The Uniblock Crypto/Blockchain Glossary

Web3 jargon got you confused? Get up to speed with our glossary of essential crypto terms. Then build your next big project with Uniblock's powerful and intuitive Web3 solutions.

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

V

W

Z

Đ

Zero address
An all-zeros Ethereum address often used to remove tokens from circulation (distinct from formal burn() removal in some contexts).

Z

Zero-knowledge rollup
A rollup using validity proofs to increase Layer 2 throughput while inheriting mainnet security; avoids challenge latency because transactions are provably valid when submitted.

Z

Wei
The smallest denomination of ether: 10^18 wei = 1 ether.

W

Web3
A vision of the internet with blockchain where users control data and transactions rather than companies.

W

Vyper
A high-level language with Python-like syntax intended to be closer to a pure functional language; created by Vitalik Buterin.

V

Validium
An offchain solution using validity proofs where data isn’t stored on layer 1 mainnet (unlike ZK rollups).

V

Validity proof
A model where rolled-up transactions are computed offchain and submitted with a proof of validity; increases throughput while maintaining security (some use fraud proofs instead).

V

Validator lifecycle
States a validator can be in: deposited, pending, active, slashing, exiting (with definitions as described in the source list).

V

Validator
A PoS node responsible for storing data, processing transactions, and proposing blocks; activating requires staking 32 ETH.

V

Turing complete
A system capable of simulating any Turing machine—i.e., computationally universal.

T

Trustlessness
A network property allowing transactions without needing to trust a third party.

T

Trust assumptions
Basic beliefs about a system’s safety/dependability—what must be trusted for it to work.

T

Transaction
Data signed by an originating account and committed to Ethereum, targeting an address; includes metadata like gas limit.

T

Transaction fee
A fee paid to use Ethereum (sending funds, swapping, etc.); fluctuates with network congestion and is tied to gas required.

T

Token factory
A smart contract template that enables creating new tokens (ERC-20/721/1155) with custom parameters without writing a contract from scratch.

T

Token
A tradable virtual good defined in Ethereum smart contracts.

T

Terminal total difficulty (TTD)
A PoW-era trigger value used to switch execution clients off mining/gossip at the Merge; no longer relevant post-PoS.

T

Testnet
A test network used to simulate mainnet behavior.

T

Szabo
A denomination of ether: 1 szabo = 10^12 wei; 10^6 szabo = 1 ether.

S

Sync committee
A randomly selected validator group refreshed ~every 27 hours; they sign valid block headers so light clients can track chain head.

S

Syncing
Downloading the full latest blockchain data to a node.

S

State
A snapshot of balances and data at a specific point (often at a particular block).

S

Supermajority
More than 2/3 (66%) of total staked ETH; required for finality on the Beacon Chain.

S

Sybil attack
When one person pretends to be many identities to increase influence.

S

State channels
A Layer 2 where participants transact offchain in a channel; only open/close transactions go onchain, enabling high throughput.

S

STARK
“Scalable transparent argument of knowledge”; a type of zero-knowledge proof.

S

SNARK
“Succinct non-interactive argument of knowledge”; a type of zero-knowledge proof.

S

Staking pool
Combined ETH from multiple stakers to reach 32 ETH for validator keys; rewards are split among contributors.

S

Staking
Depositing ETH to become a validator; validators check transactions and propose blocks under PoS and earn rewards, but can be penalized.

S

Stablecoin
A cryptocurrency designed to maintain stable value, often pegged to a fiat currency or commodity.

S

Soft fork
A rule change that is backwards compatible; upgraded nodes can validate blocks from non-upgraded nodes if they follow new rules.

S

Solidity inline assembly
EVM assembly language embedded inside a Solidity program to perform certain operations more directly.

S

Slasher
An entity that scans attestations for slashable offenses; broadcasts proofs that proposers include for a reward.

S

Slot
A 12-second period in PoS when a block may be proposed; slots can be empty; 32 slots form an epoch.

S

Singleton
A programming pattern describing an object of which only one instance can exist.

S

Signing
Cryptographically proving a transaction was approved by the holder of a private key.

S

Sidechain
A separate chain with different consensus rules; typically connected to mainnet via a bridge (distinct from rollups).

S

Shard / shard chain
Discrete blockchain sections that subsets of validators would handle; initially envisioned for scaling but largely superseded by rollup-centric scaling.

S

Seed phrase/recovery phrase
A list of words given when creating a wallet; used to recover access if you lose it.

