Crypto & Hardware Wallet Glossary
280+ terms explained — from seed phrases to secure elements. Understand the technology behind your hardware wallet.
Key Terms to Know
#
2 terms$5 Wrench Attack
A $5 Wrench Attack is when someone uses physical coercion to force a crypto holder to reveal their private keys or access their funds.
51% Attack
A 51% attack happens when an entity controls over 50% of a blockchain's mining power, allowing it to double-spend coins or censor transactions.
A
18 termsAccount Abstraction
Account Abstraction lets smart contracts control accounts, enabling flexible transaction rules and gas payment options beyond standard wallets.
Address Poisoning
Address poisoning is a scam where attackers create lookalike addresses to trick users into sending funds to the wrong address, often mimicking a legitimate one.
Address Reuse
Address reuse happens when a user sends multiple transactions to the same cryptocurrency wallet address. This compromises privacy by linking transactions and revealing total balances on the blockchain.
Address Verification
Address Verification confirms the receiving address shown on a hardware wallet's screen matches the one on the computer or app, preventing malware from altering it.
Air-Gapped Wallet
An air-gapped wallet is a cryptocurrency wallet that remains completely offline, disconnected from the internet, to prevent exposure to online threats and attacks.
Airdrop
An airdrop is a free distribution of cryptocurrency tokens to numerous wallet addresses, often to promote a project, reward users, or build community.
Altcoin
An altcoin is any cryptocurrency other than Bitcoin.
AML
AML (Anti-Money Laundering) refers to regulations and practices designed to prevent illegal activities, such as money laundering, in cryptocurrency and blockchain transactions.
AML Compliance
AML Compliance refers to cryptocurrency businesses' adherence to anti-money laundering regulations, including user identity verification (KYC) and transaction monitoring to prevent illicit fund flows.
AMM
An AMM (Automated Market Maker) is a decentralized protocol that allows users to trade assets without a central order book, using liquidity pools to facilitate transactions.
Anti-Klepto Protocol
Anti-Klepto Protocol is a blockchain security mechanism that prevents unauthorized data exfiltration by verifying nonces to ensure transaction authenticity and integrity.
App Isolation
App Isolation confines each cryptocurrency app on a hardware wallet to its own secure environment, preventing vulnerabilities in one app from affecting others.
APR
APR (Annual Percentage Rate) measures the simple annualized return on cryptocurrency investments, such as staking or lending in DeFi, without compounding.
APY
APY stands for Annual Percentage Yield. It measures the annualized return on crypto investments like staking or lending, accounting for compounding interest.
Arbitrum
Arbitrum is an Ethereum layer 2 scaling solution using optimistic rollups for faster, cheaper transactions while inheriting Ethereum's security.
ATH
ATH stands for All-Time High, the highest price a cryptocurrency or token has ever reached in its trading history.
Auto-Wipe
Auto-Wipe is a security feature that automatically erases a device's data after a set number of failed login attempts, protecting sensitive information in cryptocurrency hardware wallets.
Avalanche
Avalanche (AVAX) is a scalable layer-1 blockchain platform that achieves high throughput and sub-second transaction finality using its novel proof-of-stake consensus.
B
30 termsBackup
A backup in cryptocurrency is a secure copy of a wallet's seed phrase or private keys. It enables recovery of funds if the original wallet is lost or damaged.
Base
Base is an Ethereum Layer 2 network developed by Coinbase. It uses optimistic rollups for scalable, low-cost transactions.
Base Fee
The Base Fee is Ethereum's dynamic minimum fee per gas unit, introduced by EIP-1559. It adjusts with network demand and burns to reduce ETH supply.
Batching
Batching is the process of combining multiple cryptocurrency transactions into one to reduce fees and improve network efficiency.
Battery-Powered Wallet
A battery-powered wallet is a cryptocurrency hardware wallet that uses a rechargeable battery for wireless operation, allowing secure storage and management of private keys without constant power sources.
Bear Market
A bear market is a prolonged period of declining cryptocurrency prices, typically 20% or more from recent highs, driven by pessimism and selling pressure.
BIP32
BIP32 is a Bitcoin Improvement Proposal defining a standard for hierarchical deterministic (HD) wallets, allowing the generation of a tree of keys from a single seed phrase.
BIP39
BIP39 is a standard for generating mnemonic seed phrases that are used to create deterministic wallets and securely back up cryptocurrency private keys.
BIP44
BIP44 is a standard for deriving cryptocurrency wallet keys using a hierarchical structure, allowing for multiple accounts and addresses within a single wallet.
BIP85
BIP85 is a Bitcoin Improvement Proposal for generating child seeds from a master seed, providing deterministic entropy for use in secure key derivation and backup processes.
BitBox
BitBox is a hardware wallet brand by Shift Crypto, including the BitBox02 model, for securely storing cryptocurrency private keys offline.
Bitcoin
Bitcoin (BTC) is the first decentralized cryptocurrency, launched in 2009. It uses blockchain technology for secure, peer-to-peer digital transactions without intermediaries.
Bitcoin ETF
A Bitcoin ETF is a financial product that allows investors to buy shares representing Bitcoin without directly owning the cryptocurrency, traded on traditional stock exchanges.
Bitcoin Ordinals
Bitcoin Ordinals are unique digital inscriptions on individual satoshis, enabling NFT-like assets directly on the Bitcoin blockchain.
Bitcoin Runes
Bitcoin Runes are tokens created on Bitcoin using the Runes protocol, enabling fungible and collectible assets directly on the Bitcoin network.
