Skip to main content

Search...

Popular searches

Crypto & Hardware Wallet Glossary

280+ terms explained — from seed phrases to secure elements. Understand the technology behind your hardware wallet.

281 Terms

Key Terms to Know

2 terms
18 terms

Account Abstraction

Account Abstraction lets smart contracts control accounts, enabling flexible transaction rules and gas payment options beyond standard wallets.

Address Poisoning

Address poisoning is a scam where attackers create lookalike addresses to trick users into sending funds to the wrong address, often mimicking a legitimate one.

Address Reuse

Address reuse happens when a user sends multiple transactions to the same cryptocurrency wallet address. This compromises privacy by linking transactions and revealing total balances on the blockchain.

Address Verification

Address Verification confirms the receiving address shown on a hardware wallet's screen matches the one on the computer or app, preventing malware from altering it.

Air-Gapped Wallet

An air-gapped wallet is a cryptocurrency wallet that remains completely offline, disconnected from the internet, to prevent exposure to online threats and attacks.

Airdrop

An airdrop is a free distribution of cryptocurrency tokens to numerous wallet addresses, often to promote a project, reward users, or build community.

Altcoin

An altcoin is any cryptocurrency other than Bitcoin.

AML

AML (Anti-Money Laundering) refers to regulations and practices designed to prevent illegal activities, such as money laundering, in cryptocurrency and blockchain transactions.

AML Compliance

AML Compliance refers to cryptocurrency businesses' adherence to anti-money laundering regulations, including user identity verification (KYC) and transaction monitoring to prevent illicit fund flows.

AMM

An AMM (Automated Market Maker) is a decentralized protocol that allows users to trade assets without a central order book, using liquidity pools to facilitate transactions.

Anti-Klepto Protocol

Anti-Klepto Protocol is a blockchain security mechanism that prevents unauthorized data exfiltration by verifying nonces to ensure transaction authenticity and integrity.

See wallets

App Isolation

App Isolation confines each cryptocurrency app on a hardware wallet to its own secure environment, preventing vulnerabilities in one app from affecting others.

APR

APR (Annual Percentage Rate) measures the simple annualized return on cryptocurrency investments, such as staking or lending in DeFi, without compounding.

APY

APY stands for Annual Percentage Yield. It measures the annualized return on crypto investments like staking or lending, accounting for compounding interest.

Arbitrum

Arbitrum is an Ethereum layer 2 scaling solution using optimistic rollups for faster, cheaper transactions while inheriting Ethereum's security.

ATH

ATH stands for All-Time High, the highest price a cryptocurrency or token has ever reached in its trading history.

Auto-Wipe

Auto-Wipe is a security feature that automatically erases a device's data after a set number of failed login attempts, protecting sensitive information in cryptocurrency hardware wallets.

Avalanche

Avalanche (AVAX) is a scalable layer-1 blockchain platform that achieves high throughput and sub-second transaction finality using its novel proof-of-stake consensus.

30 terms

Backup

A backup in cryptocurrency is a secure copy of a wallet's seed phrase or private keys. It enables recovery of funds if the original wallet is lost or damaged.

Base

Base is an Ethereum Layer 2 network developed by Coinbase. It uses optimistic rollups for scalable, low-cost transactions.

Base Fee

The Base Fee is Ethereum's dynamic minimum fee per gas unit, introduced by EIP-1559. It adjusts with network demand and burns to reduce ETH supply.

Batching

Batching is the process of combining multiple cryptocurrency transactions into one to reduce fees and improve network efficiency.

Battery-Powered Wallet

A battery-powered wallet is a cryptocurrency hardware wallet that uses a rechargeable battery for wireless operation, allowing secure storage and management of private keys without constant power sources.

Bear Market

A bear market is a prolonged period of declining cryptocurrency prices, typically 20% or more from recent highs, driven by pessimism and selling pressure.

BIP32

BIP32 is a Bitcoin Improvement Proposal defining a standard for hierarchical deterministic (HD) wallets, allowing the generation of a tree of keys from a single seed phrase.

BIP39

BIP39 is a standard for generating mnemonic seed phrases that are used to create deterministic wallets and securely back up cryptocurrency private keys.

See wallets

BIP44

BIP44 is a standard for deriving cryptocurrency wallet keys using a hierarchical structure, allowing for multiple accounts and addresses within a single wallet.

