The next web, explained in plain English
A
Currencies chosen by Block Keepers to exchange for freshly minted SHELL in the System Pool.
Design that lets smart contracts act as user accounts, enabling custom validation, sponsored fees, and better UX (e.g., EIP‑4337).
Ledger model where balances live in accounts and transactions update balances directly, contrasted with the UTXO model.
Counter stored with an account to prevent replay and enforce transaction ordering. Each new transaction increments the nonce.
Contract that locks all payments collected from SHELL sales. NACKL holders can burn tokens to redeem a proportional share of its contents.
A Layer 1 blockchain focused on practical UX and game‑ready throughput in the Acki Nacki ecosystem.
Verifier role that checks block validity and contributes to finality. Considered part of the Block Keepers.
Nonlinear function like ReLU or GELU that lets neural networks approximate complex relationships.
Reinforcement learning architecture with a policy network (actor) and a value estimator (critic) that learn together.
A public identifier derived from a public key, used to receive assets and interact with smart contracts.
Scam where attackers send tiny transfers from look‑alike addresses to trick users into copying the wrong address.
Privileged key that can upgrade or pause a protocol. Useful for safety, but adds centralization risk.
Input crafted to fool a model into misclassification or unsafe behavior without obvious changes to humans.
LLM‑driven systems that autonomously decompose tasks, call tools, and coordinate with other agents to reach goals.
AI that can understand, learn, and apply knowledge across most tasks at or beyond human levels.
Designing AI systems whose goals and behavior remain reliably beneficial to humans, even as capabilities scale.
Wallet kept completely offline, signing transactions without a live network connection to reduce attack surface.
Free distribution of tokens or NFTs to wallets, usually to bootstrap communities, reward early users, or promote a launch.
Strategically using a protocol to maximize eligibility for future token airdrops, often with many wallets.
Stablecoin that targets a peg using market incentives or supply rules instead of fully backed collateral. Risky during stress.
Permission that lets a contract spend a user’s tokens up to a set amount, approved via the ERC‑20 standard.
List of addresses granted early access or special mint/claim rights, often used in NFT launches.
Information edge that can generate outsized returns, also used for early product previews in software.
Any cryptocurrency that is not Bitcoin. Broad term that spans utility, governance, meme, and stable tokens.
On-chain trading model that uses liquidity pools and a pricing formula instead of traditional order books.
AI specialized for a specific task or domain, like image labeling or translation. Most deployed AI today.
Techniques to spot unusual patterns in data, used for fraud detection, ops alerts, and model safety.
Number of indistinguishable participants in a privacy system. Larger sets usually mean stronger privacy.
Laws and controls to prevent illicit funds from moving through financial systems, often paired with KYC rules.
Application Programming Interface, a contract for software to talk to other software, including blockchain RPCs.
Secret credential used to authenticate API requests. Treat like a password, rotate if exposed.
Non‑compounded yearly rate used to compare borrow and lend costs across protocols.
Compounded yearly return, includes effect of reinvesting rewards. Often higher than APR.
Profiting from price differences for the same asset across markets or pools, often with bots and MEV techniques.
An Ethereum Layer 2 rollup family focused on lower fees and higher throughput while inheriting L1 security.
Node that stores full historical state for all blocks, enabling queries at any past block height.
Hypothetical AI that vastly exceeds the best human minds across creativity, wisdom, and problem‑solving.
Specialized hardware optimized to compute a specific proof‑of‑work algorithm at very high efficiency.
Cryptography using public and private keys, enabling signatures and secure key exchange over open networks.
Cross‑chain trade that either completes for both parties or reverts for both, often using HTLCs.
Technique that lets models weight different parts of input sequences, central to transformers and modern LLMs.
Verifiable statement about an identity, event, or state. Used in staking, oracles, and decentralized identity.
Metric for binary classifiers representing area under the ROC curve. Higher is generally better.
Independent security review of code and architecture to find vulnerabilities before deployment.
Techniques that expand training data by transforming existing samples, improving robustness and generalization.
Mechanism that periodically claims and reinvests rewards back into a position to increase APY.
Neural network trained to compress and reconstruct inputs, useful for denoising, anomaly detection, and latent features.