Bitcoin-Only Wallet
A Bitcoin-only wallet is a cryptocurrency wallet that supports only Bitcoin (BTC), excluding other cryptocurrencies like Ethereum or altcoins.
Blind Signing
Blind signing is the process of signing a transaction without viewing its contents, typically used in hardware wallets for enhanced security.
Blob
A blob is a large binary data object used in Ethereum upgrades like EIP-4844 to store transaction data off-chain for efficiency.
Block Confirmation
A block confirmation is the process of verifying a new block in the blockchain network, confirming its validity and preventing double-spending or fraud.
Block Height
Block height refers to the number of blocks in a blockchain, starting from the first block (genesis block). It is also known as the block number and indicates the position of a block in the chain.
Block Time
Block time is the average time it takes for a new block to be added to a blockchain, typically measured in seconds or minutes. It determines the speed of block generation.
Bluetooth Connectivity
Bluetooth Connectivity enables wireless communication between devices, like hardware wallets and smartphones, using Bluetooth or Bluetooth Low Energy (BLE) for secure data transfer.
BlueWallet
BlueWallet is a mobile Bitcoin wallet that allows users to securely store, send, and receive Bitcoin. It offers features like Lightning Network support and multi-sig capabilities.
BNB Chain
BNB Chain is a high-performance blockchain network developed by Binance, formerly Binance Smart Chain (BSC). It supports smart contracts, DeFi, and uses BNB as its native token.
Bootloader
A bootloader is a small program that initializes hardware and loads the main operating system or firmware on a device, often used in blockchain hardware wallets for secure startup.
BRC-20
BRC-20 is a token standard on Bitcoin, enabling the creation and transfer of fungible tokens using the Ordinals protocol, allowing tokenization on the Bitcoin blockchain.
Bridge
A bridge in blockchain allows assets or data to move between different blockchains, enabling interoperability between otherwise separate networks.
Browser Extension Wallet
A browser extension wallet is a software wallet that runs as a browser plugin, like MetaMask, allowing users to manage crypto assets and interact with dApps directly in the browser.
Brute Force Attack
A brute force attack systematically tries every possible combination to guess a private key or password. In cryptocurrency, it targets wallets but fails against strong keys due to immense computational demands.
Bull Market
A bull market is a period of rising cryptocurrency prices driven by optimism, high demand, and increasing investor confidence.
Ready to Apply What You've Learned?
Use your knowledge to find the right hardware wallet for your needs.
C
24 termsCardano
Cardano is a proof-of-stake blockchain platform that prioritizes research-driven development, scalability, and sustainability. Its native cryptocurrency is ADA.
Change Address
A change address is a new address where leftover cryptocurrency is sent after a transaction, ensuring any unspent funds are returned to the sender in blockchain transactions.
Clear Signing
Clear Signing is a process in blockchain where transaction data is displayed in human-readable form before being signed, ensuring transparency and preventing blind signing risks.
Clipboard Hijacking
Clipboard hijacking is a malware attack that monitors the clipboard and swaps a user's copied cryptocurrency wallet address with the attacker's address, diverting funds.
Coin Control
Coin Control is a feature that allows users to manually select which unspent transaction outputs (UTXOs) to use in a transaction, giving more control over privacy and fees.
CoinJoin
CoinJoin is a privacy technique in cryptocurrency where multiple users combine their transactions, making it harder to trace individual senders and receivers.
Cold Staking
Cold staking lets users earn staking rewards on proof-of-stake cryptocurrencies while keeping private keys offline, often via hardware wallets, for enhanced security.
Cold Storage
Cold storage refers to keeping cryptocurrency private keys offline, away from the internet, to protect them from hacks or unauthorized access.
Cold Wallet
A Cold Wallet is a cryptocurrency wallet that stores private keys offline, providing enhanced security by being disconnected from the internet.
Coldcard
Coldcard is an air-gapped hardware wallet for Bitcoin, made by Coinkite, that stores private keys offline and signs transactions without internet exposure.
Companion App
A companion app is a software application used to manage and interact with cryptocurrency wallets or blockchain networks, typically offering features like transactions and security controls.
Consensus Mechanism
A consensus mechanism is a protocol that enables blockchain networks to agree on valid transactions and the ledger's state without a central authority.
Cosigner
A cosigner is one of multiple parties in a multisig wallet who signs transactions with their private key. All required cosigners must approve before the transaction executes.
Cosmos
Cosmos is a blockchain ecosystem enabling interoperable chains via the Cosmos SDK and IBC protocol. The Cosmos Hub serves as its central chain with the ATOM token.
Crypto Custody
Crypto custody is the secure storage and management of cryptocurrency private keys, often provided by specialized custodial services.
Crypto Debit Card
A Crypto Debit Card allows users to spend cryptocurrency directly at merchants that accept traditional debit cards, converting crypto into local currency in real-time.
Crypto Insurance
Crypto insurance protects cryptocurrency holdings from risks like theft, hacks, and loss through specialized policies offered by insurers.
Crypto Scam
A Crypto Scam is a fraudulent scheme that tricks people into sending cryptocurrency or sharing private keys for financial gain.
Crypto Security
Crypto Security refers to practices, tools, and protocols that protect cryptocurrencies, private keys, wallets, and blockchain networks from theft, hacks, and unauthorized access.
Crypto Storage
Crypto Storage refers to secure methods for holding cryptocurrencies, such as wallets and hardware devices that protect private keys from unauthorized access.
