A

Application Binary Interface described in JSON that defines a contract’s functions, events, and types so clients can encode calls and decode logs.

Design that lets smart contracts act as user accounts, enabling custom validation, sponsored fees, and better UX (e.g., EIP‑4337).

Ledger model where balances live in accounts and transactions update balances directly, contrasted with the UTXO model.

Counter stored with an account to prevent replay and enforce transaction ordering. Each new transaction increments the nonce.

Contract that locks all payments collected from SHELL sales. NACKL holders can burn tokens to redeem a proportional share of its contents.

A Layer 1 blockchain focused on practical UX and game‑ready throughput in the Acki Nacki ecosystem.

Nonlinear function like ReLU or GELU that lets neural networks approximate complex relationships.

Reinforcement learning architecture with a policy network (actor) and a value estimator (critic) that learn together.

Scam where attackers send tiny transfers from look‑alike addresses to trick users into copying the wrong address.

Privileged key that can upgrade or pause a protocol. Useful for safety, but adds centralization risk.

Input crafted to fool a model into misclassification or unsafe behavior without obvious changes to humans.

LLM‑driven systems that autonomously decompose tasks, call tools, and coordinate with other agents to reach goals.

Designing AI systems whose goals and behavior remain reliably beneficial to humans, even as capabilities scale.

Wallet kept completely offline, signing transactions without a live network connection to reduce attack surface.

Free distribution of tokens or NFTs to wallets, usually to bootstrap communities, reward early users, or promote a launch.

Strategically using a protocol to maximize eligibility for future token airdrops, often with many wallets.

Stablecoin that targets a peg using market incentives or supply rules instead of fully backed collateral. Risky during stress.

Permission that lets a contract spend a user’s tokens up to a set amount, approved via the ERC‑20 standard.

List of addresses granted early access or special mint/claim rights, often used in NFT launches.

Information edge that can generate outsized returns, also used for early product previews in software.

Any cryptocurrency that is not Bitcoin. Broad term that spans utility, governance, meme, and stable tokens.

On-chain trading model that uses liquidity pools and a pricing formula instead of traditional order books.

Techniques to spot unusual patterns in data, used for fraud detection, ops alerts, and model safety.

Number of indistinguishable participants in a privacy system. Larger sets usually mean stronger privacy.

API

Application Programming Interface, a contract for software to talk to other software, including blockchain RPCs.

Secret credential used to authenticate API requests. Treat like a password, rotate if exposed.

Profiting from price differences for the same asset across markets or pools, often with bots and MEV techniques.

An Ethereum Layer 2 rollup family focused on lower fees and higher throughput while inheriting L1 security.

Node that stores full historical state for all blocks, enabling queries at any past block height.

Specialized hardware optimized to compute a specific proof‑of‑work algorithm at very high efficiency.

Cryptography using public and private keys, enabling signatures and secure key exchange over open networks.

Cross‑chain trade that either completes for both parties or reverts for both, often using HTLCs.

Technique that lets models weight different parts of input sequences, central to transformers and modern LLMs.

Verifiable statement about an identity, event, or state. Used in staking, oracles, and decentralized identity.

Metric for binary classifiers representing area under the ROC curve. Higher is generally better.

Mechanism that periodically claims and reinvests rewards back into a position to increase APY.

Neural network trained to compress and reconstruct inputs, useful for denoising, anomaly detection, and latent features.

AutoML

Automation of ML tasks like feature engineering, model selection, and hyperparameter tuning.

AI system that can plan, act, and iterate toward goals with minimal human input, often chaining tools and memory.

Family of probabilistic consensus protocols based on repeated random subsampling and metastability.

Privacy‑focused Layer 2 leveraging zero‑knowledge proofs for shielded transactions and programmable privacy.

B

Algorithm that computes gradients layer‑by‑layer to train neural networks via gradient descent.

Ethereum Layer 2 network focused on low fees and scalable apps, developed with the OP Stack.

Protocol‑set minimum fee per gas unit that is burned, adjusting block‑to‑block to target utilization.

The foundational blockchain that provides security and consensus for higher layers, also called Layer 1.

Technique that normalizes activations across a mini‑batch to stabilize and speed up training.

Component that aggregates Layer 2 transactions into batches and posts data or proofs to Layer 1.

Statistical method that updates beliefs with evidence using Bayes’ theorem.

The Proof‑of‑Stake coordination layer for Ethereum that manages validators, committees, and finality.