S

Sequencer
A program that orders transactions in a blockchain network, especially in Layer 2 systems.

S

Serialization
Converting a data structure into a sequence of bytes.

S

Secure Hash Algorithm (SHA)
A family of cryptographic hash functions published by NIST.

S

Remote procedure call (RPC)
A way for one computer to request data/actions from another over a network.

R

Rollups
Layer 2s batching many transactions and posting them to mainnet to reduce fees and increase throughput; includes optimistic and zero-knowledge rollups.

R

Recursive Length Prefix (RLP)
An encoding standard for serializing objects of arbitrary complexity/length in Ethereum.

R

Re-entrancy attack
An attack where an attacker contract re-enters a victim contract during execution (via recursive calls), potentially stealing funds by bypassing state updates.

R

Reward
Ether awarded to validators for duties like proposing blocks or participating in sync committees.

R

Receipt
Client-returned data describing a transaction result, including tx hash, block number, gas used, and contract address if deployed.

R

Public key
A character string enabling others to send you digital currency securely.

P

Public goods
Non-excludable, non-rivalrous goods (e.g., parks/clean air) often provided publicly because charging is hard.

P

Proto-Danksharding
A transaction type accepting “blobs” of data stored temporarily on the beacon chain for 4096 epochs (~18.2 days), reducing node hardware requirements.

P

Proof-of-work (PoW)
A security mechanism requiring computational work/energy to find a value.

P

Proof-of-stake (PoS)
A consensus method where validators prove ownership of stake to participate in validation.

P

POAP
Proof of Attendance Protocol; creates a collectible NFT proving you attended an event/activity.

P

Offchain
Data or transactions outside the blockchain; used to reduce cost/overhead, with periodic onchain submissions (e.g., some oracle/L2 workflows).

O

Private chain
A fully private blockchain with permissioned access, not publicly available.

P

Private key
A secret code proving ownership and enabling spending—do not share it.

P

Plasma
An offchain scaling solution using fraud proofs; limited to simple transfers/swaps.

P

Permissionless
Anyone can join and use the system without approval.

P

Peer-to-peer network
A network of peers providing functionality without centralized servers; used for sharing information/value directly.

P

Peer
Connected computers running Ethereum client software that maintain identical copies of the blockchain.

P

Optimistic rollup
A Layer 2 that assumes transactions are valid unless challenged; disputes can be raised to prove fraud.

O

Onchain
Actions/transactions occurring on the blockchain and publicly available—like writing in a shared, permanent notebook.

O

Ommer (uncle) block
A valid but stale PoW-era block that lost a race to be canonical; could be referenced later for partial rewards. In PoS, only one proposer is selected per slot.

O

Nonce
A value used once; in Ethereum accounts, a transaction counter used to prevent replay attacks.

N

Node
A software client that participates in the network.

N

Non-fungible token (NFT)
A unique digital item you can own (e.g., art/collectibles) verified by blockchain.

N

Network hashrate
The collective hash rate of the mining network; switched off when Ethereum moved to PoS.

N

Multisig
A wallet/account requiring multiple signatures to execute transactions, increasing security vs single-signature accounts.

M

Network
The Ethereum peer-to-peer network propagating transactions and blocks to nodes.

N

Mint
Creating new tokens and bringing them into circulation without a central authority.

M

Miner
A node that finds valid PoW blocks; miners were replaced by validators after Ethereum moved to PoS.

M

Mining
PoW process of hashing block headers while incrementing a nonce until a valid result is found; how new blocks were added before PoS.

M

Merkle Patricia Tree (MPT)
A data structure used in Ethereum to efficiently store key-value pairs.

M

Maximal Extractable Value (MEV)
The maximum value extractable from block production beyond standard rewards/fees by including, excluding, or reordering transactions.

M

Message call
Passing a message from one account to another; if destination has EVM code, the VM runs with that object’s state.

M

Message
An internal transaction never serialized; only sent within the EVM.

M

Merkle Root
The top hash of a Merkle tree verifying all transactions within a block.

M

Max Fee Per Gas
The absolute maximum a user is willing to pay per unit of gas (in gwei) for inclusion.

M

Mainnet
The main public Ethereum blockchain (“main network”).

M

Geth
Go Ethereum, a prominent Ethereum client implementation written in Go.

G

LMD-GHOST
Ethereum consensus fork-choice algorithm: “Latest Message Driven Greediest Heaviest Observed SubTree”; head is the block with greatest accumulated attestations.

