U

Transaction that is broadcast and sitting in the mempool but not yet included in a block; may be replaced or dropped under congestion or policy rules.

Lending where borrowers post less collateral than the loan value, relying on credit scoring, real‑world enforcement, or guarantees beyond on‑chain liquidation.

When a model is too simple to capture patterns in the data, leading to high bias and poor training and test performance.

Security property that signatures or proofs cannot be created by anyone without the secret key; cornerstone of digital signature and zk systems.

Model trained on a single modality such as text or images, as opposed to multimodal systems that process multiple input types together.

Automated market maker protocol enabling token swaps via liquidity pools; introduced constant‑product AMMs and later concentrated liquidity designs.

Liquidity providers choose price ranges for their deposits, creating higher capital efficiency but requiring active management and exposing to range risk.

Extensibility points that let custom logic run on pool events like swaps or liquidity changes, enabling features such as dynamic fees or on‑chain TWAMMs.

Result showing that sufficiently large neural networks with non‑linear activations can approximate any continuous function on compact domains to arbitrary accuracy.

Trusted setup that works for any circuit within certain size bounds, so one ceremony can support many applications, unlike per‑circuit setups.

Raw inputs without ground‑truth annotations; used in self‑supervised, unsupervised, or pretraining regimes to scale model learning.

Privacy property ensuring that two actions or identities cannot be reliably linked; goal of mixers, ring signatures, and privacy‑preserving credentials.

Timeline for when locked tokens become transferable, typically after cliffs and linear vesting, important for liquidity and sell‑pressure analysis.

Process of withdrawing staked tokens from a validator or pool; may trigger an unbonding period and forfeit rewards during that time.

Learning from unlabeled data to discover structure such as clusters or latent factors; includes methods like autoencoders and k‑means.

Trusted setup where participants can add new randomness later, so as long as one contribution is honest the toxic waste remains unknown even if others are compromised.

Proxy contract that delegates calls to an implementation address which can be changed by an admin or governance, enabling upgrades without migrating storage.

Privileged key or role with power to change implementations or parameters; centralization risk mitigated with multisigs, timelocks, and on‑chain governance.

Design patterns that allow changing contract logic after deployment while preserving state, typically via proxies; increases flexibility but adds trust assumptions.

Estimating the causal impact of an intervention on an individual compared to control, often used for targeting marketing or product treatments.

String that identifies a resource on the web or IPFS/Arweave; in NFTs, tokenURI points to metadata JSON describing the asset.

Transaction‑like object used in account abstraction, containing calls, signatures, and gas limits, bundled by a paymaster/aggregator into on‑chain execution.

Interactive AI pattern where human input guides or corrects the model during or after inference, improving quality and accountability.

Separate mempool for ERC‑4337 user operations maintained by bundlers, with its own fee rules, reputation limits, and validation pipelines.

Unicode text encoding widely used on the web and in smart contract ABIs and logs; variable‑length with ASCII compatibility.

Token designed to provide access, usage rights, or fee discounts within a protocol rather than representing ownership, claims, or debt obligations.

Combining many small UTXOs into fewer larger ones during low‑fee periods to reduce future transaction size, cost, and privacy leakage from change outputs.

Very small outputs whose value is close to or below the cost to spend them; can bloat wallets and reveal addresses when later consolidated.

Accounting approach where balances are represented by sets of spendable outputs rather than account states; enables parallel validation and simple verification.

The current collection of all unspent outputs tracked by a full node; its size affects memory usage and initial sync time.

Discrete output from a blockchain transaction that can be spent as an input in a future transaction; core to Bitcoin’s accounting model.

Universal Upgradeable Proxy Standard where the implementation contract includes the upgrade logic; reduces proxy surface area compared to admin‑proxy patterns.

V

Generative model that learns a latent distribution by optimizing a variational lower bound, useful for synthesis and representation learning.

Participant in a proof of stake or similar consensus that proposes and attests to blocks, earning rewards and facing slashing for misbehavior.

Requirement that validators stay online and sign duties on time, missing duties can reduce rewards or trigger inactivity leaks.

The active group of validators eligible to produce blocks in a given epoch, often rotated by stake weight or elections.

Penalty that burns or seizes a validator’s stake for double signing, equivocation, or liveness failures, designed to secure the network by economic deterrence.

Cryptographic proof that a state transition is correct without re executing it, used in zk rollups and validium systems to ensure safety with minimal on chain work.

L2 design that uses validity proofs for state transitions while storing data off chain, improving throughput at the cost of data availability trust assumptions.