Crypto Tax
Crypto Tax is the tax on cryptocurrency transactions, including gains, income, or trades of digital assets, as required by law.
Crypto Wallet
A crypto wallet stores private keys for cryptocurrencies. It lets users send, receive, and manage digital assets on the blockchain.
Cryptocurrency
Cryptocurrency is a digital or virtual currency secured by cryptography, operating on decentralized blockchain networks to enable secure, peer-to-peer transactions.
Custodial Wallet
A custodial wallet is a cryptocurrency wallet where a third party manages the private keys, typically provided by exchanges or other platforms.
D
14 termsDAO
A DAO (Decentralized Autonomous Organization) is a blockchain-based entity governed by smart contracts and token holder votes, enabling decentralized decision-making without central authority.
Data Availability
Data Availability in blockchain ensures that transaction and block data are accessible to all network participants, enabling verification and consensus.
DCA
DCA (Dollar Cost Averaging) is an investment strategy where a fixed amount of cryptocurrency is purchased at regular intervals, regardless of market price fluctuations.
Decentralization
Decentralization spreads control and data across many independent nodes in a blockchain network, eliminating reliance on a single authority.
DeFi
DeFi (Decentralized Finance) refers to a set of financial services, such as lending and trading, built on blockchain technology without traditional intermediaries like banks.
DePIN
DePIN refers to decentralized physical infrastructure networks, where blockchain technology powers and incentivizes the ownership and operation of physical assets or infrastructure.
Derivation Path
A derivation path is a string of indices (e.g., m/44'/0'/0'/0) that specifies how to derive specific keys and addresses from a hierarchical deterministic (HD) wallet's master seed.
Desktop Wallet
A desktop wallet is software installed on a personal computer that stores private keys and manages cryptocurrency transactions.
Digital Signature
A digital signature is a cryptographic method that uses a private key to sign blockchain transactions, verifiable with the public key to prove authenticity and prevent tampering.
Dogecoin
Dogecoin (DOGE) is a cryptocurrency launched in 2013 as a joke based on the Doge meme. It uses proof-of-work on a Litecoin fork with unlimited supply.
Downgrade Protection
Downgrade protection prevents blockchain nodes from accepting blocks from older protocol versions, blocking rollbacks to vulnerable states via version checks.
Duress PIN
A Duress PIN is a special code used in cryptocurrency hardware wallets to trigger a response, such as wiping the device, in case of coercion or threat.
Dust Attack
A dust attack sends tiny cryptocurrency amounts (dust) to many wallet addresses to track spending patterns and de-anonymize users on the blockchain.
DYOR
DYOR stands for 'Do Your Own Research.' In cryptocurrency, it urges investors to independently verify projects and information rather than relying on others' advice.
E
12 termsE-Ink Display
An E-Ink display is a low-power screen technology used in hardware wallets, offering clear, easy-to-read information with minimal energy consumption.
EAL Certification
EAL Certification (Evaluation Assurance Level) from Common Criteria rates the security of hardware components, like secure chips in crypto hardware wallets. Higher levels, such as EAL5+ or EAL6+, indicate stronger resistance to attacks.
Electrum
Electrum is a lightweight Bitcoin wallet that allows users to store, send, and receive Bitcoin securely. It is known for its speed and low resource usage.
Elliptic Curve
An elliptic curve is a mathematical curve used in elliptic curve cryptography (ECC) for generating secure public-private key pairs in blockchains, like secp256k1 in Bitcoin.
Encrypted Communication
Encrypted communication in cryptocurrency and blockchain secures data transmission between wallets, nodes, or users using encryption techniques like end-to-end encryption, preventing unauthorized access.
ENS
ENS (Ethereum Name Service) is a decentralized domain name system on the Ethereum blockchain, allowing users to register human-readable .eth domain names for wallet addresses and more.
Entropy
Entropy is the randomness used to generate secure cryptographic keys or seeds in blockchain and cryptocurrency systems.
ERC-20 Token
ERC-20 Token is a fungible token standard on the Ethereum blockchain. It defines rules for creating, transferring, and managing tokens uniformly.
Ethereum
Ethereum is a decentralized blockchain platform that enables smart contracts and decentralized applications (dApps). Its native cryptocurrency is Ether (ETH).
Ethereum ETF
An Ethereum ETF is a financial product that allows investors to gain exposure to Ethereum (ETH) without directly owning it, by trading it on traditional stock exchanges.
Evil Maid Attack
An evil maid attack is a physical security threat where an attacker gains temporary unsupervised access to a hardware wallet to tamper with it, install malicious firmware, or extract private keys.
External Signer
An external signer is a hardware wallet or remote device that signs cryptocurrency transactions securely, keeping private keys isolated from the connected software wallet.
F
11 termsFATF
The FATF (Financial Action Task Force) is an international body that sets standards for combating money laundering and terrorist financing, including in the cryptocurrency sector.
Fiat
Fiat is government-issued currency, like the US dollar or euro, not backed by a physical commodity. It derives value from official decree and contrasts with decentralized cryptocurrencies.
Firmware Attestation
Firmware Attestation is the process of verifying the authenticity of a device's firmware to ensure it has not been tampered with, commonly used in hardware wallets for security.
Firmware Trust Model
Firmware Trust Model describes the trust level users place in a hardware wallet's firmware, from fully relying on the vendor (vendor-only trust) to independently verifying it (user verification).