L

Liquidity tokens
Tokens issued to liquidity providers representing their share of a liquidity pool; redeemable for deposited assets plus fees earned.

L

Liquidity
How easily an asset can be traded; in DeFi, liquidity pools enable decentralized trading and reward liquidity providers.

L

Light client
An Ethereum client that doesn’t store/validate the full chain locally; offers wallet functions and can create/broadcast transactions.

L

Library
A contract type with no payable functions, no fallback, and no data storage; used as deployed code other contracts call for read-only computation.

L

Layer 2
Networks built atop Ethereum mainnet to make transactions faster and cheaper.

L

Layer 1
The base blockchain in a multi-level system (e.g., Ethereum, Bitcoin) providing core security.

L

Keccak-256
Cryptographic hash function used in Ethereum; standardized as SHA-3.

K

Keystore
JSON keyfile in an Ethereum client containing an encrypted private key, decryptable with the account password.

K

Key
In Ethereum, digital codes: a public key for receiving and a private key for spending/access. Public keys can be shared; private keys must be kept secret.

K

Key derivation function (KDF)
“Password stretching” used by keystore formats to protect passphrases by repeatedly hashing them against brute-force/dictionary attacks.

K

Issuance
Minting new ether to reward block proposal, attestations, and whistle-blowing.

I

Internal transaction
A transaction sent from a contract account to another contract account or an EOA (see “message”).

I

Immutable deployed code problem
Once deployed, contract/library code is immutable, making bug fixes and feature changes harder than in traditional software.

I

Integrated development environment (IDE)
A UI combining tools like a code editor, compiler, runtime, and debugger.

I

Index
A network structure to optimize querying blockchain data by providing an efficient path to storage.

I

Homestead
Ethereum’s second development stage, launched March 2016 at block 1,150,000.

H

Holographic consensus
Decision-making where a smaller representative group votes and others accept the outcome if they trust the process; used in some communities to scale governance.

H

Hash rate
The number of hash calculations per second by computers running mining software.

H

Hard fork
A permanent divergence where non-upgraded nodes can’t validate blocks from upgraded nodes using new rules (not to be confused with soft fork).

H

Hash
A fixed-length fingerprint of variable-length input produced by a hash function.

H

Gwei
A denomination of ether commonly used for gas pricing: 1 gwei = 10^9 wei; 10^9 gwei = 1 ether.

G

Genesis block
The first block in a blockchain used to initialize the network.

G

Gas price
The price in ether of one unit of gas specified in a transaction.

G

Gas limit
The maximum gas a transaction or a block may consume.

G

Frontier
Ethereum’s initial development stage, July 2015 to March 2016.

F

Gas
The fee paid for transactions and smart contract execution on Ethereum.

G

Fraud proof
A model used by some L2s: transactions are rolled up; others can re-execute and submit cryptographic proof of fraud if there’s a discrepancy (some rollups use validity proofs instead).

F

Fork choice algorithm
The algorithm identifying the head of the chain. In Ethereum, head is the fork with greatest “weight” of attestations; on consensus layer this is LMD_GHOST.

F

Fork
A protocol change causing the creation of an alternative chain.

F

Finney
A denomination of ether: 1 finney = 10^15 wei; 10^3 finney = 1 ether.

F

Finality
A guarantee that transactions can’t be changed without a very large amount of ETH being lost.

F

Faucet
A service (often via smart contract) dispensing free test ETH for use on testnets.

F

Fallback function
A default function called when no data or declared function name is provided.

F

EVM assembly language
A human-readable form of EVM bytecode.

E

Ethereum Virtual Machine (EVM)
A stack-based VM that executes bytecode and defines how state changes based on bytecode instructions plus environment data.

E

Events
EVM logging facility; dapps can listen for events and trigger JavaScript callbacks in the UI.

E

Ether
Ethereum’s native currency (“ETH”), used to pay transaction fees and interact with apps.

E

Ethash
Ethereum’s former proof-of-work algorithm used before the transition to proof-of-stake.

E

ERC-1155
A token standard enabling both fungible and non-fungible assets in one smart contract, improving efficiency for games/collections.

E

ERC-721
The NFT standard for non-fungible tokens; each token is unique and distinguishable.

E

ERC-20
The standard most tokens use on Ethereum; examples include DAI, USDC, UNI, etc.

E

Ethereum Request for Comments (ERC)
Technical documentation proposing standards for Ethereum usage, including token standards like ERC-20 and ERC-721.

