Learn
What is
How to
Glossary
Trading Analysis
Topic
Blockchain
Crypto
Defi
NFT
Gamefi
Metaverse
ETH
BYDFi
Latest Announcements
Partnerships/AMA
Promotions/Events
News
/blog/wp-content/themes/byd-theme-1705059848015
Skip to content
BYDFi.com
Buy Crypto
Spot
Derivatives
Welcome Rewards
Log in/Register
BLOG
Primary Menu
Learn
What is
How to
Glossary
Trading Analysis
Topic
Blockchain
Crypto
Defi
NFT
Gamefi
Metaverse
ETH
BYDFi
Latest Announcements
Partnerships/AMA
Promotions/Events
News
Learn
All
What is
How to
Glossary
Trading Analysis
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
#
0x Protocol
1hr
21 Million
24hr
30d
3D Model Rendering
401(k) Plan
51% attack
52-Week High/Low
7d
A
Abstract
Account
Accounting Token
Accumulation/Distribution Indicator (A/D)
Adam Back
Adaptive State Sharding
Address
Adoption curves
Advanced Research Projects Agency Network (ARPANET)
Aeternity Blockchain
Air Gap
Airdrop
Airnode
Alameda Research
Algo-Trading (Algorithmic Trading)
Algorand Smart Contract (ASC1)
Algorand Standard Asset (ASA)
Algorithm
Algorithmic Market Operations (AMOs)
Algorithmic Stablecoin
ALL OR NONE ORDER (AON)
All-Time-High (ATH)
All-Time-Low (ATL)
Allocated Gold
Allocation
Alpha Coefficient
Alpha Homora
Alpha Lending
Alpha Testing
Alpha Version
Alphanumeric
AlphaX
Altcoin
Altcoin Trader
Alternative trading system (ATS)
alToken
Amazon S3
Amazon Web Services (AWS)
Amazon Web Services (AWS) Lambda
AMLD5
Amortizing
AMP
Anarcho-capitalism
Andre Cronje
Angel Investor
Annual Percentage Rate (APR)
Annual Percentage Yield (APY)
Anonymous
Anti-dump/Anti-Dumping Policy
Anti-Fragile
Anti-Malware
Anti-Money Laundering (AML)
Antivirus
Anyswap
Anything as a service (XaaS)
Apeing
API
Aping In
Application Binary Interface (ABI)
Application Blockchain Interface (ABCI)
Application Layer
Application programming interface (API)
Approved Address
Arbitrage
Arm Virtual Machine (Qtum)
Aroon Indicator
Ashdraked
ASIC
ASIC Mining
ASIC-Resistance
Ask Price
Asset
Astroturfing
Asymmetric Encryption
Asynchronous Byzantine Fault Tolerant (aBFT)
Atomic Swap
AtomicDEX
Attestation Ledger
Auction
Audit
Augmented Reality (AR)
Augur Decentralized Oracle System
Authentication
Authority Masternode (AM)
Automated Market Maker (AMM)
Autonomous Economic Agent (AEA)
Average Directional Index (ADX)
B
Back End
Backdoor
Backtesting
Backwardation
Backwards Compatibility
Bag
Bagholder
Baiting
Bakers
Baking
Balance Freeze Functionality
Bandwidth
Bank for International Settlements (BIS)
Banking as a Service (BaaS)
Banking Secrecy Act (BSA)
Base Currency
Basket
Beacon Chain
Bear Flag
Bear Market
Bear Trap
Bearwhale
Behavior-Based Detection Method
Benchmark
Benchmark Index
BEP-20
Beta Coefficient
Beta Version
Bid Price
Bid-Ask Spread
Big Tech
Binance Community Vote
Binance Labs
Binary Code
Bit
Bitcoin ATM (BTM)
Bitcoin Core
Bitcoin Dominance (BTCD)
Bitcoin Implementations
Bitcoin Improvement Proposal (BIP)
Bitcoin Mixer
Bitcoin Pizza
Bitcoin-Qt
Bitcoind
Bitcoiner
Bitcointalk
BitLicense
BitPay
Bitstream
Black Hat Hacker
Black Swan Event
Block
Block Difficulty
Block Explorer
Block Header
Block Height
Block Producer
Block Reward
Block Size
Block Space
Block Subsidy
Block Time
Block Trade
Block Weight
Blockchain 3.0
Blockchain Bridge
Blockchain Trilemma
Bollinger Band
Bonding
Bonding Curve
Boneh–Lynn–Shacham (BLS) Signature
Bootstrapping
Borderless
Bored Ape Kennel Club (BAKC)
Bounty
Brain Wallet
Brave Browser
Break-Even Point
Breakdown
Breaking
Breakout
Brokerage Account
Browser Extension
Brute Force Attack
Bubble
Bug Bounty Program
BUIDL
Bull Flag
Bull Market
Bull Run
Bull Trap
Burned
Business Logic Layer (BLL)
Business to Business (B2B)
Business to Consumer (B2C)
Buy Side/Sell Side