Automation of ML tasks like feature engineering, model selection, and hyperparameter tuning.
AI system that can plan, act, and iterate toward goals with minimal human input, often chaining tools and memory.
Measure of uptime and readiness of a system or service. In blockchains, relates to node liveness and data availability.
Family of probabilistic consensus protocols based on repeated random subsampling and metastability.
Privacy‑focused Layer 2 leveraging zero‑knowledge proofs for shielded transactions and programmable privacy.
B
Algorithm that computes gradients layer‑by‑layer to train neural networks via gradient descent.
Ethereum Layer 2 network focused on low fees and scalable apps, developed with the OP Stack.
Protocol‑set minimum fee per gas unit that is burned, adjusting block‑to‑block to target utilization.
The foundational blockchain that provides security and consensus for higher layers, also called Layer 1.
Technique that normalizes activations across a mini‑batch to stabilize and speed up training.
Component that aggregates Layer 2 transactions into batches and posts data or proofs to Layer 1.
Statistical method that updates beliefs with evidence using Bayes’ theorem.
The Proof‑of‑Stake coordination layer for Ethereum that manages validators, committees, and finality.
Heuristic decoding method that keeps the top‑k partial sequences when generating text or sequences.
Checksum‑friendly address format used in Bitcoin and other chains, starts with prefixes like bc1.
Standardized dataset and metrics used to compare models and track progress, e.g., ImageNet or MMLU.
Token standard used on BNB Smart Chain, similar to ERC‑20 but with chain‑specific details.
Pre‑launch software stage intended for wider testing, may contain bugs and limited features.
Systematic errors in model outputs arising from data, objectives, or deployment context, affecting fairness.
Cryptographic map between groups enabling schemes like BLS signatures and zk‑SNARK verification.
Design document that proposes standards or changes for Bitcoin, similar in spirit to Ethereum’s EIPs.
Binary payload attached to special transactions to lower data availability costs for rollups.
The dedicated data availability market introduced by blobs, separate from traditional call‑data space.
A batch of transactions bundled, validated, and linked to the previous block, forming a chain.
Web app for inspecting blocks, transactions, addresses, and contract state on a blockchain.
Maximum total gas that can be consumed by all transactions in a block, constraining throughput.
Summary fields of a block, including parent hash, state roots, timestamp, and other consensus data.
Number of blocks in the chain up to a given block, starting at zero for the genesis block.
Role that executes transactions and maintains node operations; collectively with Producers and Verifiers forms the “Block Keepers”.
Reward portion allocated to Block Keepers for compute, storage, and reliable operation during their epoch.
Collective term for Block Producers, Block Keepers (role), and Acki‑Nacki Verifiers when not addressed separately.
Reward portion allocated to Block Managers per management epoch.
Management cohort in Acki Nacki that receives a defined share of rewards per management epoch.
Network participant responsible for proposing blocks in their epoch window under the PoS schedule. Part of the “Block Keepers” group.
The process and latency of broadcasting a new block throughout the network’s peers.
Native issuance and fees awarded to the entity that proposes or validates a block.
Average time between consecutive blocks on a chain, affecting latency and UX.
Distributed ledger secured by cryptography and consensus, where data is written in append-only blocks.
The scarce resource of on‑chain computation and data availability that users bid for via fees.
Probabilistic data structure for fast set membership checks with false positives but no false negatives.
Signature scheme supporting efficient aggregation, widely used in Ethereum staking and consensus.
Price function that automatically adjusts token price based on supply or demand, enabling instant liquidity.
Reward paid to security researchers for responsibly disclosing vulnerabilities in code or infrastructure.
Infrastructure that transfers assets or messages between blockchains, usually by locking on one side and minting on the other.
Participant in proposer‑builder separation that constructs blocks, often competing in auctions for MEV.
Ordered set of transactions submitted together to capture MEV opportunities with preserved execution ordering.
Permanent removal of tokens from circulation by sending to an unrecoverable address or burning mechanism.
Mechanism letting NACKL holders destroy tokens in exchange for their proportional share of the Accumulator’s assets.