BIP85

BIP85 is a Bitcoin Improvement Proposal for generating child seeds from a master seed, providing deterministic entropy for use in secure key derivation and backup processes.

See wallets

BitBox

BitBox is a hardware wallet brand by Shift Crypto, including the BitBox02 model, for securely storing cryptocurrency private keys offline.

Bitcoin

Bitcoin (BTC) is the first decentralized cryptocurrency, launched in 2009. It uses blockchain technology for secure, peer-to-peer digital transactions without intermediaries.

Bitcoin ETF

A Bitcoin ETF is a financial product that allows investors to buy shares representing Bitcoin without directly owning the cryptocurrency, traded on traditional stock exchanges.

Bitcoin Ordinals

Bitcoin Ordinals are unique digital inscriptions on individual satoshis, enabling NFT-like assets directly on the Bitcoin blockchain.

Bitcoin Runes

Bitcoin Runes are tokens created on Bitcoin using the Runes protocol, enabling fungible and collectible assets directly on the Bitcoin network.

Bitcoin-Only Wallet

A Bitcoin-only wallet is a cryptocurrency wallet that supports only Bitcoin (BTC), excluding other cryptocurrencies like Ethereum or altcoins.

Blind Signing

Blind signing is the process of signing a transaction without viewing its contents, typically used in hardware wallets for enhanced security.

Blob

A blob is a large binary data object used in Ethereum upgrades like EIP-4844 to store transaction data off-chain for efficiency.

Block Confirmation

A block confirmation is the process of verifying a new block in the blockchain network, confirming its validity and preventing double-spending or fraud.

Block Height

Block height refers to the number of blocks in a blockchain, starting from the first block (genesis block). It is also known as the block number and indicates the position of a block in the chain.

Block Time

Block time is the average time it takes for a new block to be added to a blockchain, typically measured in seconds or minutes. It determines the speed of block generation.

Bluetooth Connectivity

Bluetooth Connectivity enables wireless communication between devices, like hardware wallets and smartphones, using Bluetooth or Bluetooth Low Energy (BLE) for secure data transfer.

See wallets

BlueWallet

BlueWallet is a mobile Bitcoin wallet that allows users to securely store, send, and receive Bitcoin. It offers features like Lightning Network support and multi-sig capabilities.

BNB Chain

BNB Chain is a high-performance blockchain network developed by Binance, formerly Binance Smart Chain (BSC). It supports smart contracts, DeFi, and uses BNB as its native token.

Bootloader

A bootloader is a small program that initializes hardware and loads the main operating system or firmware on a device, often used in blockchain hardware wallets for secure startup.

BRC-20

BRC-20 is a token standard on Bitcoin, enabling the creation and transfer of fungible tokens using the Ordinals protocol, allowing tokenization on the Bitcoin blockchain.

Bridge

A bridge in blockchain allows assets or data to move between different blockchains, enabling interoperability between otherwise separate networks.

Browser Extension Wallet

A browser extension wallet is a software wallet that runs as a browser plugin, like MetaMask, allowing users to manage crypto assets and interact with dApps directly in the browser.

Brute Force Attack

A brute force attack systematically tries every possible combination to guess a private key or password. In cryptocurrency, it targets wallets but fails against strong keys due to immense computational demands.

Bull Market

A bull market is a period of rising cryptocurrency prices driven by optimism, high demand, and increasing investor confidence.

Ready to Apply What You've Learned?

Use your knowledge to find the right hardware wallet for your needs.

24 terms

Cardano

Cardano is a proof-of-stake blockchain platform that prioritizes research-driven development, scalability, and sustainability. Its native cryptocurrency is ADA.

Change Address

A change address is a new address where leftover cryptocurrency is sent after a transaction, ensuring any unspent funds are returned to the sender in blockchain transactions.

Clear Signing

Clear Signing is a process in blockchain where transaction data is displayed in human-readable form before being signed, ensuring transparency and preventing blind signing risks.

See wallets

Clipboard Hijacking

Clipboard hijacking is a malware attack that monitors the clipboard and swaps a user's copied cryptocurrency wallet address with the attacker's address, diverting funds.

Coin Control

Coin Control is a feature that allows users to manually select which unspent transaction outputs (UTXOs) to use in a transaction, giving more control over privacy and fees.