Buy The Dip
Buy Wall
C
Call Options
Call Provision
Candlestick Body
Candlestick Wick
Candlesticks
Capital
Capitulation
Casascius Coin
Cascading Liquidations
Casper (Ethereum)
Cathie Wood
CeDeFi
Censorship
Censorship Resistance
Central Bank
Central Bank Digital Currency (CBDC)
Central Ledger
Central Limit Order Book
Central Processing Unit (CPU)
Central Processing Unit Miner
Centralization
Centralized
Centralized Exchange (CEX)
Centralized Finance (CeFi)
Centre (Consortium)
Cerber Ransomware
Certificate Authority
Certificate of Deposit
Chain Analysis
Chain Migration
Chain Reorganization
Chain Split
Change Address
Change Output
Channel
Chargeback
Chicago Mercantile Exchange (CME)
Cipher
Ciphertext
Circular Economy
Circulating Supply
Clearing
Client
Client-Server Model
Close
Closed Loop Payment Network
Cloud
Cloud Computing
Cloud Mining
Co-Signer
Code Repository
Coin
Coin Burning
Coin Mixer
Coin Swap
CoinJoin
CoinSwap
Cold Storage
Cold Wallet
Collateral
Collateral Cap
Collateral Factor
Collateral token
Collateralization
Collateralized Debt Obligation
Collateralized Debt Position
Collateralized Loan Obligation
Collateralized Mortgage Obligation (CMO)
Collator
Colocation
Combolist
Command Line Interface
Commit Chain
Commodities
Commodity Exchange Act
Commodity Futures Trading Commission (CFTC)
Commodity-Backed Stablecoin
Compiler
Compliance
Composability
Composable DeFi
Computational Backlog
Compute-To-Data
Computer-Aided Design (CAD) Software
Concealment
Concentrated Liquidity
Confirmation
Confirmation Time
Consensus
Consensus Mechanism
ConsenSys
Consortium Blockchain
Constant Product Formula
Constant Reserve Rate
Consumer Price Index
Consumer to Business (C2B)
Consumer to Consumer (C2C)
Content Delivery Network (CDN)
Continuous Order Book
Contract Account
Contract for Difference (CFD)
Contract Separation
Convergence
Cookie
Coordinated Universal Time (UTC)
Core Wallet
Corporate Bond
Corporate Treasury
Correction
Cost Basis
Counter-Terrorist Financing (CTF)
Counterparty Risk
Coupon Payment
CPU Miner
Craig Wright
Credit Rating
Credit Risk
Cross Margin
Cross-Chain Communication
Cross-Chain Message Passing (XCMP)
Crowdfunding
Crowdloan
Crypto Invoicing
Crypto Mining Processor (CMP)
Crypto Ransomware
Crypto Token
Crypto Winter
Crypto-Backed Loan
Crypto-Backed Stablecoin
Crypto-Collateralized Loan
Cryptoart
Cryptoasset
Cryptocurrency
Cryptocurrency Address
Cryptocurrency Exchange
Cryptocurrency Faucet
Cryptocurrency Money Laundering
Cryptocurrency Pairs
CryptoDefense Ransomware
Cryptographic Hash Function
Cryptographic Proof
Cryptographically Verifiable
Cryptography
Cryptography Mailing List
Cryptojacking
CryptoLocker Ransomware
Cryptology
CryptoPunks
CryptoWall Ransomware
CSS (Cascading Style Sheets)
cToken
Currency Crisis
Curve AMO
Custodial
Custodial Wallet
Custodian
Custody
Customer Due Diligence (CDD)
Customer Identification Program (CIP)
Cyber Attack
Cybersecurity
Cypherpunk
D
Daedalus Wallet
Daedalus Wallet (Cardano)
Daemon
DAI
Dandelion
DAO Summoning
dAppChain (Loom Network)
Dapper Labs
Dark Web
Data Access Layer (DAL)
Data Anchoring
Data Privacy
Data Science (DS)
Data Scraping
Data Verification Mechanism (DVM)
Datatoken (Ocean Protocol)
Date of Launch
Day Trading
Dead Cat Bounce
Dead Coin
Decentralization Maximalism
Decentralized / Decentralization
Decentralized API (dAPI)
Decentralized Applications (DApps)
Decentralized Autonomous Initial Coin Offerings (DAICOs)
Decentralized Currency
Decentralized Exchange (DEX)
Decentralized Exchange (DEX) Aggregator
Decentralized Exchange (DEX) Protocol
Decentralized Finance (DeFi)
Decentralized Governance
Decentralized Identifier (DID)
Decentralized Ledger
Decentralized Network
Decentralized Oracle Network (DON)