E

Externally owned account (EOA)
The most common Ethereum account type, controlled by a person via private keys/recovery phrase.

E

Execution layer
Ethereum’s execution layer is the network of execution clients.

E

Ethereum Name Service (ENS)
A naming system for Ethereum addresses (e.g., “john.eth”). Technical: ENS registry maps names to owners/resolvers (EIP-137).

E

Execution client
Formerly “Eth1 clients” (e.g., Besu, Erigon, Geth, Nethermind) that process/broadcast transactions, manage state, and execute transactions via the EVM.

E

Ethereum Improvement Proposal (EIP)
A design document describing a proposed feature/process/standard for Ethereum (see ERC).

E

Eth2
A deprecated umbrella term for PoS-related upgrades; replaced by “consensus layer.”

E

Eth1
A deprecated term for the former PoW Mainnet Ethereum; replaced by “execution layer.”

E

Equivocation
A validator sending contradictory messages (e.g., two tx with same nonce, or a proposer producing two blocks for the same slot/height).

E

Epoch
A period of 32 slots (12s each), ~6.4 minutes. Committees are reshuffled each epoch; each epoch offers a chance for finality and new validator duties.

E

Entropy
In cryptography, unpredictability/randomness; used to ensure secrets like private keys are not guessable.

E

Encryption
Conversion of electronic data into a form unreadable except by the holder of the correct decryption key.

E

Elliptic Curve Digital Signature Algorithm (ECDSA)
A cryptographic algorithm used by Ethereum so funds can only be spent by owners; used for public/private key generation and transaction verification.

E

Distributed hash table (DHT)
A (key, value) data structure used by Ethereum nodes for peer discovery and determining communication protocols.

D

Double spend
A deliberate reorg where an attacker with enough mining power/stake removes a transaction after using it offchain, ending with both onchain and offchain assets.

D

Discovery
The process by which an Ethereum node finds other nodes to connect to.

D

Digital signature
Data produced using a private key so anyone with the public key can verify the signer and that the signed document wasn’t changed.

D

Difficulty bomb
A planned exponential increase in PoW difficulty intended to push the network toward PoS and reduce fork risk; deprecated after the Merge.

D

Difficulty
In PoW networks, a setting controlling average computation needed to find a valid nonce, expressed via leading zeros in a valid hash; deprecated in Ethereum after PoS.

D

Deposit contract
The gateway to Ethereum staking: a smart contract that accepts ETH deposits and manages validator balances. Validators can’t activate without depositing and submitting signed key data.

D

Decentralized exchange (DEX)
An Ethereum app that lets users swap tokens with peers on the network; participation isn’t constrained like centralized exchanges.

D

DeSci
Decentralized Science; applying blockchain/DAOs/smart contracts and token incentives to create more transparent, open, collaborative research funding and ecosystems.

D

Decentralization
Moving control and execution of processes away from a central entity.

D

Decentralized autonomous organization (DAO)
A digital organization governed by on-chain rules where decisions are made by member votes rather than a central authority; voting power is often token-weighted.

D

Data availability
The property that any node can independently verify transactions, maintaining transparency and trust.

D

Dapp
A decentralized application running on a blockchain. At minimum, a dapp has a smart contract connected to a web interface; many also include decentralized storage and/or messaging protocols.

D

DAG
Directed Acyclic Graph; a node/link data structure. Pre-Merge Ethereum used a DAG in Ethash (PoW), not used in PoS.

D

Đ (D with stroke)
Used in some older Ethereum literature as “Eth” (Ð/Đ); appears in terms like ĐEV/Đapp, and Ð is also used for Dogecoin in some contexts; less common today.

Đ

Consensus client
Consensus clients (e.g., Prysm, Teku, Nimbus, Lighthouse, Lodestar) run Ethereum’s PoS consensus to agree on the head of the Beacon Chain. They don’t execute transactions/state transitions (execution clients do); validator clients (optional add-ons) do proposing/attesting.

C

Constantinople fork
The second part of the Metropolis stage, originally planned for mid-2018; expected to include changes like a hybrid PoW/PoS concept among other updates.

C

Cryptoeconomics
The study of math and economic principles to design secure digital platforms, aligning incentives so participants follow rules and support network security/operation.

C

Cryptography
The practice of securing communication/data using codes so only intended parties can read/process it; includes encryption and decryption techniques.

C

Contract creation transaction
A special transaction containing a contract’s init code; recipient is null and the contract deploys to an address derived from sender address and nonce, registering the contract on-chain.