Firmware Update
Firmware Update installs new low-level software on a hardware wallet to fix bugs, enhance security, or add features in cryptocurrency devices.
Flash Loan Attack
A flash loan attack exploits uncollateralized flash loans in DeFi to manipulate prices or drain funds within a single blockchain transaction that must repay the loan or revert.
FOMO
FOMO (Fear Of Missing Out) is the anxiety that prompts crypto investors to buy assets impulsively during rapid price rises, fearing they will miss profits.
Fork
A fork is a blockchain split into two chains due to protocol changes or disagreements. Hard forks create permanent divergences; soft forks are backward-compatible.
Foundation
Foundation refers to the Passport, a Bitcoin-only hardware wallet by Foundation Devices that securely stores private keys offline for self-custody.
FUD
FUD stands for Fear, Uncertainty, and Doubt. In cryptocurrency, it describes negative rumors or misinformation spread to create panic and drive down prices.
Full Node
A Full Node is a computer that stores the entire blockchain and verifies all transactions, ensuring network security and consistency in cryptocurrency systems like Bitcoin.
G
5 termsGas Limit
The gas limit is the maximum amount of computational work (gas) a blockchain transaction can consume. It ensures transactions don't overuse network resources.
Gas Price
Gas Price is the fee per unit of gas, often in gwei, that users pay to process transactions on Ethereum and similar blockchains.
Genesis Block
The Genesis Block is the first block in a blockchain, marking the start of the blockchain's history. It is hardcoded and has no predecessor.
Governance Token
A governance token grants holders voting rights in DAOs or blockchain protocols, allowing them to influence decisions like upgrades or fund allocation.
GridPlus
GridPlus is a brand of secure hardware wallets, like the Lattice1, that store private keys offline and enable air-gapped transaction signing for cryptocurrencies.
H
8 termsHalving
Halving is a Bitcoin protocol event that cuts the block reward for miners in half every 210,000 blocks, roughly every four years, to control the supply of new bitcoins.
Haptic Feedback
Haptic feedback in crypto hardware wallets uses device vibrations to confirm user actions, like button presses or transaction approvals, providing tactile alerts without relying on screens.
Hash Rate
Hash rate measures the computational power of a miner or network in cryptocurrency mining, expressed as hashes per second (H/s). Higher rates increase block-solving chances.
HID Protocol
HID Protocol (Human Interface Device) is a USB standard that hardware wallets use to securely communicate with computers, mimicking input devices for driverless transaction signing in cryptocurrency.
Hidden Wallet
A hidden wallet conceals a secondary cryptocurrency wallet behind an additional passphrase on the same seed, providing plausible deniability against coercion.
HODL
HODL is cryptocurrency slang for holding assets long-term despite price volatility, rather than selling. It originated from a 2013 forum post misspelling 'hold' as 'I AM HODLING.'
Hologram Security
Hologram security refers to tamper-evident holographic seals used to verify the authenticity of hardware wallets and other crypto-related products, preventing counterfeiting.
Hot Wallet
A Hot Wallet is a cryptocurrency wallet connected to the internet, allowing for easy access and transactions but more vulnerable to hacks.
I
8 termsICO
An ICO (Initial Coin Offering) is a fundraising method where blockchain projects sell newly created tokens to investors in exchange for cryptocurrencies like Bitcoin or Ether.
IDO
IDO (Initial DEX Offering) is a fundraising method where crypto projects launch new tokens directly on decentralized exchanges (DEXs), bypassing centralized platforms.
Impermanent Loss
Impermanent loss happens when asset prices in a liquidity pool diverge from external markets, reducing the value of liquidity providers' holdings compared to simply holding the assets.
Inheritance Planning
Inheritance planning in cryptocurrency ensures heirs access digital assets after death. It uses tools like dead man's switches or multi-signature wallets to securely share private keys.
Institutional Custody
Institutional custody refers to the secure storage and management of cryptocurrencies by regulated, qualified custodians for institutional investors and large entities.
Intent-Based Trading
Intent-Based Trading lets users express trade goals instead of exact orders, which blockchain solvers match and execute automatically.
Interoperability
Interoperability in blockchain refers to the ability of different blockchain networks to communicate and exchange data or value seamlessly, enabling cross-chain functionality.
IP Rating
IP Rating refers to the level of protection a device has against dust and water, often used for hardware wallets to indicate their durability in various environments.
J
1 termsK
4 termsKey Ceremony
A Key Ceremony is a secure, multi-person process to generate and distribute cryptographic keys for blockchain systems.
Key Derivation
Key derivation generates cryptographic keys from a password or seed using functions like PBKDF2 (a KDF) to slow brute-force attacks and enhance security in wallets.
Keystone
Keystone is a brand of air-gapped hardware wallets, such as the Keystone Pro, that securely store cryptocurrency private keys offline.
KYC
KYC (Know Your Customer) is the regulatory process where cryptocurrency exchanges verify users' identities using documents like ID or proof of address to prevent fraud and money laundering.
L
8 termsLayer 2
Layer 2 refers to blockchain solutions built on top of a base blockchain (Layer 1) to improve scalability and transaction speed, often using methods like rollups.
Ledger
Ledger is a brand of hardware wallets that securely store cryptocurrency private keys offline, such as the Ledger Nano series.
Ledger Live
Ledger Live is a software application that manages cryptocurrency assets and interacts with Ledger hardware wallets for secure transactions and portfolio management.
Lending Protocol
A lending protocol is a DeFi smart contract platform on blockchain where users lend crypto to earn interest and borrow assets using collateral.