Decentralized Payment Network
Decentralized Social Media
Decentralized Storage Network (DSN)
DeCloud (Akash Network)
Decryption
DeFi Degens
Deflation
Delegated Byzantine Fault Tolerance (dBFT)
Delegated Proof of Contribution (DPoC) (ICON Network)
Delegated Proof-of-Stake (dPOS)
Delegator
Denial-of-Service (DoS) Attack
Depth Chart
Derivative
Derivatives Market
Design Flaw Attack
Desktop Wallet
Deterministic Wallet
Dharma Protocol
Dharma Wallet
Diamond Hands
Difficulty
Difficulty Bomb
Digital Art
Digital Asset
Digital Asset Custodian
Digital Asset Ecosystem
Digital Barter Economy
Digital Commodity
Digital Currency
Digital Dollar
Digital Signature
Digital Signature Algorithm (DSA)
Dildo
Direct Market Access (DMA)
Direct Public Offering (DPO)
Directed Acyclic Graph (DAG)
Directional Trading
Discord
Disk Operating System (DOS)
Distributed Consensus
Distributed Denial of Service (DDoS) Attack
Distributed Hash Table (DHT)
Distributed Ledger
Distributed Ledger Technology (DLT)
Distributed Network
Divergence
Diversification
Dollar Cost Averaging (DCA)
Dolphin
Dorian Nakamoto
DotSama
Double Spend Attack
Double Spending
dPoSec (Distributed Proof of Security)
Drawdown
Dual-Token Economy/Model (Two-Token Economy)
Dump
Dust Transactions
Dusting Attack
DYCO (Dynamic Coin Offering)
DYOR
E
E-business
E-commerce
E-Signature
Earnings Per Share (EPS)
Economic X Node (XN) and Economic Node (EN) (VeChain)
Ecosystem Expansion Project (EEP) (ICON Network)
Edge Nodes (Theta Network)
Edgecast (Theta Network)
Effective Proof-of-Stake
Efficient Market Hypothesis (EMH)
EIP-1559
Electronic Retailing (E-tailing)
Electrum Wallet
ELI5
Elliott Wave Theory
Elliptic Curve Digital Signature Algorithm (ECDSA)
Elrond Standard Digital Token (ESDT)
Elrond Virtual Machine
Eltoo
EMA (Exponential Moving Average)
Email Spoofing
Emission
Enhanced Due Diligence (EDD)
Enterprise Adoption
Enterprise Blockchain
Enterprise Ethereum Alliance (EEA)
Enya
EOSIO
EOSIO 1.0
EOSIO 2.0
EOSIO Contract Development Toolkit (EOSIO.CDT)
EOSIO RPC Application Programming Interface (API)
EOSIO Software Development Kit (SDK)
EOSIO Virtual Machine (EOSIO VM)
Epoch
Equihash
Equity Stake (Equity)
Erasure Encoding
ERC-1155
ERC-20
ERC-2222 Token Standard
ERC-223
ERC-721
ERC-777
ERC-884
ERC-948
Erlay
Escrow
Esports
Ethash
Ethereum Deposit Contract
Ethereum Dominance (ETHD)
Ethereum Improvement Proposal (EIP)
Ethereum Request for Comment (ERC)
Ethereum Transaction
Ethereum Virtual Machine (EVM)
Ethermint
European Central Bank (ECB)
European Economic Area (EEA)
Event Triggers
Exchange
Exchange-Traded Commodity (ETC)
Exchange-Traded Fund (ETF)
Exchange-Traded Note (ETN)
Exchange-Traded Product (ETP)
Execution Price
Exit Scam
Exploit Kit
Exponential Decay Model
Extended Private Key (XPRIV)
Extended Public Key (XPUB)
F
Fair Launch
Fair Sequencing Service (FSS) (Chainlink)
Fakeout
Falling Knife
Falling Wedge
Fan Token (Chiliz)
Fan Token Offering (FTO)
Fantom Virtual Machine
Fast Byzantine Fault Tolerance (FBFT)
Fast Exit Problem
FATF Travel Rule
Faucet
Fear Uncertainty and Doubt (FUD)
Federal Deposit Insurance Corporation (FDIC)
Federated Blockchain
Federated Byzantine Agreement (FBA)
Fee Tiers
Fiat Currency
Fiat Off-Ramp
Fiat On-Ramp
Fiat-Backed Stablecoin
Fiat-pegged Cryptocurrency
Fibonacci Ratio
Fibonacci Retracement Level
FICO (Fair Isaac Corporation) Score
Field Programmable Gate Array
Field-Programmable Gate Array (FPGA) Miner
FIFO
Fill Or Kill (FOK)
Finality (Settlement Finality)
Finality Rate
Financial Crime Enforcement Network (FinCEN)
Financial Inclusion
Financial Industry Regulatory Authority (FINRA)
Financial Industry Regulatory Authority (FINRA) Rule 3310
Financial Information eXchange (FIX)