Checksum‑friendly address format used in Bitcoin and other chains, starts with prefixes like bc1.

Standardized dataset and metrics used to compare models and track progress, e.g., ImageNet or MMLU.

Token standard used on BNB Smart Chain, similar to ERC‑20 but with chain‑specific details.

Pre‑launch software stage intended for wider testing, may contain bugs and limited features.

Systematic errors in model outputs arising from data, objectives, or deployment context, affecting fairness.

Binary payload attached to special transactions to lower data availability costs for rollups.

The dedicated data availability market introduced by blobs, separate from traditional call‑data space.

Block

A batch of transactions bundled, validated, and linked to the previous block, forming a chain.

Web app for inspecting blocks, transactions, addresses, and contract state on a blockchain.

Maximum total gas that can be consumed by all transactions in a block, constraining throughput.

Summary fields of a block, including parent hash, state roots, timestamp, and other consensus data.

Number of blocks in the chain up to a given block, starting at zero for the genesis block.

Role that executes transactions and maintains node operations; collectively with Producers and Verifiers forms the “Block Keepers”.

Reward portion allocated to Block Keepers for compute, storage, and reliable operation during their epoch.

Collective term for Block Producers, Block Keepers (role), and Acki‑Nacki Verifiers when not addressed separately.

Management cohort in Acki Nacki that receives a defined share of rewards per management epoch.

Network participant responsible for proposing blocks in their epoch window under the PoS schedule. Part of the “Block Keepers” group.

The process and latency of broadcasting a new block throughout the network’s peers.

Native issuance and fees awarded to the entity that proposes or validates a block.

Average time between consecutive blocks on a chain, affecting latency and UX.

Distributed ledger secured by cryptography and consensus, where data is written in append-only blocks.

The scarce resource of on‑chain computation and data availability that users bid for via fees.

Probabilistic data structure for fast set membership checks with false positives but no false negatives.

Signature scheme supporting efficient aggregation, widely used in Ethereum staking and consensus.

Price function that automatically adjusts token price based on supply or demand, enabling instant liquidity.

Reward paid to security researchers for responsibly disclosing vulnerabilities in code or infrastructure.

Bridge

Infrastructure that transfers assets or messages between blockchains, usually by locking on one side and minting on the other.

Participant in proposer‑builder separation that constructs blocks, often competing in auctions for MEV.

Ordered set of transactions submitted together to capture MEV opportunities with preserved execution ordering.

Permanent removal of tokens from circulation by sending to an unrecoverable address or burning mechanism.

Mechanism letting NACKL holders destroy tokens in exchange for their proportional share of the Accumulator’s assets.

Classic distributed systems problem describing coordination with unreliable or traitorous participants.

C

Immutable input bytes provided to a contract call, accessible via calldata in Solidity; cheaper than memory.

Solidity data location specifier for function parameters, marking them as read‑only and non‑modifiable.

The officially supported cross‑chain bridge for a network, generally with security assumptions closest to the core protocol.

When a model forgets previously learned tasks while being trained on new tasks in sequence.

Ability of a protocol to include valid transactions and data despite adversarial actors or regulators.

Custodial trading platform that holds user funds and matches orders off‑chain, opposite of a DEX.

Attestation scheme to show a custodian holds sufficient assets, ideally with liabilities proofs and user verification.

Unique identifier for an EVM chain used to prevent replay across networks and select correct signer domain.

Prompting technique that encourages step‑by‑step reasoning traces from language models.

Periodically committed state summary that accelerates sync and helps finalize or validate recent history.

Hash‑based identifier used in IPFS and content‑addressed storage to reference immutable data.

Cipher

Algorithm for encrypting and decrypting data, such as AES or ChaCha20.

Constraint system that encodes a computation for proving and verifying via zk‑SNARKs or zk‑STARKs.

Emergency mechanism to pause protocol actions during incidents; must be carefully governed to avoid centralization.

Software that executes transactions and maintains state for a blockchain, e.g., Geth, Erigon, Nethermind.

Security property achieved by distributing node share across multiple independent client implementations.

Privacy technique that combines many users’ UTXOs into a single transaction to break chain analysis.

Offline wallet or hardware device that stores keys away from internet‑connected systems.

Value of collateral relative to borrowed or issued assets; staying above thresholds avoids liquidation.

Two‑phase pattern where a hash commitment is posted first and the plaintext is revealed later, preventing front‑running.