See wallets

CoinJoin

CoinJoin is a privacy technique in cryptocurrency where multiple users combine their transactions, making it harder to trace individual senders and receivers.

See wallets

Cold Staking

Cold staking lets users earn staking rewards on proof-of-stake cryptocurrencies while keeping private keys offline, often via hardware wallets, for enhanced security.

Cold Storage

Cold storage refers to keeping cryptocurrency private keys offline, away from the internet, to protect them from hacks or unauthorized access.

See wallets

Cold Wallet

A Cold Wallet is a cryptocurrency wallet that stores private keys offline, providing enhanced security by being disconnected from the internet.

Coldcard

Coldcard is an air-gapped hardware wallet for Bitcoin, made by Coinkite, that stores private keys offline and signs transactions without internet exposure.

Companion App

A companion app is a software application used to manage and interact with cryptocurrency wallets or blockchain networks, typically offering features like transactions and security controls.

Consensus Mechanism

A consensus mechanism is a protocol that enables blockchain networks to agree on valid transactions and the ledger's state without a central authority.

Cosigner

A cosigner is one of multiple parties in a multisig wallet who signs transactions with their private key. All required cosigners must approve before the transaction executes.

Cosmos

Cosmos is a blockchain ecosystem enabling interoperable chains via the Cosmos SDK and IBC protocol. The Cosmos Hub serves as its central chain with the ATOM token.

Crypto Custody

Crypto custody is the secure storage and management of cryptocurrency private keys, often provided by specialized custodial services.

Crypto Debit Card

A Crypto Debit Card allows users to spend cryptocurrency directly at merchants that accept traditional debit cards, converting crypto into local currency in real-time.

Crypto Insurance

Crypto insurance protects cryptocurrency holdings from risks like theft, hacks, and loss through specialized policies offered by insurers.

Crypto Scam

A Crypto Scam is a fraudulent scheme that tricks people into sending cryptocurrency or sharing private keys for financial gain.

Crypto Security

Crypto Security refers to practices, tools, and protocols that protect cryptocurrencies, private keys, wallets, and blockchain networks from theft, hacks, and unauthorized access.

Crypto Storage

Crypto Storage refers to secure methods for holding cryptocurrencies, such as wallets and hardware devices that protect private keys from unauthorized access.

Crypto Tax

Crypto Tax is the tax on cryptocurrency transactions, including gains, income, or trades of digital assets, as required by law.

Crypto Wallet

A crypto wallet stores private keys for cryptocurrencies. It lets users send, receive, and manage digital assets on the blockchain.

Cryptocurrency

Cryptocurrency is a digital or virtual currency secured by cryptography, operating on decentralized blockchain networks to enable secure, peer-to-peer transactions.

Custodial Wallet

A custodial wallet is a cryptocurrency wallet where a third party manages the private keys, typically provided by exchanges or other platforms.

14 terms

DAO

A DAO (Decentralized Autonomous Organization) is a blockchain-based entity governed by smart contracts and token holder votes, enabling decentralized decision-making without central authority.

Data Availability

Data Availability in blockchain ensures that transaction and block data are accessible to all network participants, enabling verification and consensus.

DCA

DCA (Dollar Cost Averaging) is an investment strategy where a fixed amount of cryptocurrency is purchased at regular intervals, regardless of market price fluctuations.

Decentralization

Decentralization spreads control and data across many independent nodes in a blockchain network, eliminating reliance on a single authority.

DeFi

DeFi (Decentralized Finance) refers to a set of financial services, such as lending and trading, built on blockchain technology without traditional intermediaries like banks.

DePIN

DePIN refers to decentralized physical infrastructure networks, where blockchain technology powers and incentivizes the ownership and operation of physical assets or infrastructure.

Derivation Path

A derivation path is a string of indices (e.g., m/44'/0'/0'/0) that specifies how to derive specific keys and addresses from a hierarchical deterministic (HD) wallet's master seed.

Desktop Wallet

A desktop wallet is software installed on a personal computer that stores private keys and manages cryptocurrency transactions.

Digital Signature

A digital signature is a cryptographic method that uses a private key to sign blockchain transactions, verifiable with the public key to prove authenticity and prevent tampering.

Dogecoin

Dogecoin (DOGE) is a cryptocurrency launched in 2013 as a joke based on the Doge meme. It uses proof-of-work on a Litecoin fork with unlimited supply.