Financial Instrument
Financial Securities
Financial Technology (FinTech)
Financial Transactions and Reports Analysis Centre (FINTRAC)
Fine Art
Finite-State Machine
Finney Attack
Firewall
First-Mover Advantage (FMA)
Fiscal Crisis
Fiscal Policy
Fishermen (Polkadot)
Fixed Supply (Price Elasticity)
Flag (Technical Formation)
Flappening
Flash Crash
Flash Loan (Aave)
Flash Loan Attack
Flexa
Flexacoin (FXC)
Flippening
Flipping
Floor Price
Flow (Blockchain Platform)
FOMO
Forced Liquidation
Forex (FX)
Forging
Fork (Blockchain)
Fork (Software)
Form 10-K
Form 10-Q
Formal Verification
Fractional Ownership
Fractional Stablecoins
Framework for Runtime Aggregation of Modularized Entities (FRAME)
Fraud Proof
Front Running
Front-End (Computing Architecture)
Front-End Software Development
FUD
Fully Diluted Value (FDV)
Fully Homomorphic Encryption
Fundamental Analysis (FA)
Funding Payments
Fungibility
Fungible
Futures Contract
G
Game Channels
Game Finance (GameFi)
Game Theory
Gartner
Gas
Gas Fees
Gas Limit
Gas Price
Gas Station Networks (GSN)
Gateway
Gavin Wood
Gems (The Sandbox)
General Availability (GA) Version
General Data Protection Regulation (GDPR)
Genesis Block
Geographic Information System (GIS)
Geotagged NFT
Geth
Gigabyte (GB)
Git
GitHub
Global Industry Classification Standard (GICS)
Glossary
Go Programming Language
Goguen Phase (Cardano)
Gold-Backed Cryptocurrency
Golden Cross
Golem (GNT)
Good Till Cancelled (GTC)
Google Authenticator
Gossip Protocols
Governance
Governance Token
GRANDPA Consensus Mechanism (Polkadot)
Graph Node (The Graph)
Graphical Processing Unit (GPU)
Graphical User Interface (GUI)
Graphics Processor Unit (GPU) Mining
Gray Swan Event
Grayscale (Institutional Investment Firm)
Greater Fool Theory
Green Candle
Greenlist
Griefing
Gross Domestic Product (GDP)
Gross Merchandise Value (GMV)
Group Mining
Gwei
H
Hack
Hackathon
Hacker
Hacking
Haha Money Printer Go Brr
Hal Finney
Halving
hApps (Holochain)
Hard Cap
Hard Fork
Hard Fork Combinator (Cardano)
Hard Peg
Hardware Wallet
Hash Function
Hash Power / Hash Rate
Hash Rate
Hashed Timelock Contract (HTLC)
Hashes per Second (H/S)
Hashgraph Consensus Mechanism
Hashing
HashLock Key
Hashmasks
Haskell Programming Language
Head and Shoulders (Technical Formation)
Hedge
Hedge Contract (Hegic)
Hedge Fund
Heimdall Node
Hexadecimal (Hex)
Hidden Cap
Hierarchical-Deterministic (HD) Wallet
HIFO
High
High-Frequency Trading
High-Level Programming Language
High-Net-Worth Individual (HNWI)
High-Yield (Junk) Bonds
HMAC-Based One-Time Password (HOTP)
HODL
Homomorphic Encryption (HE)
Honest Geppetto Attack
HoneyBadger BFT (HBBFT)
Honeyminer
Horizontal Relay-Routed Message Passing (HRMP)
Horizontal Scalability
Hostage Byte Attack
Hostage Byte Attack (Storj)
Hot Wallet
Hotspot (Helium)
Howey Test
Human-Readable Agreement
Huobi (Cryptocurrency Exchange)
Huobi Ecochain Blockchain (HECO)
Hybrid Blockchain
Hybrid Exponential Minting
Hybrid PoW/PoS
Hybrid Smart Contract (Chainlink)
Hydra (Cardano)
Hyperinflation
Hyperledger (Hyperledger Foundation)
Hyperledger Fabric
Hypertext Transfer Protocol (HTTP)
I
Iceberg Order
ICON Incentives Scoring System (IISS) (ICON Network)
Identity Data
iExec
Ignite (formerly Tendermint)
Illuvium Configuration Change Proposal (ICCP)
Illuvium Improvement Proposal (IIP)
Immediate Or Cancel (IOC)
Immutability
Immutable
Impermanent Loss
Index Fund
Index Token
Indexing Server
Individual Retirement Account (IRA)
Infinite Approval
Infinite Mint Attack
Inflation
Inflation Hedge
Infrastructure as a Service (IaaS)
Initial Block Download (IBD)
Initial Bounty Offering (IBO)
Initial Coin Offering (ICO)
Initial Dex Offering (IDO)
Initial Exchange Offering (IEO)
Initial Farm Offering (IFO)