Lightning Network
The Lightning Network is a Layer 2 solution for Bitcoin that enables faster, cheaper transactions by creating off-chain payment channels between users.
Liquid Staking
Liquid staking lets users stake crypto assets to secure a network and receive a liquid derivative token, like stETH from Lido, usable in DeFi while earning rewards.
Liquidity Pool
A liquidity pool is a smart contract holding paired cryptocurrency reserves. It powers decentralized trading on AMMs like Uniswap by enabling automated swaps.
Litecoin
Litecoin (LTC) is a peer-to-peer cryptocurrency forked from Bitcoin in 2011, offering faster block times (2.5 minutes) and using the Scrypt hashing algorithm.
M
19 termsMainnet
Mainnet is the primary blockchain network where actual transactions occur, as opposed to testnets. It represents the live, functioning version of a blockchain.
Man-in-the-Middle Attack
A Man-in-the-Middle (MITM) attack occurs when an attacker secretly intercepts and alters communication between a user and a blockchain service, such as changing wallet addresses during transactions.
Market Cap
Market cap, or market capitalization, measures a cryptocurrency's total value. Calculate it by multiplying the current price by the circulating supply.
Meme Coin
A meme coin is a cryptocurrency inspired by internet memes, driven by social media hype and community enthusiasm rather than technical utility. Examples include Dogecoin (DOGE) and Shiba Inu (SHIB).
Mempool
Mempool, short for memory pool, is a node's temporary storage for unconfirmed cryptocurrency transactions awaiting validation and inclusion in a blockchain block.
Merkle Tree
A Merkle Tree is a binary tree structure used in blockchain to efficiently verify data integrity, where each leaf node is a hash of data and non-leaf nodes are hashes of child nodes.
Metal Backup
A metal backup is a durable metal plate or device engraved with a cryptocurrency wallet's seed phrase, providing fireproof and waterproof protection for offline key storage.
MEV
MEV (Maximal Extractable Value) is the profit block producers extract by reordering, including, or excluding transactions in a block, often via front-running.
MiCA
MiCA (Markets in Crypto-Assets) is the European Union's regulatory framework for crypto-assets, stablecoins, and related services to protect consumers and ensure market stability.
MicroSD Card Backup
A MicroSD Card Backup is an encrypted backup of a hardware wallet's private keys stored on a MicroSD card, providing a portable and secure way to restore wallet data.
Mining
Mining uses computational power to solve puzzles, validate transactions, and add blocks to a blockchain. Miners earn cryptocurrency rewards for securing the network.
Miniscript
Miniscript is a structured policy language for Bitcoin Script. It simplifies writing, analyzing, and compiling complex spending conditions.
Mnemonic Phrase
A mnemonic phrase is a set of words that stores a cryptocurrency wallet's private keys, allowing users to recover access if lost.
Mobile Wallet
A mobile wallet is a software application on smartphones that stores private keys and enables users to send, receive, and manage cryptocurrencies.
Modular Blockchain
A modular blockchain is a blockchain architecture that separates different functions (e.g., consensus, execution, storage) into distinct layers for greater flexibility and scalability.
Monero
Monero (XMR) is a privacy-focused cryptocurrency that uses ring signatures, stealth addresses, and RingCT to obscure sender, receiver, and transaction amounts on the blockchain.
MPC Wallet
An MPC Wallet uses Multi-Party Computation to split private keys across multiple parties or devices, so no single entity holds the full key, boosting security.
Multi-Currency Wallet
A multi-currency wallet stores multiple cryptocurrencies in one place, allowing users to manage different assets within a single interface.
Multisig
Multisig (multi-signature) is a security feature that requires multiple private keys to authorize a transaction, enhancing protection against unauthorized access in blockchain networks.
N
7 termsNFC Connectivity
NFC Connectivity in cryptocurrency enables contactless transactions using near-field communication, allowing users to sign or authorize actions by tapping their device to a reader.
NFT
An NFT (Non-Fungible Token) is a unique digital asset stored on a blockchain, representing ownership of a specific item, such as artwork, music, or virtual goods.
Node
A node is a computer running blockchain software that connects to the network, validates transactions, and maintains a copy of the ledger.
Non-Custodial Wallet
A Non-Custodial Wallet is a cryptocurrency wallet where the user retains control of their private keys, without relying on a third party to store them.
Non-Extractable Keys
Non-extractable keys are private keys generated and stored within a hardware wallet that users cannot export or remove, protecting them from malware or physical attacks.
Nonce
A nonce is a sequential number in a blockchain transaction that ensures transactions from the same account process in order and prevents replay attacks.
Not Your Keys, Not Your Coins
A principle stating that if you do not control your private keys, you do not fully own your cryptocurrency.
O
10 termsOffline Signing
Offline Signing refers to signing cryptocurrency transactions on a device that is not connected to the internet, ensuring private keys remain secure from online threats.
On-Chain Analytics
On-Chain Analytics examines data directly from the blockchain, like transactions and wallet balances, to reveal insights into user behavior and network activity.
Open Source Firmware
Open Source Firmware refers to firmware in hardware devices, like wallets, where the source code is publicly available, allowing transparency, auditability, and customization.
Operational Security
Operational Security (OpSec) refers to practices that protect sensitive information in cryptocurrency and blockchain activities, minimizing risks of hacking or theft through careful management of data.
Optimism
Optimism is an Ethereum Layer 2 optimistic rollup network. It batches transactions off-chain for faster, cheaper processing while inheriting Ethereum's security.