Growth tactic where a new protocol lures liquidity or users from an incumbent with rewards or fee cuts, often via incentives and airdrops.

Blockchain address with user chosen prefix or pattern generated by trial and error, may weaken security if created with untrusted tools.

Smart contract that aggregates user deposits and auto compounds yield strategies, often with risk controls and performance fees.

W3C data model for cryptographically signed claims that can be privately presented and verified without contacting the issuer, often used with DIDs.

Elliptic curves or groups chosen to make verifiable delay functions efficient and secure, balancing hardware resistance and verification speed.

Function that takes a set minimum time to compute even with parallelism, yet is fast to verify, used for leader election and randomness beacons.

Cryptographic commitment to a sequence of values that supports short proofs for element openings, examples include KZG commitments used in rollups and data availability.

Database optimized for storing and searching embeddings with approximate nearest neighbor indexes, used for RAG and semantic search.

Numeric representation of text, image, or other data in a high dimensional space where semantic similarity corresponds to vector distance.

Package of one or more verifiable credentials shown to a verifier, may use selective disclosure or zero knowledge to reveal only required attributes.

Public parameter used by a verifier to check cryptographic proofs, usually generated alongside a proving key in trusted setups or universal schemes.

Smart contract or program that checks a zero knowledge or validity proof using a verification key, returning true if the proof is correct.

Commitment tree using vector commitments to reduce proof size and speed state proofs compared to Merkle Patricia tries, proposed for Ethereum state.

Process by which token allocations become unlocked over time according to a schedule, aligned with cliffs and linear release to reduce immediate sell pressure.

Initial period during which no tokens unlock, followed by the first large release, common in team and investor allocations to align incentives.

Smart contract function that reads state without modifying it, callable off chain without gas, marked as view or pure in EVM languages.

Image model that applies transformer architectures to patch tokens, scaling well with data and compute, often used in multimodal and perception stacks.

Hybrid L2 approach letting users choose between on chain data availability like a rollup or off chain like a validium on a per transaction basis.

Cryptographic primitive that produces a random output and proof verifiable by anyone, used for lotteries, leader election, and fair on chain randomness.

Average price of an asset weighted by traded volume over a period, target for execution algorithms to minimize market impact in centralized and on chain venues.

Vyper

Python like smart contract language for the EVM focused on simplicity and auditability, with restricted features to reduce attack surface compared to Solidity.

W

Security layer that filters HTTP traffic using rules to block injections, bots, and DDoS, often fronting RPC gateways, explorers, and dapp APIs.

Wallet

Software or hardware that manages keys and signs transactions, sometimes offering custody or MPC features.

Software or hardware that lets a user control private keys directly to sign transactions; recovery depends on seed phrase or social recovery mechanisms.

UX pattern where smart contract wallets handle gas, session keys, and custom auth under account abstraction standards, reducing seed phrase friction for users.

Base58Check encoded private key format used by Bitcoin and similar chains to import or export keys; includes network prefix and compression flag.

Protocol that connects dapps and wallets over relays using QR codes or deep links, enabling remote signing without exposing private keys to the dapp.

Schedule that gradually increases the learning rate at the start of training to stabilize optimization, commonly combined with cosine decay or step schedules.

Statement that is regularly updated to indicate no secret legal requests have been received; removal signals possible compelled disclosure without violating gag orders.

Manipulative practice where the same party buys and sells an asset to inflate volume or price; common red flag in thinly traded NFT collections and tokens.

Smart contract runtimes that execute WebAssembly modules with sandboxing and metering, enabling multi language contracts and safer execution than raw EVM bytecode.

Optimal transport based distance between probability distributions; stabilizes GAN training and evaluates distributional shifts more robustly than JS divergence.

Wallet configuration that tracks balances and transactions without holding private keys; useful for monitoring cold storage or multi-sig addresses.

Tokenized bitcoin on EVM chains backed by custodial reserves; enables BTC liquidity to participate in DeFi while inheriting custodian risk.

Property of proof of stake chains that new nodes must rely on a recent trusted checkpoint to sync securely, preventing long range attacks from old validator keys.

Training regime using noisy, partial, or indirect labels like heuristics and distant supervision to scale datasets when full annotation is expensive.

Web3

Vision and stack for user owned internet services built on cryptographic identities, smart contracts, and token incentives, contrasting with platform owned Web2.

Web3

An internet owned by users and builders through tokens and open protocols, with portable identity and value.

