Glossary
The issuance of a digital asset to the public, usually with some qualifying reason such as being active on a blockchain network or holding another specific asset.
A process or sequence of rules used in problem-solving operations.
An order with a stipulation that it must be filled in its entirety or not at all. Designed to prevent the partial filling of orders.
The highest price a cryptocurrency has achieved against a quote currency, such as the US Dollar or BTC.
A portion of tokens or equity that gets distributed to a certain party or entity for various reasons including purchase, earned equity or partnership arrangement.
The first version of a primitive, piece of software or product. Also, valuable insight or information on a project or opportunity.
A term used to describe all cryptocurrencies and tokens that are not Bitcoin.
Annual Percentage Rate or APR is the rate of return earned on an investment over a one year period.
Annual Percentage Yield or APY is the rate of return earned on an investment with compound interest factored into the calculation.
A legal and regulatory framework designed to prevent the flow of funds that are obtained from illicit activities.
A software intermediary that allows two applications to talk to each other and execute a set of functions and procedures programmatically.
An integrated circuit designed specifically to maximize its performance for a particular application, rather than for general-purpose use.
The buying and selling of the same asset across different markets in order to take advantage of a difference in price.
The lowest price the seller of an asset is willing to accept on their sell order.
Also commonly referred to as “public-key cryptography”; allows an actor to utilize two mathematically linked— yet distinct— keys to sign and/or encrypt a datum.
The use of asymmetric cryptography to encrypt a datum with a public key such that it can only be decrypted with a mathematically linked (yet distinct) private key, for the purposes of maintaining the datum’s confidentiality. Note: asymmetric encryption is similar to (but distinct from) a cryptographic signing workflow.
Events or operations within an electronic system that do not happen at the same time or speed, and can operate independently of the main program flow.
Smart contract technology that allows for the exchange of one crypto asset for another without the need for a centralized intermediary.
Areas in a software system where attackers can attempt to enter or extract data from the system.
A live event where an asset or service is sold through a bidding process.
An automated market maker (AMM) is the underlying protocol that powers all decentralized exchanges (DEXs). Simply put, they are autonomous trading mechanisms that eliminate the need for centralized exchanges and related market-making techniques.