Options Protocol
An Options Protocol is a DeFi platform on blockchain that enables trading of options contracts, like calls and puts, on-chain.
Oracle
An oracle provides external real-world data, such as price feeds, to smart contracts on a blockchain, bridging on-chain and off-chain worlds.
Orphan Block
An orphan block is a valid block that is not part of the main blockchain due to a chain split, often becoming stale as another block becomes the accepted version.
OTA Update
OTA Update, or Over-The-Air Update, enables hardware wallets to receive firmware updates wirelessly via Bluetooth or internet, without cables.
Output Descriptors
Output descriptors (BIP 380) concisely describe Bitcoin wallet output scripts and spending conditions without revealing private keys.
P
16 termsPaper Wallet
A paper wallet is a physical document that contains a cryptocurrency's public and private keys, used for offline storage of funds.
Passkeys
Passkeys are a form of passwordless authentication using cryptographic keys for secure, phishing-resistant logins in blockchain and crypto applications.
Passphrase
A passphrase is an additional security layer for cryptocurrency wallets, acting as a 25th word in the BIP39 seed phrase, protecting access to hidden wallets.
Paymaster
A paymaster is a blockchain entity that sponsors transaction fees, enabling users to execute transactions without paying gas fees directly, often used in gasless transactions.
Perpetual Futures
Perpetual futures are cryptocurrency derivative contracts without expiration dates. Traders use leverage to speculate on asset prices, with funding rates aligning the contract price to the spot market.
Phishing Attack
A phishing attack tricks crypto users into revealing private keys, seed phrases, or login details via fake emails, websites, or messages mimicking legitimate wallets or exchanges.
PIN Protection
PIN Protection is a security feature that requires a personal identification number (PIN) to access a cryptocurrency wallet or device, preventing unauthorized access.
Plausible Deniability
Plausible Deniability refers to the ability to deny knowledge or possession of cryptocurrency by using techniques like decoy wallets or hidden volumes, ensuring privacy under duress.
Polkadot
Polkadot is a multi-chain blockchain protocol that connects independent blockchains (parachains) to a central relay chain for interoperability and shared security. Its native token is DOT.
Polygon
Polygon is a layer-2 scaling solution for Ethereum that enables faster, cheaper transactions via its Proof-of-Stake sidechain. Native token: MATIC (also called Polygon PoS).
Priority Fee
Priority Fee is an optional tip users pay to miners or validators to prioritize their transaction for faster inclusion in the blockchain.
Proof of Reserves
Proof of Reserves (PoR) is a method for crypto platforms to verify they hold enough assets to cover user deposits.
Proof of Stake
Proof of Stake (PoS) is a blockchain consensus mechanism. Validators create new blocks based on staked cryptocurrency amounts, not computational power.
Proof of Work
Proof of Work (PoW) is a blockchain consensus mechanism where miners solve complex cryptographic puzzles to validate transactions, add new blocks, and earn rewards.
PSBT
PSBT (Partially Signed Bitcoin Transaction) is a Bitcoin transaction format that allows multiple parties to sign a transaction incrementally before finalizing it.
Public Key
A public key is a cryptographic key used to receive transactions in a blockchain. It is shared openly, while the corresponding private key remains confidential.
Q
1 termsR
13 termsRandom Number Generator
A Random Number Generator (RNG) produces unpredictable numbers essential for cryptographic security in blockchain, such as generating private keys and nonces.
Randomized Keypad
A Randomized Keypad is a security feature used in hardware wallets where the PIN layout is shuffled each time, preventing PIN theft via keylogging or visual observation.
RBF
RBF (Replace-By-Fee) lets users replace an unconfirmed Bitcoin transaction with a new version that has higher fees to speed up confirmation.
Recovery
Recovery is the process of restoring access to a cryptocurrency wallet using its seed phrase or mnemonic backup if the original wallet is lost or inaccessible.
Recovery Card
A Recovery Card is a physical card or sheet for backing up a cryptocurrency wallet's seed phrase, enabling recovery if the original wallet is lost or damaged.
Remote Key Extraction
Remote Key Extraction is a vulnerability where attackers steal private keys from hardware wallets remotely via exploits, without physical access.
Replay Attack
A replay attack occurs when an attacker captures a valid blockchain transaction and rebroadcasts it to execute multiple times, often exploiting chain forks for double-spending.
Reproducible Builds
Reproducible Builds refer to the process where the same source code consistently produces identical binary outputs, ensuring verifiable and trustworthy software in blockchain and crypto projects.
Restaking
Restaking reuses staked assets, like ETH, to secure additional blockchain networks or protocols beyond the original chain, enabling shared security as in EigenLayer.
Ring Signature
A ring signature hides the true signer's identity by mixing their signature with those of other users in a group, boosting privacy in cryptocurrencies like Monero.
Rollup
A rollup is a layer 2 scaling solution that processes transactions off-chain while posting summary data on-chain to improve efficiency, with types including Optimistic and ZK rollups.
Rug Pull
A rug pull is a cryptocurrency scam where project developers hype a token or DeFi project, attract investors, then abruptly withdraw liquidity or dump holdings, crashing the price and fleeing with funds.
RWA
RWA (Real World Assets) are physical or financial assets represented on a blockchain as digital tokens for trading or investment.
S
29 termsSanctions Screening
Sanctions screening in cryptocurrency checks wallet addresses and transactions against lists like OFAC to ensure compliance with international sanctions and prevent dealings with prohibited entities.