Property that lets protocols and contracts interoperate like Lego blocks to form new applications.

Table summarizing classification results by true vs predicted labels to analyze errors.

The mechanism by which nodes agree on the state of the ledger, examples include Proof of Work and Proof of Stake.

Component responsible for validator sets, finality, and fork choice, e.g., Ethereum’s Beacon clients.

Storage where data is located by its hash rather than a path or URL, enabling immutability and deduplication.

Maximum sequence length a language model can attend to at once, measured in tokens.

Learning paradigm that pulls related samples together and pushes unrelated ones apart in embedding space.

Contract architecture where a proxy delegates calls to an implementation controlled by an admin or governance.

Technique for conditioning diffusion models with structural hints like edges, poses, or depth maps.

Framework for building application‑specific blockchains using Tendermint/CometBFT consensus.

Smart contract platform for Cosmos chains using WebAssembly and Rust, enabling portable contracts.

Risk that the other party in a transaction fails to deliver, amplified in custodial or bridge setups.

Operations or messaging that move assets or data across different blockchains or layers.

Component in rollup stacks that passes messages between L1 and L2, often with a challenge period.

Security achieved by aligning incentives and penalties so that attacks are economically irrational.

Study of secure communication techniques, including hashing, signatures, and encryption.

Proof‑of‑work algorithm based on finding cycles in large graphs, designed to be memory bound.

Total gas consumed by all transactions up to a given point within a block.

AMM optimized for like‑kind assets with low slippage using a stable‑swap invariant.

Liquidity pool on Curve for swapping correlated assets, often with gauges and incentives.

Wallet where a third party controls private keys on behalf of the user.

D

Guarantee that transaction data is published for verification so that state transitions can be proven.

Planned Ethereum upgrade to scale data availability by introducing many blob lanes with single proposer.

Trading venue where orders are hidden until execution to reduce front‑running; hard to decentralize safely.

Evidence produced by data availability sampling that a block’s data is accessible with high probability.

Adversarial manipulation of training data to degrade or control model behavior.

Selecting, deduplicating, and filtering data to improve quality and reduce bias in training sets.

When the distribution of real‑world data differs from the training distribution, causing degraded model performance.

Automated strategy that splits orders into timed slices, often implemented via keeper networks or smart vaults.

Build process that produces identical binaries from the same source to enable reproducible verification.

Interactive verification process used by optimistic rollups to prove fraud via bisection and on‑chain resolution.

Mempool design that mitigates spam and flooding using fees, per‑peer limits, and reputation.

Distribution of control across many parties to reduce single points of failure and capture.

Surface‑level decentralization signals without real dispersion of power or risk, common in governance washing.

Surface in feature space that separates classes according to a model’s predictions.

Sequence‑to‑sequence architecture with bidirectional encoders and autoregressive decoders, used in translation.

Combines neural networks with reinforcement learning for agents that act in environments to maximize reward.

Synthetic media generated by AI that swaps or fabricates faces, voices, or scenes.

Financial services built on smart contracts, including lending, exchanges, derivatives, and asset management.

Financial services built on public blockchains, open to anyone with a wallet, programmable and composable.

Design choice that discourages stake delegation through economic and security constraints, favoring direct participation.

Path notation like m/44’/60’/0’/0/0 that derives child keys deterministically from a master seed.

Contracts whose value derives from an underlying reference, such as perpetuals, futures, and options.

Finality model where once a block is finalized it cannot be reverted unless safety assumptions break.

Wallet where all addresses are derived from a single seed using a standardized path scheme.

JSON‑LD document describing public keys, verification methods, and service endpoints for a DID.

Specific scheme such as did:ethr or did:key that defines how DIDs are created and resolved.

Software that takes a DID and returns its DID Document using a method‑specific driver.

Privacy guarantee that limits the impact of any single record on aggregated outputs by adding calibrated noise.

Measure of how hard it is to find a valid PoW hash; adjusts to target block time.

Mechanism that exponentially increases mining difficulty to encourage protocol upgrades.

Generative model that learns to denoise data from noise through a reverse diffusion process.

Cryptographic proof that a message was authorized by the holder of a private key, e.g., ECDSA, EdDSA, BLS.

Reduction of ownership percentage as supply increases through issuance, vesting, or inflation.

Time during which parties can challenge a rollup batch or bridge message before finalization.

Bitcoin smart contract approach where an oracle’s signature determines contract outcomes without revealing terms.