Downgrade Protection

Downgrade protection prevents blockchain nodes from accepting blocks from older protocol versions, blocking rollbacks to vulnerable states via version checks.

Duress PIN

A Duress PIN is a special code used in cryptocurrency hardware wallets to trigger a response, such as wiping the device, in case of coercion or threat.

See wallets

Dust Attack

A dust attack sends tiny cryptocurrency amounts (dust) to many wallet addresses to track spending patterns and de-anonymize users on the blockchain.

DYOR

DYOR stands for 'Do Your Own Research.' In cryptocurrency, it urges investors to independently verify projects and information rather than relying on others' advice.

12 terms

E-Ink Display

An E-Ink display is a low-power screen technology used in hardware wallets, offering clear, easy-to-read information with minimal energy consumption.

EAL Certification

EAL Certification (Evaluation Assurance Level) from Common Criteria rates the security of hardware components, like secure chips in crypto hardware wallets. Higher levels, such as EAL5+ or EAL6+, indicate stronger resistance to attacks.

See wallets

Electrum

Electrum is a lightweight Bitcoin wallet that allows users to store, send, and receive Bitcoin securely. It is known for its speed and low resource usage.

Elliptic Curve

An elliptic curve is a mathematical curve used in elliptic curve cryptography (ECC) for generating secure public-private key pairs in blockchains, like secp256k1 in Bitcoin.

See wallets

Encrypted Communication

Encrypted communication in cryptocurrency and blockchain secures data transmission between wallets, nodes, or users using encryption techniques like end-to-end encryption, preventing unauthorized access.

See wallets

ENS

ENS (Ethereum Name Service) is a decentralized domain name system on the Ethereum blockchain, allowing users to register human-readable .eth domain names for wallet addresses and more.

Entropy

Entropy is the randomness used to generate secure cryptographic keys or seeds in blockchain and cryptocurrency systems.

ERC-20 Token

ERC-20 Token is a fungible token standard on the Ethereum blockchain. It defines rules for creating, transferring, and managing tokens uniformly.

Ethereum

Ethereum is a decentralized blockchain platform that enables smart contracts and decentralized applications (dApps). Its native cryptocurrency is Ether (ETH).

Ethereum ETF

An Ethereum ETF is a financial product that allows investors to gain exposure to Ethereum (ETH) without directly owning it, by trading it on traditional stock exchanges.

Evil Maid Attack

An evil maid attack is a physical security threat where an attacker gains temporary unsupervised access to a hardware wallet to tamper with it, install malicious firmware, or extract private keys.

See wallets

External Signer

An external signer is a hardware wallet or remote device that signs cryptocurrency transactions securely, keeping private keys isolated from the connected software wallet.

11 terms

FATF

The FATF (Financial Action Task Force) is an international body that sets standards for combating money laundering and terrorist financing, including in the cryptocurrency sector.

Fiat

Fiat is government-issued currency, like the US dollar or euro, not backed by a physical commodity. It derives value from official decree and contrasts with decentralized cryptocurrencies.

Firmware Attestation

Firmware Attestation is the process of verifying the authenticity of a device's firmware to ensure it has not been tampered with, commonly used in hardware wallets for security.

See wallets

Firmware Trust Model

Firmware Trust Model describes the trust level users place in a hardware wallet's firmware, from fully relying on the vendor (vendor-only trust) to independently verifying it (user verification).

Firmware Update

Firmware Update installs new low-level software on a hardware wallet to fix bugs, enhance security, or add features in cryptocurrency devices.

Flash Loan Attack

A flash loan attack exploits uncollateralized flash loans in DeFi to manipulate prices or drain funds within a single blockchain transaction that must repay the loan or revert.

FOMO

FOMO (Fear Of Missing Out) is the anxiety that prompts crypto investors to buy assets impulsively during rapid price rises, fearing they will miss profits.

Fork

A fork is a blockchain split into two chains due to protocol changes or disagreements. Hard forks create permanent divergences; soft forks are backward-compatible.

Foundation

Foundation refers to the Passport, a Bitcoin-only hardware wallet by Foundation Devices that securely stores private keys offline for self-custody.

FUD

FUD stands for Fear, Uncertainty, and Doubt. In cryptocurrency, it describes negative rumors or misinformation spread to create panic and drive down prices.

