The next web, explained in plain English
Software or hardware that manages keys and signs transactions, sometimes offering custody or MPC features.
Software or hardware that lets a user control private keys directly to sign transactions; recovery depends on seed phrase or social recovery mechanisms.
UX pattern where smart contract wallets handle gas, session keys, and custom auth under account abstraction standards, reducing seed phrase friction for users.
Base58Check encoded private key format used by Bitcoin and similar chains to import or export keys; includes network prefix and compression flag.
Protocol that connects dapps and wallets over relays using QR codes or deep links, enabling remote signing without exposing private keys to the dapp.
Schedule that gradually increases the learning rate at the start of training to stabilize optimization, commonly combined with cosine decay or step schedules.
Statement that is regularly updated to indicate no secret legal requests have been received; removal signals possible compelled disclosure without violating gag orders.
Manipulative practice where the same party buys and sells an asset to inflate volume or price; common red flag in thinly traded NFT collections and tokens.
Smart contract runtimes that execute WebAssembly modules with sandboxing and metering, enabling multi language contracts and safer execution than raw EVM bytecode.
Optimal transport based distance between probability distributions; stabilizes GAN training and evaluates distributional shifts more robustly than JS divergence.
Wallet configuration that tracks balances and transactions without holding private keys; useful for monitoring cold storage or multi-sig addresses.
Tokenized bitcoin on EVM chains backed by custodial reserves; enables BTC liquidity to participate in DeFi while inheriting custodian risk.
Property of proof of stake chains that new nodes must rely on a recent trusted checkpoint to sync securely, preventing long range attacks from old validator keys.
Training regime using noisy, partial, or indirect labels like heuristics and distant supervision to scale datasets when full annotation is expensive.
An internet owned by users and builders through tokens and open protocols, with portable identity and value.
Vision and stack for user owned internet services built on cryptographic identities, smart contracts, and token incentives, contrasting with platform owned Web2.
Portable binary instruction format that runs at near native speed on the web and in many chains; enables smart contracts in languages like Rust, Go, and C++.
Standard for public key based authentication in browsers using passkeys and hardware authenticators, often used to log into smart wallets without passwords.
Modern web graphics and compute API that exposes low level GPU features for fast ML inference and rendering directly in the browser without plugins.
HTTP callback triggered by events like on chain confirmations or oracle updates, used to notify backends without polling node APIs constantly.
Peer to peer media and data channel technology for browsers; used by decentralized apps for real time messaging, file sharing, and node to node signaling.
Bidirectional connection protocol used by node providers and dapps to stream new blocks, mempool events, and real time updates efficiently.
Form of elliptic curves commonly used in cryptography, such as secp256k1 for Bitcoin and ECDSA; different forms trade speed and security properties.
L2 regularization technique that penalizes large parameter values to reduce overfitting; often decoupled from momentum in modern optimizers like AdamW.
Automated market maker design where pools maintain non 50/50 token weights to track target indexes or volatility preferences, e.g., Balancer weighted pools.
ERC-20 representation of ETH used in DeFi protocols that expect token interfaces; 1 WETH is redeemable for 1 ETH via deposit and withdraw functions.
GAN objective that minimizes the Wasserstein distance with a critic network constrained by Lipschitz conditions, improving training stability and mode coverage.
Market participant with large holdings whose trades can move price or supply liquidity; often tracked by on chain analytics and alert bots.
Open source automatic speech recognition model known for robustness across accents and noise; often used to transcribe crypto podcasts and dev calls.
Early peer to peer messaging layer for Ethereum clients aimed at private dapp communications; largely superseded by newer protocols and off chain services.
List of approved addresses permitted to mint, claim, or access beta features; modern usage prefers the neutral term allowlist over whitelist.
Hash based signature scheme considered post quantum resistant; used as a building block in stateful schemes like XMSS and SPHINCS+.
Hash committed in a validator’s deposit that specifies where withdrawn funds can be sent; can point to BLS keys or an execution address after updates.
Mechanism that processes validator exits and partial withdrawals over time to protect liveness; limits daily churn and can delay large batch exits.
Signature and script data moved outside the legacy transaction structure by SegWit, enabling malleability fixes and block weight accounting improvements.
Encryption scheme where a message can be decrypted by providing a witness to an NP statement’s truth, proposed for time lock and on chain puzzles.
Neural embedding technique that learns word vectors from co occurrence statistics using CBOW or Skip Gram, foundational for many NLP systems pre transformers.
Subword tokenization algorithm used by BERT like models to balance vocabulary size and coverage by splitting rare words into learned pieces.
Key value view of current ledger data maintained by permissioned frameworks like Hyperledger Fabric to speed queries compared to scanning full block history.
Cross chain messaging system that locks or burns assets on one chain and mints representations on another via guardian validators and relayers.
Representation of an asset on another chain or format via custodial or trustless bridges; maintains a peg through reserves or proofs of reserve mechanisms.
Durability technique where updates are first recorded to an append only log before applying to state; used in node databases and indexers for crash recovery.
Lightning channel with capacity above earlier default limits, used by routing nodes and services to improve throughput for large payments.