Doxxing Risk

Risk of linking on‑chain or public activity to a real‑world identity; mitigated with opsec and privacy tools.

Double Spend

Attempt to spend the same coins twice; prevented by consensus and confirmation depth.

Domain Separation

Use of distinct prefixes or tags in hashing/signing to avoid cross‑protocol signature reuse or collision.

Dispute Window

Time during which parties can challenge a rollup batch or bridge message before finalization.

DIDs Resolver

Software that takes a DID and returns its DID Document using a method‑specific driver.