Satoshi
A Satoshi is the smallest unit of Bitcoin, equal to 0.00000001 BTC. It is named after Bitcoin's creator, Satoshi Nakamoto.
Schnorr Signature
Schnorr Signature is an efficient digital signature scheme (BIP340) used in Bitcoin. It supports key aggregation, multisignatures, and reduces transaction size compared to ECDSA.
Secure Boot
Secure Boot is a security feature that ensures only trusted software runs on a device by verifying its integrity during startup, preventing unauthorized code execution in crypto systems.
Securities Law
Securities Law regulates investments like stocks; in crypto, it determines if tokens qualify as securities via the Howey Test, requiring SEC compliance.
Security Audit
A security audit is an independent review of blockchain code or smart contracts by experts to identify vulnerabilities and ensure robustness.
Seed Phrase Type
Seed Phrase Type refers to the format or method used to generate a cryptocurrency wallet's recovery phrase, such as BIP-39 or BIP-44.
Seed Splitting
Seed splitting divides a cryptocurrency wallet's seed phrase into multiple shares stored separately. Reconstructing the full seed requires combining all shares for enhanced security.
SegWit
SegWit (Segregated Witness) is a Bitcoin upgrade that moves transaction signatures to a separate data structure, increasing block capacity and enabling efficient scaling solutions like the Lightning Network.
Self-Custody
Self-custody means users control their own private keys to manage cryptocurrency assets directly, without third-party custodians. It embodies 'not your keys, not your coins.'
Self-Sovereign Identity
Self-Sovereign Identity (SSI) is a blockchain-based identity system where users control and share their personal data without relying on central authorities.
SHA-256
SHA-256 is a cryptographic hash function that produces a fixed 256-bit output from any input. In blockchain, Bitcoin uses it for proof-of-work mining, block hashing, and transaction IDs.
Shamir Secret Sharing
Shamir Secret Sharing (SSS) divides a secret, like a crypto wallet seed, into multiple shares. A threshold number of shares reconstructs it, enhancing security as in SLIP-39 backups.
Side-Channel Attack
A side-channel attack in cryptocurrency and blockchain targets indirect information, like power usage or timing, to extract sensitive data from a system or device.
Sidechain
A sidechain is a separate blockchain connected to a main chain, allowing for faster transactions or experimentation without affecting the main chain's security.
Sim Swap Attack
A SIM swap attack tricks a mobile carrier into porting a victim's phone number to the attacker's SIM card, enabling them to intercept SMS 2FA codes and access cryptocurrency wallets or exchanges.
Slippage
Slippage is the difference between the expected price of a cryptocurrency trade and the actual executed price, caused by market volatility or low liquidity.
Smart Contract Wallet
A smart contract wallet is a blockchain wallet implemented as a smart contract, enabling features like account abstraction, gas sponsorship, and programmable security beyond traditional externally owned accounts.
Social Recovery
Social Recovery allows users to regain access to their crypto wallet through approvals from trusted guardians or contacts, bypassing traditional seed phrases.
Software Wallet
A software wallet is a digital application that stores cryptocurrency private keys and enables transactions, typically on mobile or desktop devices.
Solana
Solana is a high-performance layer-1 blockchain platform that enables fast, low-cost transactions using Proof of History and Proof of Stake. Its native token is SOL.
Sparrow Wallet
Sparrow Wallet is a desktop Bitcoin wallet that focuses on security, privacy, and advanced features for managing Bitcoin transactions and keys.
Specter
Specter is a Bitcoin hardware wallet solution designed for advanced users, offering secure storage through a customizable, self-hosted setup with options like Specter Desktop and Specter DIY.
SPV
SPV (Simplified Payment Verification) is a method for lightweight clients to verify transactions without downloading the entire blockchain, relying on block headers instead.
Stablecoin
A stablecoin is a cryptocurrency designed to maintain a stable value, typically pegged to a fiat currency like the US dollar or backed by reserves.
Stealth Address
A stealth address is a one-time address generated for each transaction, enhancing privacy by concealing the recipient's actual address on the blockchain.
Supply Chain Attack
A supply chain attack targets vulnerabilities in the production or distribution process of crypto hardware or software, compromising devices or systems before they reach the user.
Swap
In cryptocurrency, a swap is the direct exchange of one token for another on a blockchain, often via decentralized exchanges (DEXs) without intermediaries.
Sybil Attack
A Sybil attack occurs when an attacker creates multiple fake identities or nodes to gain disproportionate control over a blockchain network, such as influencing consensus or voting.
T
19 termsTamper-Evident Design
Tamper-Evident Design refers to features on hardware devices that visibly show if they have been altered, ensuring the integrity and security of blockchain assets or data.
Tangem
Tangem is a hardware wallet in the form of a physical card that stores cryptocurrency private keys securely and offline, allowing for easy and portable access to digital assets.
Taproot
Taproot (BIP 341) is a Bitcoin upgrade that introduces Schnorr signatures and Tapscript, enhancing privacy by making complex scripts look like simple payments and improving efficiency.
Telemetry
Telemetry in cryptocurrency and blockchain refers to the automatic collection and transmission of anonymous usage data, metrics, and error reports from wallets or nodes to improve software.
Testnet
A testnet is a blockchain network used for testing and development, where developers can experiment without using real cryptocurrency. Examples include Goerli and Sepolia.
Threshold Signature Scheme
A Threshold Signature Scheme (TSS) splits a private key among multiple parties, allowing them to jointly sign transactions without exposing the full key.