Initial NFT Offering (INO)
Initial Public Offering (IPO)
Initial Stake Pool Offering (ISPO)
Initial Token Offering (ITO)
Input Sequence (nSequence)
Input-Output Global (IOG)
Input-Output Hong Kong (IOHK)
Insider Trading
Instamine
Instant Settlement Network Layer
Institutional Investment Fund
Institutional Investor
Insurance Fund
Intangible Asset
Integrated Development Environment (IDE)
Intellectual Property (IP)
Inter-Blockchain Communication (IBC) Protocol
Inter-Chain Communication
Intercontinental Exchange (ICE)
Interest Bearing Asset
Interest Bearing Token (ibTKN)
Intermediary/Middleman
Internal Transaction
International Monetary Fund (IMF)
International System of Units (SI)
Internet Assigned Numbers Authority (IANA)
Internet Corporation for Assigned Names and Numbers (ICANN)
Internet Meme
Internet Service Provider (ISP)
Interoperability
InterPlanetary File System (IPFS)
Intrinsic Value
Inverse Synthetic Cryptocurrencies
Investment Vehicles (Crypto-tied)
Invisible Internet Project (I2P)
IOU
J
Jager
Java
Java Virtual Machine (JVM)
JavaScript (JS) Programming Language
JavaScript Object Notation (JSON)
John Bollinger
JOMO
Just-a-Bunch-of-Keys (JBOK)
K
Kademlia Routing (Harmony)
Keccak
Keep Network (KEEP)
KEEP Token
Keosd
Kernel
Key
Key Management Interoperability Protocol (KMIP)
Key Send
Keylogger
Keystore File
Kimchi Premium
Klinger Oscillator
Know Your Customer (KYC)
Known-Plaintext Attacks
L
Lachesis (Fantom)
Lambo
LAND (The Sandbox)
Large Cap
Laser Eyes
Last Irreversible Block (LIB)
Last Mile Delivery
Latency
Law of Accelerating Returns
Law of Excellerating Returns
Layer
Layer 0
Layer 2
Layer-0 Blockchain
Layer-1 Blockchain
Layer-2 Scaling Solution
Leaf Node
Leakware or Doxware
Ledger
Leverage
libp2p
LIFO
Light Client
Light Node
Lighting Network
Lightning Channel
Lightning Network
Limit Order
Liquid Market
Liquid Network
Liquid Staking (Fantom)
Liquidation
Liquidity Aggregator
Liquidity Bootstrapping Pool (LBP)
Liquidity Mining
Liquidity Pool
Liquidity Premium
Liquidity Provider
Liquidity Provider Tokens (LP Tokens)
Liveness
Loan-to-value (LTV)
Loan-To-Value (LTV) Ratio
Location Swap
London Bullion Market Association (LBMA)
London Stock Exchange Group (LSEG)
Longing (Long Position)
LoRaWAN
Lovelace
Low-Level Programming Language
M
M-of-N
Machine Learning (ML)
Mainnet
Mainnet Swap
Maker
Maker Protocol (MakerDAO)
Malleability
Malware
Man-in-the-Middle Attack (MITM)
Management Information System (MIS)
Margin Call
Margin Trading
Mark to Market
Market
Market Balances
Market Capitalization/Market Cap/MCAP
Market Depth
Market Maker
Market Momentum
Market Order
Market Sentiment
Market Signal
Markets Integrity Committee (MIC)
Marlowe
Masternodes
Max Supply
Megahashes Per Second
Membership Service Provider (MSP)
Meme Economy
Memecoin
Memorandum of Understanding (MOU)
Mempool
Mempool Explorer
Mercenary Capital
Merged Mining
Merkelized Alternative Script Tree (MAST)
Merkle Root
Merkle Tree
Mesh Network
MetaMask
Metatransaction
Metaverse
Metaverse-as-a-Service (MaaS)
Metcalfe’s Law
Micro Cap
MicroBitcoin (uBTC)
Micropayment
Microtransaction
Microtransaction (MTX)
Mid Cap
Middleware
MilliBitcoin
Mimetic Theory
Minable
Mineable
Minecraft
Miner
Miner Extractable Value (MEV)
Miner-Activated Soft Fork (MASF)
Minimum Collateralization Ratio (MCR)
Mining
Mining Algorithm
Mining as a Service (MaaS)
Mining Difficulty
Mining Farm
Mining Pool
Mining Reward
Mining Rig
Minnow
Minting
Mirror Protocol
Mixer (Crypto Mixer)
Mixing
Mnemonic Phrase
Mnemonics
Mobile Wallet
Modern Portfolio Theory (MPT)
Moloch DAO
Monetary Authority of Singapore (MAS)
Monetary Base
Monetary Policy
Money Flow Index (MFI)
Money Transfer License
Money Transfer Regulators Association (MTRA)