Portable binary instruction format that runs at near native speed on the web and in many chains; enables smart contracts in languages like Rust, Go, and C++.

Standard for public key based authentication in browsers using passkeys and hardware authenticators, often used to log into smart wallets without passwords.

WebGPU

Modern web graphics and compute API that exposes low level GPU features for fast ML inference and rendering directly in the browser without plugins.

HTTP callback triggered by events like on chain confirmations or oracle updates, used to notify backends without polling node APIs constantly.

WebRTC

Peer to peer media and data channel technology for browsers; used by decentralized apps for real time messaging, file sharing, and node to node signaling.

Bidirectional connection protocol used by node providers and dapps to stream new blocks, mempool events, and real time updates efficiently.

Form of elliptic curves commonly used in cryptography, such as secp256k1 for Bitcoin and ECDSA; different forms trade speed and security properties.

L2 regularization technique that penalizes large parameter values to reduce overfitting; often decoupled from momentum in modern optimizers like AdamW.

Automated market maker design where pools maintain non 50/50 token weights to track target indexes or volatility preferences, e.g., Balancer weighted pools.

ERC-20 representation of ETH used in DeFi protocols that expect token interfaces; 1 WETH is redeemable for 1 ETH via deposit and withdraw functions.

GAN objective that minimizes the Wasserstein distance with a critic network constrained by Lipschitz conditions, improving training stability and mode coverage.

Whale

Market participant with large holdings whose trades can move price or supply liquidity; often tracked by on chain analytics and alert bots.

Open source automatic speech recognition model known for robustness across accents and noise; often used to transcribe crypto podcasts and dev calls.

Early peer to peer messaging layer for Ethereum clients aimed at private dapp communications; largely superseded by newer protocols and off chain services.

List of approved addresses permitted to mint, claim, or access beta features; modern usage prefers the neutral term allowlist over whitelist.

Hash committed in a validator’s deposit that specifies where withdrawn funds can be sent; can point to BLS keys or an execution address after updates.

Mechanism that processes validator exits and partial withdrawals over time to protect liveness; limits daily churn and can delay large batch exits.

Signature and script data moved outside the legacy transaction structure by SegWit, enabling malleability fixes and block weight accounting improvements.

Encryption scheme where a message can be decrypted by providing a witness to an NP statement’s truth, proposed for time lock and on chain puzzles.

Neural embedding technique that learns word vectors from co occurrence statistics using CBOW or Skip Gram, foundational for many NLP systems pre transformers.

Subword tokenization algorithm used by BERT like models to balance vocabulary size and coverage by splitting rare words into learned pieces.

Key value view of current ledger data maintained by permissioned frameworks like Hyperledger Fabric to speed queries compared to scanning full block history.

Cross chain messaging system that locks or burns assets on one chain and mints representations on another via guardian validators and relayers.

Representation of an asset on another chain or format via custodial or trustless bridges; maintains a peg through reserves or proofs of reserve mechanisms.

Durability technique where updates are first recorded to an append only log before applying to state; used in node databases and indexers for crash recovery.

Lightning channel with capacity above earlier default limits, used by routing nodes and services to improve throughput for large payments.

X

Address format that embeds the destination tag with the account on XRPL to reduce misdirected deposits on exchanges and services supporting tags.

HTTP response header, typically set to nosniff, that prevents MIME type sniffing and reduces the risk of drive by downloads or script confusion attacks in dapps.

HTTP header that controls whether a page can be framed, mitigating clickjacking on wallet popups and admin dashboards; modern CSP frame-ancestors is preferred.

Public key certificate format used across TLS and code signing; relevant for RPC gateways, API auth, and hybrid Web3 systems that integrate with Web PKI.

X25519

Elliptic curve Diffie–Hellman key exchange using Curve25519, fast and widely deployed for TLS, secure messengers, and wallet communication.

X448

Higher security ECDH curve over Edwards448 offering larger key sizes than X25519; used where longer term security margins are required.

Methods that make model predictions understandable to humans, including feature attributions and counterfactuals, important for regulated DeFi and identity scoring.

Parameter initialization scheme that keeps variance constant across layers to stabilize training of deep networks, also called Glorot initialization.

AEAD construction extending ChaCha20-Poly1305 with a 192-bit nonce via HChaCha20 for safer random nonce use, common in secure messaging and wallets.

Polkadot framework for sending messages and assets between parachains and external systems, designed to be agnostic to consensus specifics while preserving safety.

Mechanism for direct communication between Polkadot parachains, enabling trust minimized cross chain function calls and asset transfers coordinated by the relay chain.