Property of a system to reach agreement even when some participants act arbitrarily or maliciously.
Classic distributed systems problem describing coordination with unreliable or traitorous participants.
C
Degree to which predicted probabilities reflect true outcome frequencies; improved with temperature scaling.
Immutable input bytes provided to a contract call, accessible via calldata in Solidity; cheaper than memory.
Solidity data location specifier for function parameters, marking them as read‑only and non‑modifiable.
The officially supported cross‑chain bridge for a network, generally with security assumptions closest to the core protocol.
When a model forgets previously learned tasks while being trained on new tasks in sequence.
Loss function for multi‑class classification comparing predicted distributions to one‑hot targets.
Ability of a protocol to include valid transactions and data despite adversarial actors or regulators.
Custodial trading platform that holds user funds and matches orders off‑chain, opposite of a DEX.
Attestation scheme to show a custodian holds sufficient assets, ideally with liabilities proofs and user verification.
AMM design that maintains an invariant like x*y=k or more complex functions to price swaps.
Unique identifier for an EVM chain used to prevent replay across networks and select correct signer domain.
Event where the canonical chain switches to a different branch, replacing recent blocks due to consensus.
Prompting technique that encourages step‑by‑step reasoning traces from language models.
Periodically committed state summary that accelerates sync and helps finalize or validate recent history.
Hash‑based identifier used in IPFS and content‑addressed storage to reference immutable data.
Algorithm for encrypting and decrypting data, such as AES or ChaCha20.
Constraint system that encodes a computation for proving and verifying via zk‑SNARKs or zk‑STARKs.
Emergency mechanism to pause protocol actions during incidents; must be carefully governed to avoid centralization.
Software that executes transactions and maintains state for a blockchain, e.g., Geth, Erigon, Nethermind.
Security property achieved by distributing node share across multiple independent client implementations.
Bitcoin opcode enforcing absolute timelocks via block height or timestamp.
Neural network architecture using convolutions, effective for images, audio, and spatial data.
Special transaction that creates new coins and collects fees for the block producer or validator.
Privacy technique that combines many users’ UTXOs into a single transaction to break chain analysis.
Offline wallet or hardware device that stores keys away from internet‑connected systems.
Value of collateral relative to borrowed or issued assets; staying above thresholds avoids liquidation.
Two‑phase pattern where a hash commitment is posted first and the plaintext is revealed later, preventing front‑running.
Property that lets protocols and contracts interoperate like Lego blocks to form new applications.
Table summarizing classification results by true vs predicted labels to analyze errors.
The mechanism by which nodes agree on the state of the ledger, examples include Proof of Work and Proof of Stake.
Component responsible for validator sets, finality, and fork choice, e.g., Ethereum’s Beacon clients.
Storage where data is located by its hash rather than a path or URL, enabling immutability and deduplication.
Maximum sequence length a language model can attend to at once, measured in tokens.
Learning paradigm that pulls related samples together and pushes unrelated ones apart in embedding space.
Contract architecture where a proxy delegates calls to an implementation controlled by an admin or governance.
Technique for conditioning diffusion models with structural hints like edges, poses, or depth maps.
Process where researchers privately disclose issues, vendors patch, then public details are released responsibly.
Framework for building application‑specific blockchains using Tendermint/CometBFT consensus.
Smart contract platform for Cosmos chains using WebAssembly and Rust, enabling portable contracts.
Risk that the other party in a transaction fails to deliver, amplified in custodial or bridge setups.
Operations or messaging that move assets or data across different blockchains or layers.
Component in rollup stacks that passes messages between L1 and L2, often with a challenge period.
Security achieved by aligning incentives and penalties so that attacks are economically irrational.
Study of secure communication techniques, including hashing, signatures, and encryption.
Bitcoin opcode enforcing relative timelocks for spending UTXOs, enabling channels and vaults.
Proof‑of‑work algorithm based on finding cycles in large graphs, designed to be memory bound.
Total gas consumed by all transactions up to a given point within a block.
AMM optimized for like‑kind assets with low slippage using a stable‑swap invariant.
Liquidity pool on Curve for swapping correlated assets, often with gauges and incentives.