Full Node

A Full Node is a computer that stores the entire blockchain and verifies all transactions, ensuring network security and consistency in cryptocurrency systems like Bitcoin.

See wallets
5 terms
8 terms
8 terms
1 terms
4 terms
8 terms
19 terms

Mainnet

Mainnet is the primary blockchain network where actual transactions occur, as opposed to testnets. It represents the live, functioning version of a blockchain.

Man-in-the-Middle Attack

A Man-in-the-Middle (MITM) attack occurs when an attacker secretly intercepts and alters communication between a user and a blockchain service, such as changing wallet addresses during transactions.

Market Cap

Market cap, or market capitalization, measures a cryptocurrency's total value. Calculate it by multiplying the current price by the circulating supply.

Meme Coin

A meme coin is a cryptocurrency inspired by internet memes, driven by social media hype and community enthusiasm rather than technical utility. Examples include Dogecoin (DOGE) and Shiba Inu (SHIB).

Mempool

Mempool, short for memory pool, is a node's temporary storage for unconfirmed cryptocurrency transactions awaiting validation and inclusion in a blockchain block.

Merkle Tree

A Merkle Tree is a binary tree structure used in blockchain to efficiently verify data integrity, where each leaf node is a hash of data and non-leaf nodes are hashes of child nodes.

Metal Backup

A metal backup is a durable metal plate or device engraved with a cryptocurrency wallet's seed phrase, providing fireproof and waterproof protection for offline key storage.

MEV

MEV (Maximal Extractable Value) is the profit block producers extract by reordering, including, or excluding transactions in a block, often via front-running.

MiCA

MiCA (Markets in Crypto-Assets) is the European Union's regulatory framework for crypto-assets, stablecoins, and related services to protect consumers and ensure market stability.

MicroSD Card Backup

A MicroSD Card Backup is an encrypted backup of a hardware wallet's private keys stored on a MicroSD card, providing a portable and secure way to restore wallet data.

Mining

Mining uses computational power to solve puzzles, validate transactions, and add blocks to a blockchain. Miners earn cryptocurrency rewards for securing the network.

Miniscript

Miniscript is a structured policy language for Bitcoin Script. It simplifies writing, analyzing, and compiling complex spending conditions.

Mnemonic Phrase

A mnemonic phrase is a set of words that stores a cryptocurrency wallet's private keys, allowing users to recover access if lost.

Mobile Wallet

A mobile wallet is a software application on smartphones that stores private keys and enables users to send, receive, and manage cryptocurrencies.

Modular Blockchain

A modular blockchain is a blockchain architecture that separates different functions (e.g., consensus, execution, storage) into distinct layers for greater flexibility and scalability.

Monero

Monero (XMR) is a privacy-focused cryptocurrency that uses ring signatures, stealth addresses, and RingCT to obscure sender, receiver, and transaction amounts on the blockchain.

MPC Wallet

An MPC Wallet uses Multi-Party Computation to split private keys across multiple parties or devices, so no single entity holds the full key, boosting security.

Multi-Currency Wallet

A multi-currency wallet stores multiple cryptocurrencies in one place, allowing users to manage different assets within a single interface.

Multisig

Multisig (multi-signature) is a security feature that requires multiple private keys to authorize a transaction, enhancing protection against unauthorized access in blockchain networks.

See wallets
7 terms
10 terms

Offline Signing

Offline Signing refers to signing cryptocurrency transactions on a device that is not connected to the internet, ensuring private keys remain secure from online threats.

See wallets

On-Chain Analytics

On-Chain Analytics examines data directly from the blockchain, like transactions and wallet balances, to reveal insights into user behavior and network activity.

Open Source Firmware

Open Source Firmware refers to firmware in hardware devices, like wallets, where the source code is publicly available, allowing transparency, auditability, and customization.

See wallets

Operational Security

Operational Security (OpSec) refers to practices that protect sensitive information in cryptocurrency and blockchain activities, minimizing risks of hacking or theft through careful management of data.

Optimism

Optimism is an Ethereum Layer 2 optimistic rollup network. It batches transactions off-chain for faster, cheaper processing while inheriting Ethereum's security.

Options Protocol

An Options Protocol is a DeFi platform on blockchain that enables trading of options contracts, like calls and puts, on-chain.

Oracle

An oracle provides external real-world data, such as price feeds, to smart contracts on a blockchain, bridging on-chain and off-chain worlds.