EVM sidechain historically branded xDai, now Gnosis Chain; stable, low fee environment often used for payments and DAO operations with bridges to Ethereum.

Security tooling that correlates signals across endpoints, network, cloud, and identity to detect and respond to threats, used by exchanges and critical Web3 infra.

Type-1 hypervisor used in cloud platforms; relevant for running validator nodes and indexers with strong isolation and live migration capabilities.

Optimized gradient boosted decision tree library used for tabular ML tasks like fraud detection, with regularization and parallel training support.

Compiler that fuses and lowers ML operations to optimized kernels across CPU, GPU, and TPU backends, speeding model training and inference pipelines.

Remote procedure call protocol using XML over HTTP; largely replaced by JSON-RPC in blockchain stacks but still found in older CMS and integrations.

Privacy-focused cryptocurrency using ring signatures, stealth addresses, and confidential transactions; ticker XMR is commonly used on exchanges and charts.

Hash function variant that can produce arbitrary length output, e.g., SHAKE128/256; useful in ZK systems and key derivation for flexible digest sizes.

Bitwise operation returning 1 when inputs differ; foundational for stream ciphers, secret sharing, and many Merkle–Damgård constructions in crypto protocols.

BIP32 private root that can derive the entire HD wallet keychain; compromise of an xprv exposes all descendant keys, must be stored with strong protection or hardware isolation.

BIP32 key that allows derivation of child public keys without private keys; useful for watch-only wallets and address discovery, must be kept confidential to avoid privacy leaks.

Public blockchain focused on fast settlement and issued assets, using a Byzantine agreement style consensus among validators rather than mining or staking.

Injection attack that executes untrusted scripts in a user’s browser, a key risk for dapps that render user provided NFT metadata or markdown without sanitization.

Block cipher mode for disk encryption that provides tweakable confidentiality across sectors; relevant for protecting validator keys at rest on servers and laptops.

Supply chain compromise of the xz compression utilities that underscores risks in open source dependencies and the need for provenance, SLSA, and reproducible builds.

Y

Software principle advising against implementing features until they are necessary, useful when scoping MVPs for dapps and AI integrations.

Human friendly data serialization format used for config files, CI pipelines, and infrastructure as code; sensitive to indentation and whitespace.

Mechanism to reuse and override configuration blocks within YAML files, reducing duplication in CI workflows, k8s manifests, and ML experiment configs.

YAMNet

Audio event classification model trained on YouTube AudioSet embeddings, used for tagging sounds in video and real time monitoring applications.

Colloquial phrase for rug pull, when creators drain liquidity or revoke functionality to steal user funds; watch for upgrade keys and admin powers.

Secure two party computation technique that allows evaluation of a function over private inputs without revealing them, basis for private matching and auctions.

Classic secure computation problem where two parties learn who has a larger value without revealing the actual numbers, motivating privacy preserving protocols.

Pattern based malware detection language used by security teams to hunt for payloads or indicators of compromise in codebases, images, and logs.

Node package manager known for lockfiles and monorepo workflows; often used in dapp frontends with PnP and workspaces for deterministic installs.

Cluster resource management layer in Hadoop ecosystems that schedules compute across nodes, powering big data and some on chain analytics pipelines.

DeFi protocol offering automated vault strategies and yield products; emits yvTokens as vault receipts that appreciate versus the deposit asset over time.

Formal specification of the Ethereum protocol covering state transition function, gas costs, and VM semantics, authored initially by Gavin Wood.

Experimental end to end encrypted IPv6 mesh networking protocol that can be used to interconnect nodes over the public internet without central routing.

Smart contract vaults that automate yield strategies across pools or lenders and auto-compound rewards, charging a management or performance fee.

Token whose balance or exchange rate increases as underlying assets earn interest or rewards, e.g., staked ETH derivatives or vault receipts.

Strategy of moving liquidity across protocols to earn fees, incentives, or interest, balancing APY against smart contract and market risk.

Family of real time object detection models that predict bounding boxes and classes in a single forward pass, widely used for edge and browser inference.

Extended private key corresponding to ypub for BIP49 derivations; compromising a yprv exposes all descendant keys for that branch, store with strong isolation.

Version prefix indicating an extended public key for P2WPKH-in-P2SH addresses per BIP49; used by some wallets for format clarity alongside xpub/zpub variants.

Compact hardware security module for server side key storage and signing, used to protect validator keys, hot wallets, and admin credentials in production.