Wallet where a third party controls private keys on behalf of the user.
D
Specialized network for publishing and sampling data, used by rollups to reduce L1 costs.
Guarantee that transaction data is published for verification so that state transitions can be proven.
Graph structure without cycles used by some ledgers for parallel transaction confirmation.
Planned Ethereum upgrade to scale data availability by introducing many blob lanes with single proposer.
On‑chain governance structure where token or reputation holders propose and vote to manage resources.
A token-governed group coordinating via smart contracts and on-chain voting, with transparent rules and treasuries.
Application that runs on a blockchain or decentralized network using smart contracts.
An application that runs on a blockchain or similar network, using smart contracts for core logic.
Trading venue where orders are hidden until execution to reduce front‑running; hard to decentralize safely.
Technique where light nodes randomly sample encoded shares to verify that full data was published.
Evidence produced by data availability sampling that a block’s data is accessible with high probability.
Adversarial manipulation of training data to degrade or control model behavior.
Selecting, deduplicating, and filtering data to improve quality and reduce bias in training sets.
When the distribution of real‑world data differs from the training distribution, causing degraded model performance.
Investment method of buying a fixed amount at regular intervals regardless of price, reducing timing risk.
Automated strategy that splits orders into timed slices, often implemented via keeper networks or smart vaults.
Build process that produces identical binaries from the same source to enable reproducible verification.
Interactive verification process used by optimistic rollups to prove fraud via bisection and on‑chain resolution.
Attack that floods a service or network with traffic to overwhelm and degrade availability.
Mempool design that mitigates spam and flooding using fees, per‑peer limits, and reputation.
Distribution of control across many parties to reduce single points of failure and capture.
Surface‑level decentralization signals without real dispersion of power or risk, common in governance washing.
Surface in feature space that separates classes according to a model’s predictions.
Sequence‑to‑sequence architecture with bidirectional encoders and autoregressive decoders, used in translation.
Architecture used in LLMs that autoregressively predicts the next token with causal attention.
Combines neural networks with reinforcement learning for agents that act in environments to maximize reward.
Synthetic media generated by AI that swaps or fabricates faces, voices, or scenes.
Financial services built on smart contracts, including lending, exchanges, derivatives, and asset management.
Financial services built on public blockchains, open to anyone with a wallet, programmable and composable.
Design choice that discourages stake delegation through economic and security constraints, favoring direct participation.
Path notation like m/44’/60’/0’/0/0 that derives child keys deterministically from a master seed.
Contracts whose value derives from an underlying reference, such as perpetuals, futures, and options.
Finality model where once a block is finalized it cannot be reverted unless safety assumptions break.
Wallet where all addresses are derived from a single seed using a standardized path scheme.
On‑chain exchange using AMMs or order books where users keep custody of funds.
Peer‑to‑peer key‑value lookup system used for locating content in networks like IPFS and BitTorrent.
Globally unique ID controlled by the subject, resolved to a DID Document containing keys and endpoints.
JSON‑LD document describing public keys, verification methods, and service endpoints for a DID.
Specific scheme such as did:ethr or did:key that defines how DIDs are created and resolved.
Software that takes a DID and returns its DID Document using a method‑specific driver.
Privacy guarantee that limits the impact of any single record on aggregated outputs by adding calibrated noise.
Measure of how hard it is to find a valid PoW hash; adjusts to target block time.
Mechanism that exponentially increases mining difficulty to encourage protocol upgrades.
Generative model that learns to denoise data from noise through a reverse diffusion process.
Cryptographic proof that a message was authorized by the holder of a private key, e.g., ECDSA, EdDSA, BLS.
Reduction of ownership percentage as supply increases through issuance, vesting, or inflation.
Time during which parties can challenge a rollup batch or bridge message before finalization.
Technique where a small student model learns to mimic a larger teacher model’s outputs.
Protocol where multiple parties jointly generate a keypair without any single party knowing the full secret.
Email authentication method using domain‑signed headers; relevant for oracle feeds and governance emails.
Bitcoin smart contract approach where an oracle’s signature determines contract outcomes without revealing terms.
Umbrella term for distributed databases maintained by a network of participants, including blockchains.