Orphan Block

An orphan block is a valid block that is not part of the main blockchain due to a chain split, often becoming stale as another block becomes the accepted version.

OTA Update

OTA Update, or Over-The-Air Update, enables hardware wallets to receive firmware updates wirelessly via Bluetooth or internet, without cables.

Output Descriptors

Output descriptors (BIP 380) concisely describe Bitcoin wallet output scripts and spending conditions without revealing private keys.

16 terms

Paper Wallet

A paper wallet is a physical document that contains a cryptocurrency's public and private keys, used for offline storage of funds.

Passkeys

Passkeys are a form of passwordless authentication using cryptographic keys for secure, phishing-resistant logins in blockchain and crypto applications.

Passphrase

A passphrase is an additional security layer for cryptocurrency wallets, acting as a 25th word in the BIP39 seed phrase, protecting access to hidden wallets.

See wallets

Paymaster

A paymaster is a blockchain entity that sponsors transaction fees, enabling users to execute transactions without paying gas fees directly, often used in gasless transactions.

Perpetual Futures

Perpetual futures are cryptocurrency derivative contracts without expiration dates. Traders use leverage to speculate on asset prices, with funding rates aligning the contract price to the spot market.

Phishing Attack

A phishing attack tricks crypto users into revealing private keys, seed phrases, or login details via fake emails, websites, or messages mimicking legitimate wallets or exchanges.

PIN Protection

PIN Protection is a security feature that requires a personal identification number (PIN) to access a cryptocurrency wallet or device, preventing unauthorized access.

Plausible Deniability

Plausible Deniability refers to the ability to deny knowledge or possession of cryptocurrency by using techniques like decoy wallets or hidden volumes, ensuring privacy under duress.

Polkadot

Polkadot is a multi-chain blockchain protocol that connects independent blockchains (parachains) to a central relay chain for interoperability and shared security. Its native token is DOT.

Polygon

Polygon is a layer-2 scaling solution for Ethereum that enables faster, cheaper transactions via its Proof-of-Stake sidechain. Native token: MATIC (also called Polygon PoS).

Priority Fee

Priority Fee is an optional tip users pay to miners or validators to prioritize their transaction for faster inclusion in the blockchain.

Proof of Reserves

Proof of Reserves (PoR) is a method for crypto platforms to verify they hold enough assets to cover user deposits.

Proof of Stake

Proof of Stake (PoS) is a blockchain consensus mechanism. Validators create new blocks based on staked cryptocurrency amounts, not computational power.

Proof of Work

Proof of Work (PoW) is a blockchain consensus mechanism where miners solve complex cryptographic puzzles to validate transactions, add new blocks, and earn rewards.

PSBT

PSBT (Partially Signed Bitcoin Transaction) is a Bitcoin transaction format that allows multiple parties to sign a transaction incrementally before finalizing it.

Public Key

A public key is a cryptographic key used to receive transactions in a blockchain. It is shared openly, while the corresponding private key remains confidential.

1 terms
13 terms

Random Number Generator

A Random Number Generator (RNG) produces unpredictable numbers essential for cryptographic security in blockchain, such as generating private keys and nonces.

Randomized Keypad

A Randomized Keypad is a security feature used in hardware wallets where the PIN layout is shuffled each time, preventing PIN theft via keylogging or visual observation.

See wallets

RBF

RBF (Replace-By-Fee) lets users replace an unconfirmed Bitcoin transaction with a new version that has higher fees to speed up confirmation.

Recovery

Recovery is the process of restoring access to a cryptocurrency wallet using its seed phrase or mnemonic backup if the original wallet is lost or inaccessible.

See wallets

Recovery Card

A Recovery Card is a physical card or sheet for backing up a cryptocurrency wallet's seed phrase, enabling recovery if the original wallet is lost or damaged.

See wallets

Remote Key Extraction

Remote Key Extraction is a vulnerability where attackers steal private keys from hardware wallets remotely via exploits, without physical access.

Replay Attack

A replay attack occurs when an attacker captures a valid blockchain transaction and rebroadcasts it to execute multiple times, often exploiting chain forks for double-spending.

Reproducible Builds

Reproducible Builds refer to the process where the same source code consistently produces identical binary outputs, ensuring verifiable and trustworthy software in blockchain and crypto projects.