C

Contract account
An account containing code that executes whenever it receives a transaction from another account (EOA) or contract.

C

Consensus rules
The block validation rules full nodes follow to stay in consensus with other nodes (not to be confused with “consensus”).

C

Consensus layer
Ethereum’s consensus layer is the network of consensus clients.

C

Consensus
When more than 2/3 of computers in a network agree they have the same set of records—everyone has the same information (not the rules themselves).

C

Computational infeasibility
A process is computationally infeasible if it would take an impractically long time (e.g., billions of years) to carry out.

C

Committee
A group of at least 128 validators assigned to validate blocks in each slot. One validator is an aggregator who aggregates signatures of validators that agree on an attestation (not the same as a sync committee).

C

assert
In Solidity, assert(false) compiles to 0xfe (invalid opcode), uses all remaining gas, and reverts changes. A failed assert() indicates an unexpected, serious bug; use it for conditions that should never occur.

A

Compiling
Converting code written in a high-level language (e.g., Solidity) into a lower-level language (e.g., EVM bytecode).

C

Account
An Ethereum account is a digital identity on the Ethereum blockchain, allowing users to send, receive Ether, and interact with smart contracts. Technical: an object containing an address, balance, nonce, and optional storage and code; can be a contract account or an externally owned account (EOA).

A

Casper FFG
Casper-FFG is a proof-of-stake consensus protocol used with the LMD-GHOST fork choice algorithm so consensus clients can agree on the head of the Beacon Chain.

C

Checkpoint
The Beacon Chain is divided into slots (12s) and epochs (32 slots). The first slot in each epoch is a checkpoint; supermajority attestations can justify checkpoints and finalize them when another checkpoint is justified on top.

C

Byzantium fork: Web3 Explained
The Byzantium Fork was a major upgrade in Ethereum's development roadmap, part of the Metropolis phase. It introduced several Ethereum Improvement Proposals (EIPs), enhancing privacy, security, and scalability. Key updates included the implementation of zk-SNARKs for privacy, reduced block rewards, and changes in gas costs for specific operations. Byzantium also laid the foundation for Ethereum’s transition from proof-of-work to proof-of-stake consensus mechanisms.

B

Bytecode: Web3 Explained
Bytecode refers to compiled smart contract code, processed by the Ethereum Virtual Machine (EVM). This compact, low-level code format allows Ethereum nodes to interpret and execute the contract's logic on the blockchain. Developers write smart contracts in high-level languages like Solidity, which are then compiled into bytecode for deployment and interaction. Bytecode enables automated, immutable execution of contract terms across the Ethereum network.

B

Bridge: Web3 Explained
A blockchain bridge facilitates the transfer of assets or data between two different blockchains. This cross-chain functionality allows tokens like ETH to be used in various decentralized finance (DeFi) ecosystems without needing to move entirely to another chain. Bridges help maintain liquidity and expand functionality across multiple blockchain ecosystems, promoting interoperability and wider adoption of decentralized applications (dApps).

B

Bootnode: Web3 Explained
A bootnode is a starting point in a blockchain network that helps new nodes connect to other peers in the network. When a node joins the Ethereum network, bootnodes provide it with information about available peers to establish connections and start syncing data. Bootnodes are essential for node discovery, ensuring efficient peer-to-peer communication and decentralized participation within blockchain systems like Ethereum.

B

Block validation: Web3 Explained
Block validation is the process through which a node verifies that a newly proposed block meets all protocol rules and contains valid transactions. In Ethereum, validators (in proof-of-stake) or miners (in proof-of-work) propose new blocks, which are then validated by other participants in the network. Validation ensures consensus and secures the blockchain against malicious actors by preventing invalid transactions from being included.

B

Block time: Web3 Explained
Block time refers to the average time interval between two consecutive blocks added to the blockchain. In Ethereum, the block time is approximately 12-14 seconds. This metric is essential for network throughput and transaction finality. A shorter block time allows for faster transaction confirmations, while a longer block time provides more time for nodes to sync and validate blocks across the decentralized network.

B

Block reward: Web3 Explained
A block reward is the incentive given to validators (or miners in proof-of-work systems) for successfully proposing and adding a new block to the blockchain. In Ethereum's proof-of-stake system, validators are rewarded in ETH for securing the network and processing transactions. Block rewards encourage active participation and ensure that validators are economically motivated to maintain network integrity and security.