Token
A token is a digital asset on a blockchain that represents value, ownership, utility, or access rights. Examples include ERC-20 tokens on Ethereum.
Tor Support
Tor Support enables cryptocurrency wallets and services to route connections through the Tor network, masking IP addresses to enhance user privacy.
Touchscreen Display
A touchscreen display is a screen that allows users to interact with a device by touching the surface, commonly used in hardware wallets for easy navigation and transaction confirmation.
Transaction Fee
A transaction fee is a cost paid to process transactions on a blockchain network. It compensates miners or validators for confirming and adding transactions to the blockchain.
Transaction Verification
Transaction verification checks a cryptocurrency transaction's validity, confirming signatures, balances, and rules compliance before blockchain inclusion.
Travel Rule
The Travel Rule requires crypto service providers to share originator and beneficiary details for transactions above a threshold to combat money laundering, as mandated by the FATF.
Trezor
Trezor is a hardware wallet by SatoshiLabs. It stores private keys offline to secure cryptocurrencies.
Trezor Suite
Trezor Suite is a software interface for managing Trezor hardware wallets, allowing users to send, receive, and store cryptocurrencies securely.
TRNG
A TRNG (True Random Number Generator) generates cryptographically secure random numbers using physical processes, crucial for secure key generation in blockchain and cryptocurrency.
TRON
TRON is a blockchain platform and cryptocurrency (TRX) designed for high-throughput decentralized applications, especially in content sharing and entertainment.
Trusted Execution Environment
A Trusted Execution Environment (TEE) is a secure area in a processor that protects sensitive crypto operations and private keys from external access.
TVL
TVL (Total Value Locked) measures the total USD value of cryptocurrency assets deposited in a DeFi protocol's smart contracts.
Two-Factor Authentication
Two-Factor Authentication (2FA) secures cryptocurrency accounts and wallets by requiring two verification methods, such as a password plus a code from an authenticator app.
U
4 termsUncle Block
An Uncle Block is a block in a blockchain that was mined but not added to the main chain due to a competing block being accepted first. It is also known as an ommer or stale block.
Unified Accounts
Unified Accounts enable a single address to manage multiple assets and functions on blockchains via account abstraction, simplifying user interactions.
USB-C Connectivity
USB-C Connectivity refers to the use of a USB Type-C port for fast, reversible connections in blockchain devices like hardware wallets, enabling secure data transfer and charging.
UTXO
UTXO (Unspent Transaction Output) is a unit of cryptocurrency from a previous transaction that remains unspent and serves as input for new transactions in blockchains like Bitcoin.
V
3 termsValidator
A validator is a node in a proof-of-stake blockchain that stakes cryptocurrency to verify transactions, propose blocks, and secure the network.
VASP
A VASP (Virtual Asset Service Provider) is a business that exchanges, transfers, custodies, or provides other services for virtual assets like cryptocurrencies.
Vendor Backup
Vendor Backup is a service by hardware wallet manufacturers that securely stores encrypted seed phrase shards with third parties, enabling recovery without self-custody of the full seed.
W
9 termsWalletConnect
WalletConnect is a protocol that enables secure communication between decentralized applications (dApps) and mobile wallets through QR code scanning or deep linking.
Watch-Only Wallet
A watch-only wallet displays cryptocurrency balances and transactions without private keys, allowing secure monitoring without spending capability.
Watchtower
A watchtower monitors Lightning Network channels and enforces penalties if a counterparty tries to cheat.
Web3 Wallet
A Web3 wallet is a digital wallet that allows users to interact with decentralized applications (dApps) and manage blockchain-based assets like cryptocurrencies and NFTs.
WebUSB
WebUSB is a browser API that lets web apps communicate directly with USB-connected hardware wallets for secure crypto transactions without plugins or native apps.
Wei
Wei is the smallest unit of Ether, the native cryptocurrency of the Ethereum blockchain. 1 Ether equals 1 quintillion Wei.
Whale
A whale is an individual or entity holding a large amount of cryptocurrency, enough to potentially influence market prices through significant trades.
Whitepaper
In cryptocurrency and blockchain, a whitepaper is a foundational document that outlines a project's technical details, goals, tokenomics, and roadmap.
Wrapped Token
A wrapped token represents a cryptocurrency or asset from another blockchain on a target chain, pegged 1:1 for interoperability. Examples: WBTC (Bitcoin on Ethereum), WETH.
X
2 termsXPUB
XPUB is an extended public key (xpub) in hierarchical deterministic (HD) wallets. It derives child public keys and addresses from a master public key without exposing private keys.
XRP Ledger
The XRP Ledger is a decentralized, open-source blockchain designed for fast, low-cost global payments using the XRP cryptocurrency.
Y
1 termsZ
3 termsZcash
Zcash is a privacy-focused cryptocurrency that uses zero-knowledge proofs to enable shielded transactions, ensuring enhanced confidentiality of transaction details.
Zero-Knowledge Proof
Zero-Knowledge Proof (ZKP) lets one party prove a statement is true to another without revealing extra information. In blockchain, it enables private transactions, as in Zcash, and scalable layer-2 solutions like zk-rollups.
ZPUB
ZPUB is the prefix for a Bitcoin extended public key that derives native SegWit addresses (bc1q...), used in HD wallets for secure key generation without private keys.
Still Exploring? Find Your Wallet
Use our Wallet Finder to match a device to your needs — based on verified specs, not opinions.