See wallets

Restaking

Restaking reuses staked assets, like ETH, to secure additional blockchain networks or protocols beyond the original chain, enabling shared security as in EigenLayer.

Ring Signature

A ring signature hides the true signer's identity by mixing their signature with those of other users in a group, boosting privacy in cryptocurrencies like Monero.

Rollup

A rollup is a layer 2 scaling solution that processes transactions off-chain while posting summary data on-chain to improve efficiency, with types including Optimistic and ZK rollups.

Rug Pull

A rug pull is a cryptocurrency scam where project developers hype a token or DeFi project, attract investors, then abruptly withdraw liquidity or dump holdings, crashing the price and fleeing with funds.

RWA

RWA (Real World Assets) are physical or financial assets represented on a blockchain as digital tokens for trading or investment.

29 terms

Sanctions Screening

Sanctions screening in cryptocurrency checks wallet addresses and transactions against lists like OFAC to ensure compliance with international sanctions and prevent dealings with prohibited entities.

Satoshi

A Satoshi is the smallest unit of Bitcoin, equal to 0.00000001 BTC. It is named after Bitcoin's creator, Satoshi Nakamoto.

Schnorr Signature

Schnorr Signature is an efficient digital signature scheme (BIP340) used in Bitcoin. It supports key aggregation, multisignatures, and reduces transaction size compared to ECDSA.

Secure Boot

Secure Boot is a security feature that ensures only trusted software runs on a device by verifying its integrity during startup, preventing unauthorized code execution in crypto systems.

See wallets

Securities Law

Securities Law regulates investments like stocks; in crypto, it determines if tokens qualify as securities via the Howey Test, requiring SEC compliance.

Security Audit

A security audit is an independent review of blockchain code or smart contracts by experts to identify vulnerabilities and ensure robustness.

See wallets

Seed Phrase Type

Seed Phrase Type refers to the format or method used to generate a cryptocurrency wallet's recovery phrase, such as BIP-39 or BIP-44.

Seed Splitting

Seed splitting divides a cryptocurrency wallet's seed phrase into multiple shares stored separately. Reconstructing the full seed requires combining all shares for enhanced security.

SegWit

SegWit (Segregated Witness) is a Bitcoin upgrade that moves transaction signatures to a separate data structure, increasing block capacity and enabling efficient scaling solutions like the Lightning Network.

Self-Custody

Self-custody means users control their own private keys to manage cryptocurrency assets directly, without third-party custodians. It embodies 'not your keys, not your coins.'

Self-Sovereign Identity

Self-Sovereign Identity (SSI) is a blockchain-based identity system where users control and share their personal data without relying on central authorities.

SHA-256

SHA-256 is a cryptographic hash function that produces a fixed 256-bit output from any input. In blockchain, Bitcoin uses it for proof-of-work mining, block hashing, and transaction IDs.

Shamir Secret Sharing

Shamir Secret Sharing (SSS) divides a secret, like a crypto wallet seed, into multiple shares. A threshold number of shares reconstructs it, enhancing security as in SLIP-39 backups.

See wallets

Side-Channel Attack

A side-channel attack in cryptocurrency and blockchain targets indirect information, like power usage or timing, to extract sensitive data from a system or device.

Sidechain

A sidechain is a separate blockchain connected to a main chain, allowing for faster transactions or experimentation without affecting the main chain's security.

Sim Swap Attack

A SIM swap attack tricks a mobile carrier into porting a victim's phone number to the attacker's SIM card, enabling them to intercept SMS 2FA codes and access cryptocurrency wallets or exchanges.

Slippage

Slippage is the difference between the expected price of a cryptocurrency trade and the actual executed price, caused by market volatility or low liquidity.

Smart Contract Wallet

A smart contract wallet is a blockchain wallet implemented as a smart contract, enabling features like account abstraction, gas sponsorship, and programmable security beyond traditional externally owned accounts.

Social Recovery

Social Recovery allows users to regain access to their crypto wallet through approvals from trusted guardians or contacts, bypassing traditional seed phrases.

See wallets

Software Wallet

A software wallet is a digital application that stores cryptocurrency private keys and enables transactions, typically on mobile or desktop devices.

Solana

Solana is a high-performance layer-1 blockchain platform that enables fast, low-cost transactions using Proof of History and Proof of Stake. Its native token is SOL.