Hardware security key that stores private credentials and performs FIDO2/WebAuthn, OTP, and PIV operations, commonly used for exchange and admin MFA.

Low level, chain agnostic intermediate language used by Solidity and Vyper compilers for optimized bytecode generation and inlined assembly sections.

Tongue in cheek reference to tracking luxury and meme indicators as a proxy for risk appetite; not scientific but often used in crypto narratives.

Receipt token representing a share in a Yearn vault; its price in the underlying asset increases as the strategy harvests and compounds yields.

Z

Shielded Zcash address that keeps sender, receiver, and amount private using zk-SNARKs, contrasted with t-addresses that are transparent like Bitcoin.

Stacking order property that controls which element appears on top in layered UIs, relevant for modals, wallet prompts, and canvas overlays in dapps.

Space-filling curve used to map multidimensional data to one dimension while preserving locality. Applied in databases, graphics, and some Merkleized indexes.

Number of standard deviations a value is from the mean; useful for anomaly detection in exchange flows, validator metrics, and AI feature engineering.

Format for storing large N-dimensional arrays in chunks across filesystems or object storage; handy for ML datasets and on-chain analytics features at scale.

Privacy-focused blockchain that introduced zk-SNARKs to enable shielded transactions. Supports transparent and shielded pools; proposals tracked as ZIPs.

Special Ethereum address of all zeros used as a burn sink, default value, or sentinel in smart contracts. Transfers to it are effectively unrecoverable.

Transaction whose gas is sponsored by a relayer or paymaster, enabling users to sign but not fund fees directly. Common with smart accounts and onboarding flows.

Security model that assumes no implicit trust based on network location. Enforces continuous verification and least privilege for users, services, and machines.

Cryptographic method to prove a statement is true without revealing the underlying information. Powers private payments, identity, and L2 rollups.

A cryptographic method to prove a statement is true without revealing the underlying information.

High-performance messaging library with pub/sub, req/rep, and pipeline patterns. Used in node infrastructure, indexers, and trading systems for low-latency IO.

Low-level systems language focused on performance and safety without a GC; used for crypto tooling, provers, and high-assurance infrastructure components.

Low-power wireless mesh networking standard used in IoT. Relevant to oracle hardware, sensor networks, and trusted data collection at the edge.

Sharded smart-contract platform with Scilla language and token standards like ZRC-2; designed for high throughput and parallel transaction processing.

Governance and specification documents for protocol changes in Zcash, analogous to Ethereum’s EIPs and Bitcoin’s BIPs. Numbered and versioned proposals.

Cross-chain bridge that verifies state using zero-knowledge proofs instead of multisigs or external validators, reducing trust assumptions for asset transfers.

ZK-EVM

An EVM-compatible environment where execution can be proven with zero-knowledge proofs. Comes in types (1–4) balancing bytecode equivalence, prover speed, and compatibility.

L2 scaling that posts compressed state and validity proofs to L1. Offers strong security with fast finality once the proof is verified on-chain.

Succinct Non-Interactive Argument of Knowledge enabling short proofs and fast verification. Common schemes include Groth16 and PLONK; often needs a trusted setup.

Scalable Transparent Argument of Knowledge that avoids trusted setup and uses hash-based security; proofs are larger but post-quantum friendly assumptions are appealing.

ZK-VM

Virtual machine whose execution trace can be proven in zero-knowledge, often RISC-V or custom IR based, enabling general-purpose verifiable compute.

Hash primitives designed for efficient use inside ZK circuits, e.g., Poseidon or Rescue, minimizing arithmetic constraints for Merkle trees and commitments.

File format used by tools like snarkjs containing proving and verification material derived from a trusted setup ceremony for zk-SNARK circuits. Handle with care.

Techniques to prove ML model inference was executed correctly without revealing model weights or inputs, enabling private scoring and verifiable on-chain AI.

Runtime validation and TypeScript-first schema library used to enforce API and config shapes in dapp frontends, bots, and serverless functions.

Distributed coordination service for configuration, naming, and leader election. Underpins many Kafka and HBase deployments in analytics for on-chain data.

Fungible token standard on Zilliqa akin to ERC-20; defines interfaces for transfers, allowances, and metadata on the Scilla smart-contract platform.

Unix shell with advanced completion and scripting features, widely used by developers. Pairs with tools like Oh My Zsh for productivity on blockchain ops boxes.

Modern compression algorithm with high ratios and fast speeds; widely used for log archives, snapshots, and state sync in blockchain and ML data pipelines.