Moon
Moore's Law
More Viable Plasma (MoreVP)
Motoko Programming Language (DFINITY)
Moving Average (MA)
Mt. Gox
Multi-Coin Wallet
Multi-level Marketing
Multi-Party Computation
Multi-Party Computation as-a-Service
Multi-Path Payment (MPP)
Multi-Signature (Multi-Sig)
Multisig
MuSig
N
National Securities Clearing Corporation (NSCC)
Negative Volume Index (NVI)
NEM N1S1
Neo File Storage (NeoFS)
Network Latency
Network-Enhanced Virtual Machine (NEVM)
Neutrino
Newb
Nick Szabo
Nifty Gateway
No-Coiner
Nominated Proof of Stake (NPoS)
Nominators
Non-Custodial
Non-Custodial Wallet
Non-Deterministic (ND) Wallet
Non-Fungibility
Non-fungible Assets
Non-fungible token (NFT)
Non-Fungible Token (NFT) Collection
Non-Fungible Token (NFT) Marketplace
Non-Leaf Node
Nonce
Noninteractive Distributed Key Generation (NIDKG)
Notarization on Blockchain
Notional Volume
O
Observers (Elrond Network)
OceanDAO (Ocean Protocol)
Odysee
Off-Chain
Off-Chain Governance
Office of Foreign Asset Control (OFAC)
Office of the Comptroller of the Currency (OCC)
Offline Storage
Offshore Account
OHM Fork
On-Balance-Volume (OBV)
On-Chain
On-Chain Governance
One Cancels the Other Order (OCO)
One-Time Password (OTP)
Ontology Trust Anchor
Opcode
Open
Open Finance
Open Source
OpenSea
OpenSea [2021]
Opera Mainnet (Fantom)
Operating System (OS)
Optimistic Rollup
Options Contract
Options Market
Oracle Manipulation
Oracle Problem
Oracles
Order and Execution Management System (OEMS)
Order Book
Order Slicing
Organization for the Advancement of Structured Information Standards (OASIS)
Orphan Block
OTC Desk
Over-Collateralization
Over-Optimization
Over-the-Counter (OTC)
Over-the-Counter (OTC) Trading
Overbought
Oversold
P
P2P Bridge
P2P DEX
Pair
Paper Wallet
Parachain
Parachain Slot
Parachain Slot Auction
Parallel Augur
Parent Chain
Participation Node
Passive Income
Passive Yield
Passphrase
Password Manager
Path Payment
Pattern (Technical Formation)
Pattern Day Trading
Paul La Roux
Pay-to-Public-Key (P2PK)
Pay-to-Public-Key-Hash (P2PKH)
Pay-to-Script-Hash (P2SH)
Pay-to-Witness-Public-Key-Hash (P2WPKH)
Pay-to-Witness-Script-Hash (P2WSH)
PayJoin (P2EP)
Payment Rail
Peer to Peer (P2P)
Peer-to-Peer (P2P) Lending
Peer-to-Peer (P2P) Marketplace
Peer-to-Peer (P2P) Trading
Peg
Peg-Zone
Pegged Currency
Pegged-to-Market Order
Penalty Transaction
Pension (Individual Retirement Plan)
Permaweb
Permissioned Ledger
Permissioned Ledger (Permissioned Blockchain)
Permissionless Innovation
Permissionless Ledger (Permissionless Blockchain)
Perpetual Swap
PFP
Phishing
Phone Phishing
Physical Bitcoins
Plaintext
Plasma
Plasma Chain
Platform
Platform as a Service (PaaS)
Play To Earn
Player Payout
Plutus (Cardano)
Point of Sale (POS)
Point Time Locked Contract (PTLC)
Politeia (Decred)
Polkadot Relay Chain
Ponzi Scheme
PoolTogether
Portfolio
Portfolio Manager
Portfolio Tracking
Position Management System (PMS)
Position Trading
Post-Mine
Post-Quantum Cryptography
Post-Trade
Practical Byzantine Fault Tolerance (pBFT)
Pre-ICO
Pre-IDO
Pre-Mine
Pre-Mining
Pre-Sale
Prediction Market
Predictive Algorithm
Preimage
Pretexting
Pretty Good Privacy (PGP) Key
Price Discovery
Price Impact
Price Movement (Price Action)
Price-to-Earnings Ratio (P/E Ratio)
Primary Market
Prime Rate
Private Key
Procedural Programming
Proof of Attendance Protocol
Proof of Authority (POA)
Proof of Burn (PoB)
Proof of Reserves (PoR)
Proof of Service (PoSe)
Proof of Stake (PoS)
Proof of Storage (PoStorage)
Proof of Validation (PoV)
Proof of Work (PoW)
Proof-of-Developer (PoD)
Proof-of-Donation
Proof-of-History (PoH)
Proof-of-Immutability (PoIM)
Proof-of-Replication
Proof-of-Spacetime (PoSt)
Protocol
Protocol Layer
Pseudonym
Public Address
Public Blockchain?
