical Applications:
- Legal evidence
- High-value goods
- Regulated industries
- Quality control
- Compliance documentation
Performance Metrics
Transactions Per Second (TPS)
A measurement of blockchain throughput - how many transactions the network can process per second. Comparison:
- Bitcoin: ~7 TPS
- Ethereum (pre-merge): ~15 TPS
- Ethereum (post-merge): ~15 TPS (same, but L2s handle much more)
- Visa (for comparison): ~24,000 TPS theoretical capacity
- Solana: ~2,000-3,000 TPS actual
- Binance Smart Chain: ~100 TPS
Trade-offs:
- Higher TPS often means more centralization
- Security vs. speed balance
- Not the only important metric
- Layer 2 solutions dramatically increase effective TPS
Exchanges & Trading
Exchange (Cryptocurrency Exchange)
A platform for buying, selling, and trading cryptocurrencies. Types:
Centralized Exchange (CEX):
- Company-operated platform
- Custody of user funds
- Faster trading
- Fiat on/off ramps
- KYC required
- Examples: Coinbase, Binance, Kraken
Decentralized Exchange (DEX):
- Smart contract-based
- Non-custodial (users control funds)
- No KYC
- Typically crypto-to-crypto only
- Examples: Uniswap, SushiSwap, PancakeSwap
Attestation Ledger
A specialized ledger designed to provide verifiable evidence that specific transactions or events occurred. Used for:
- Compliance documentation
- Supply chain verification
- Audit trails
- Certification records
- Timestamp proof
Platform-Specific Terms
Hyperledger Fabric
An enterprise-grade, permissioned blockchain framework developed under the Linux Foundation's Hyperledger project. Features:
- Modular architecture
- Pluggable consensus
- Private channels for confidential transactions
- Chaincode (smart contracts) in multiple languages
- Identity management
- High performance
Use Cases:
- Enterprise supply chains
- Financial services
- Healthcare records
- Government systems
Key Difference from Public Blockchains: Designed for known, trusted participants rather than trustless environments.
Open Zeppelin
A framework and community providing:
- Secure, audited smart contract libraries
- Development tools
- Security best practices
- Contract templates (tokens, access control, etc.)
- Auditing services
Importance: Industry standard for Ethereum smart contract security, significantly reduces development risk.
Important Warnings & Considerations
Protect Your Private Keys:
- Never share private keys or seed phrases
- Use hardware wallets for significant holdings
- Beware of phishing attempts
- Verify all addresses before sending
- No legitimate service will ever ask for your private keys
Common Scams:
- Fake wallet apps
- Phishing websites
- Ponzi schemes disguised as investment opportunities
- Fake celebrity endorsements
- "Send crypto to get more back" scams
- Impersonation of support staff
Transaction Irreversibility:
- Blockchain transactions generally cannot be reversed
- Always double-check addresses
- Start with small test transactions
- Understand the specific blockchain's features
Legal Status Varies:
- Cryptocurrency regulations differ by country
- Tax implications exist in most jurisdictions
- Securities laws may apply to certain tokens
- Compliance requirements evolving rapidly
Your Responsibility:
- Understand your local regulations
- Maintain records for tax purposes
- Consult legal/tax professionals
- Stay informed of regulatory changes
Conclusion
Understanding blockchain and cryptocurrency terminology is essential for:
- Navigating crypto markets safely
- Making informed investment decisions
- Participating in blockchain ecosystems
- Evaluating projects and technologies
- Managing digital assets securely
Key Takeaways:
- Security First: Protect private keys, use hardware wallets for significant holdings, and never share sensitive information.
- Do Your Own Research (DYOR): Understanding these terms is just the beginning. Always research projects thoroughly before investing.
- Technology Evolves: The blockchain space develops rapidly. Continue learning and stay updated on new developments.
- Risk Management: Only invest what you can afford to lose. The cryptocurrency space is high-risk and highly volatile.
- Regulatory Compliance: Understand and follow applicable laws and regulations in your jurisdiction.
Additional Learning Resources
Educational Platforms:
Technical Documentation:
- Bitcoin Whitepaper by Satoshi Nakamoto
- Ethereum Whitepaper and Yellow Paper
- Mastering Bitcoin by Andreas Antonopoulos
- Mastering Ethereum by Andreas Antonopoulos and Gavin Wood
Security Resources:
- CryptoSec.info
- Metamask Security Best Practices
- Hardware wallet manufacturer documentation
The blockchain and cryptocurrency space evolves rapidly. This glossary provides foundational knowledge, but staying current with developments, security practices, and regulatory changes is essential for anyone participating in these markets.