Sparrow Wallet

Sparrow Wallet is a desktop Bitcoin wallet that focuses on security, privacy, and advanced features for managing Bitcoin transactions and keys.

Specter

Specter is a Bitcoin hardware wallet solution designed for advanced users, offering secure storage through a customizable, self-hosted setup with options like Specter Desktop and Specter DIY.

SPV

SPV (Simplified Payment Verification) is a method for lightweight clients to verify transactions without downloading the entire blockchain, relying on block headers instead.

Stablecoin

A stablecoin is a cryptocurrency designed to maintain a stable value, typically pegged to a fiat currency like the US dollar or backed by reserves.

Stealth Address

A stealth address is a one-time address generated for each transaction, enhancing privacy by concealing the recipient's actual address on the blockchain.

Supply Chain Attack

A supply chain attack targets vulnerabilities in the production or distribution process of crypto hardware or software, compromising devices or systems before they reach the user.

See wallets

Swap

In cryptocurrency, a swap is the direct exchange of one token for another on a blockchain, often via decentralized exchanges (DEXs) without intermediaries.

See wallets

Sybil Attack

A Sybil attack occurs when an attacker creates multiple fake identities or nodes to gain disproportionate control over a blockchain network, such as influencing consensus or voting.

19 terms

Tamper-Evident Design

Tamper-Evident Design refers to features on hardware devices that visibly show if they have been altered, ensuring the integrity and security of blockchain assets or data.

See wallets

Tangem

Tangem is a hardware wallet in the form of a physical card that stores cryptocurrency private keys securely and offline, allowing for easy and portable access to digital assets.

Taproot

Taproot (BIP 341) is a Bitcoin upgrade that introduces Schnorr signatures and Tapscript, enhancing privacy by making complex scripts look like simple payments and improving efficiency.

Telemetry

Telemetry in cryptocurrency and blockchain refers to the automatic collection and transmission of anonymous usage data, metrics, and error reports from wallets or nodes to improve software.

Testnet

A testnet is a blockchain network used for testing and development, where developers can experiment without using real cryptocurrency. Examples include Goerli and Sepolia.

Threshold Signature Scheme

A Threshold Signature Scheme (TSS) splits a private key among multiple parties, allowing them to jointly sign transactions without exposing the full key.

Token

A token is a digital asset on a blockchain that represents value, ownership, utility, or access rights. Examples include ERC-20 tokens on Ethereum.

Tor Support

Tor Support enables cryptocurrency wallets and services to route connections through the Tor network, masking IP addresses to enhance user privacy.

See wallets

Touchscreen Display

A touchscreen display is a screen that allows users to interact with a device by touching the surface, commonly used in hardware wallets for easy navigation and transaction confirmation.

See wallets

Transaction Fee

A transaction fee is a cost paid to process transactions on a blockchain network. It compensates miners or validators for confirming and adding transactions to the blockchain.

Transaction Verification

Transaction verification checks a cryptocurrency transaction's validity, confirming signatures, balances, and rules compliance before blockchain inclusion.

Travel Rule

The Travel Rule requires crypto service providers to share originator and beneficiary details for transactions above a threshold to combat money laundering, as mandated by the FATF.

Trezor

Trezor is a hardware wallet by SatoshiLabs. It stores private keys offline to secure cryptocurrencies.

Trezor Suite

Trezor Suite is a software interface for managing Trezor hardware wallets, allowing users to send, receive, and store cryptocurrencies securely.

TRNG

A TRNG (True Random Number Generator) generates cryptographically secure random numbers using physical processes, crucial for secure key generation in blockchain and cryptocurrency.

TRON

TRON is a blockchain platform and cryptocurrency (TRX) designed for high-throughput decentralized applications, especially in content sharing and entertainment.

Trusted Execution Environment

A Trusted Execution Environment (TEE) is a secure area in a processor that protects sensitive crypto operations and private keys from external access.

TVL

TVL (Total Value Locked) measures the total USD value of cryptocurrency assets deposited in a DeFi protocol's smart contracts.

Two-Factor Authentication

Two-Factor Authentication (2FA) secures cryptocurrency accounts and wallets by requiring two verification methods, such as a password plus a code from an authenticator app.

4 terms
3 terms
9 terms
2 terms
1 terms
3 terms

Still Exploring? Find Your Wallet

Use our Wallet Finder to match a device to your needs — based on verified specs, not opinions.