Public Key/Address
Public Sale
Public-Key Cryptography (PKC)
Public-Key Infrastructure
Pump and Dump (P&D) Scheme
Pure Proof of Stake (PPoS)
Put Option
Pyramid Scheme
Q
Qualitative Analysis
Quant Zone (FTX Exchange)
Quantitative Analysis
Quantum Bit (Qubit)
Quantum Computing
Quasar Smart Contract (OMG Foundation)
Query
Quick Response Code (QR Code)
Quorum (Governance)
Quorum Blockchain (ConsenSys)
R
Radio Frequency Identification (RFID)
Rage-quit
Raiden Network
Random-Access Memory (RAM)
Ransomware
RaptorQ
Ravencoin
Rebalancing
Rebase
Recovery Seed
Redeem Script
Redundancy
Regenerative Finance (ReFi)
Regens
Regtest
Regulatory Compliance
Rehypothecation
REKT
Relative Strength Index (RSI)
Relay Chain
Relay Nodes
Renewable Energy
Repair Miners
Replace-By-Fee (RBF)
Replay Attack
Replicated Ledger
Request-for-Quote (RFQ)
Resistance
Retargeting
Return on Investment (ROI)
Revenue Participation Tokens
Reverse ICO
Reverse Indicator
Ring CT (Confidential Transactions)
Ring Miners
Ring Signature
Rivest–Shamir–Adleman algorithm (RSA)
Roadmap
Roger Ver
ROI
Roth IRA
Round Amounts Heuristic
Ruby (Programming Language)
Rug Pull
Rust
Ryuk Ransomware
S
S&P 500 (Standard and Poor’s 500)
S&P Global Ratings
Safety Module (Aave)
Sandbox (Security)
Satellite (Storj)
Satoshi
Satoshi Nakamoto
Scalability
Scaling Problem
Scaling Solution
Scam
Scamcoin
Scarcity
Scareware
Schelling Point (Focal Point)
Schnorr Signature
Schnorr-Signed ElGamal Encryption
Screen-Locking Ransomware
Script
Script Type Heuristic
Scripting Programming Language
ScriptPubKey
ScriptSig
Scrypt
SEC Format
Second-Layer Solutions
Secondary Market
Secp256k1
Secure Asset Fund for Users (SAFU)
Secure Element
Secure Hash Algorithm (SHA)
Secure Multi-Party Computation (SMPC)
Secure Proof of Stake (SPoS)
Secure Sockets Layer (SSL) & Transport Layer Security (TLS) Certificates
Securities and Exchange Commission (SEC)
Securitization
Security (Financial Asset)
Security (Network)
Security Token
Security Token Offering (STO)
Seed Funding
Seed Phrase
Seeding
Segregated Witness (SegWit)
Self-Regulatory Organization (SRO)
Self-Sovereign Identity (SSI)
Selfish Mining
Sell Wall
Sell-Off
Semantic Web
Semantics
Separate Account
Sequencer
Serenity
Series B Funding
Service Chain
Service Layer
Settlement
Settlement Agent Node
Settlement Layer
SHA-256
Shamir Secret Sharing (SSS) Cryptography
Shard Chain
Sharding
Sharetip
Sharing Economy
Sharpe Ratio
Shelley Phase
Shielded Address
Shielded Transaction
SHO (Strong Holder Offering)
Short Message Service (SMS)
Short Squeeze
Shorting
Side Channel Attack
Sidechain
Signature
Signature-Based Security Program
Signet
Silk Road
SIM Swap Attack
SIM-Swap
Simple Agreement for Future Token (SAFT)
Simplified Payment Verification (SPV)
Slashing
Slippage
Small and Medium Enterprises (SMEs)
Small Cap
Smart Contract
Smart Contract Audit
Smart Contract Intermediate-Level Language
Smart Home
Smart Order Router (SOR)
Smart Token
Smishing
Snapshot
Social Engineering
Social Impact Fund
Social Token
Soft Cap
Soft Fork
Soft Peg
Software as a Service (SaaS)
Software Development Kit (SDK)
Software Stack
Software Wallet
Solid-State Drive (SSD)
Solidity
Solidity Programming Language
Solo Mining
Solvency
Source Code
Source-Code Fork
Spartacus Attack
SPDR S&P 500 ETF (SPY ETF)
Spear Phishing
Speculative Investment
Spot Market
Spot Price
Spot Trading
SPV Chain Simulation Technology
Spyware
Stablecoin
Stagflation
Staking Derivative
Staking Pool
Stale Block
Stalling Delay
Standard Deviation
Startup
State
State Channel
State Machine Replication (SMR)
Stochastic Oscillator
Stock Keeping Unit (SKU)
Stock-to-Flow (S2F)
Stop-Loss Order
Storage (Decentralized)
Storage Miner
Storage Miners
Storage Node
Store of Value
Store of Value (SOV)
STRIDE
Strike Price
Stroop
Subgraph
Subgraph Manifest
Substrate
Supercomputer
Supply and Demand
Support
Swap
Swarm
Swing Failure Pattern (SFP)
Swing Trader
Swing Trading
Sybil Attack
Symmetric Encryption
Syntax
Synthetic Asset
T
T-Address (Zcash)
Tailgating (or Piggybacking)
Taint
Taker
Tamper-Proof
Tamper-Proof Ledger
Tangible Asset
Tangle (IOTA)
Tank
Taproot
Tapscript
Taro
Taro Asset Universe
tBTC
Technical Analysis/Trend Analysis (TA)
Technical Indicators
Technical Resistance Level
Technical Support Level
Telegram
Tendermint Core Byzantine Fault Tolerance (BFT)
Terahashes Per Second
Terraswap
Testnet
Text-Based User Interface (TUI)
The Cantillon Effect
The DAO
The Gold Standard
The Merge (Ethereum 2.0)
Theta Token Minter
Think Long Term (TLT)
Third-Party Storage
This Is Gentlemen
Threshold Relay
Threshold Signature
Throughput
Tick Size
Ticker
Ticker Symbol
Ticket Price
Ticket-Splitting
Tickets
Time-Based One-Time Password Algorithm (TOTP)
Time-Weighted Automated Market Maker (TWAMM)
Time-weighted Average Price (TWAP)
Timelock / Locktime
TimeLock Key
Timestamp
Timing-Based Evasion
Tipset
Token
Token Basket
Token Economy
Token Generation Event (TGE)
Token Issuance
Token Lockup
Token Migration
Token Sale
Token Standard
Token Supply
Token Swap
Tokenization
Tokenization Standard
Tokenization Value Chain
Tokenize
Tokenized Carbon Credits
Tokenized Representation
Tokenized Securities
Tokenized Stocks
Tokenomics
TokenSets (Set Protocol)
Tokyo Stock Exchange (TSE)
Toll Bridge
ToolChain
Tor
Tor Browser
Torrent
Total Exchange Volume
Total Market Capitalization
Total Supply
Total Value Locked (TVL)
Traceability
Tracking Cookie
Trade Execution Coordinator (TEC)
Trading Bot
Trading Tournament
Trading Volume
TradingView
Traditional Finance (TradFi)
Traditional Value Chain
Tranche
Transaction (TX)
Transaction Cost Analysis (TCA)
Transaction Fee
Transaction ID (TXID)
Transaction Settlement Time
Transactions Per Minute (TPM)
Transactions Per Second (TPS)
Transcoder
Transmission Control Protocol/Internet Protocol (TCP/IP)
Transmuter
Trapdoor Function
TRC-10
TRC-20 Token
Treasury Bills (T-Bills)
Treasury Bond (T-Bond)
Trend
Trend Line
Triangle
Tribute to Talk
Trojan
Trojan Bankers
Trojan Downloader
Trojan-Ransom Malware
TRON Virtual Machine (TVM)
TRONZ
Troy Ounce
Truffle
Truffle (Ethereum Development Framework)
Trust Company
Trusted Execution Environment (TEE)
Trustless
Tumbler
Tumbler (Crypto Tumbler)
Turing Complete
Turnkey Solution
Two-Factor Authentication (2FA)
Two-Way Peg (2WP)
Type Checking
TypeScript Programming Language
Typosquatting
U
U.S. Financial Crimes Enforcement Network (FinCEN)
UMA Improvement Proposal (UMIP)
Unallocated Gold
Unbanked
Uncle Block
Uncle Block (Ommer Block)
Unconfirmed Transaction
Underbanked
Uniswap (UNI)
Unit of Account
United States House Committee on Financial Services
Universal Market Access (UMA)
Unpermissioned Ledger
Unrealized Profit & Loss
Unregulated
Unspent Transaction Output (UTXO)
Unstoppable Domains
US Office of Foreign Assets Control (OFAC)
User Experience (UX)
User Interface (UI)
UTC Time
Utility Token
V
Validator
Validator node
Value Investing
Vanity Address
Vaporware
Vault (Reserve Protocol)
VeChain Improvement Proposal (VIP)
Venture Capital (VC)
Venus Smart Contract Controller
Verifiable Delay Function (VDF)
Verification Code
Vertical Scalability
Vesting Period
VeThor (VTHO)
Video Transcoding
Virtual Automated Market Makers (vAMMs)
Virtual Commodity Association (VCA)
Virtual Machine (VM)
Virtual Private Network (VPN)
Virtual Reality (VR)
Virus
Vishing
Vitalik Buterin
Voice (EOSIO Blockchain)
Voice Over Internet Protocol (VOIP)
Volatility
Volume
Volume Weighted Average Price (VWAP)
vTokens (Venus)
Vulnerability Rewards Program (VRP)
W
WabiSabi
Wallet
WalletConnect
Wallstreetbets (WSB)
WannaCry Ransomware
Wash Trading
Watchdog Organization
Watcher (OMG Foundation)
Watchlist
Waves NG
Weak Hands
Web 1.0 (Web1)
Web 2.0 (Web2)
Web 3.0 (Web3)
Web Application
Web Application Firewall (WAF)
Web of Trust (Status)
Web Wallet
Web3 Foundation
WebAssembly (WASM)
WebAuthn
WebSocket
Wedge
Wei
WeNano App (Nano)
Whale
When Lambo
When Moon
White Hat Computer Hacker
Whitelabel Product
Whitelist
Whitepaper
Winding Down
Winding Up
Window Proof of Spacetime (WindowPoSpacetime)
Withdrawal (Cryptocurrency Transaction)
Withdrawal Allowlists
World of Women
World Wide Web Consortium (W3C)
Worldwide Asset eXchange (WAX)
Wrapping
X
X16R (Hashing Algorithm)
x86 Virtual Machine (Qtum)
XBT (Alternative Bitcoin Ticker)
XEM (NEM Blockchain)
XYM (Symbol Blockchain)
Y
Year to Date (YTD)
Yearn Improvement Proposal (YIP)
Yearn.Finance
Yellow Paper
YFI Token
Yield Curve
Yield Farming
Yield Sensitivity
yTokens
yVaults
Z
Z-Address (Zcash)
Zcash (ZEC)
Zerion
Zero Confirmation Transaction
Zero Knowledge Proof
Zero-Knowledge Rollup (zk-Rollup)
Zero-Knowledge Scalable Transparent Argument of Knowledge (zk-STARK)
Zk-SNARKs