B

Block status: Web3 Explained
Block status indicates the current state of a block within the blockchain validation process. It can include statuses such as proposed (waiting for validation), validated (approved by the network), or orphaned (replaced by a competing block). Understanding block status helps nodes and users monitor blockchain activity and ensures the correct chain is being followed, especially during potential forks or reorganization events.

B

Block propagation: Web3 Explained
Block propagation is the process of distributing a newly proposed block to all nodes in a blockchain network. In Ethereum, once a validator proposes a new block, it is broadcasted across the peer-to-peer network for validation. Fast block propagation is crucial for maintaining consensus and ensuring that all nodes have an up-to-date copy of the blockchain, reducing the chances of forks or conflicting transactions.

B

Block header: Web3 Explained
A block header is a summary of metadata for a specific block in a blockchain. It contains essential information like the block's hash, the previous block's hash, the timestamp, and the root of the Merkle tree of transactions. The block header plays a vital role in linking blocks together, ensuring the integrity of the blockchain and allowing quick validation of block contents by nodes.

B

Block proposer: Web3 Explained
In Ethereum's proof-of-stake system, a block proposer is a validator selected to create and propose a new block during a specific slot. The proposer adds valid transactions, computes the block's hash, and broadcasts the block to other validators. If the block is accepted, the proposer receives rewards for their work. Block proposers are integral to the consensus mechanism, helping secure and update the blockchain.

B

Block explorer: Web3 Explained
A block explorer is a user-friendly web interface that allows users to search for and retrieve blockchain data, such as individual transactions, addresses, blocks, and network activity. Ethereum block explorers like Etherscan offer transparency by displaying real-time information on transaction status, token transfers, and smart contract interactions. Block explorers are essential tools for developers, traders, and users to interact with and monitor blockchain networks.

B

Beacon chain: Web3 Explained
The Beacon Chain is a core component of Ethereum 2.0, responsible for introducing proof-of-stake and managing the network of validators. Launched in December 2020, it runs parallel to Ethereum's original proof-of-work chain, coordinating validators, slot times, and rewards. The Beacon Chain is pivotal in Ethereum's transition to a more energy-efficient, scalable consensus mechanism, ensuring future upgrades like shard chains and greater network throughput.

B

Block: Web3 Explained
A block is a fundamental unit in a blockchain, containing a group of transactions or digital actions. Each block is cryptographically linked to the previous one, forming a chain. In Ethereum, blocks also include data like the state of the network and a record of executed smart contracts. Blocks ensure that all network participants agree on the same order of transactions, maintaining trust and consistency in the blockchain.

B

Big-endian: Web3 Explained
Big-endian is a format for storing or transmitting data where the most significant byte (the "big end") comes first. In blockchain and Ethereum contexts, big-endian encoding might be used for representing integers or other data structures in a particular order. It contrasts with little-endian, where the least significant byte is stored first. Understanding endianess is crucial for developers dealing with low-level data manipulation and cross-platform compatibility.

B

Attestation: Web3 Explained
An attestation is a validator's vote or confirmation in Ethereum's proof-of-stake consensus mechanism. Validators attest to the correctness of a block, ensuring it adheres to the rules of the blockchain. Attestations are crucial for reaching consensus on the network and securing the blockchain against malicious actions. Validators earn rewards for timely and accurate attestations, promoting network stability and security.

B

ASIC: Web3 Explained
An Application-Specific Integrated Circuit (ASIC) is a hardware device optimized for a specific task, such as mining cryptocurrency. In blockchain networks like Bitcoin, ASICs provide a competitive advantage in proof-of-work mining due to their efficiency and speed in solving cryptographic puzzles. While Ethereum initially resisted ASIC dominance by using a memory-intensive algorithm, Ethereum's shift to proof-of-stake has rendered ASIC mining obsolete.

A

APR: Web3 Explained
Annual Percentage Rate (APR) refers to the annualized interest rate for a financial product, such as lending, borrowing, or staking in decentralized finance (DeFi). In Ethereum and DeFi, APR often represents the yield a user earns on staked assets, factoring in both interest and fees. APR is a key metric in DeFi platforms, helping users compare returns and assess the risk and reward of participating in different protocols.

A

Application Programming Interface (API): Web3 Explained
An Application Programming Interface (API) is a set of rules and definitions that allow software applications to interact with each other. In web3, APIs enable developers to interact with blockchain networks, smart contracts, and decentralized applications (dApps) programmatically. For example, Ethereum APIs allow applications to query transaction data, interact with tokens, and access decentralized services, facilitating smoother integration with blockchain-based platforms.

A

Application Binary Interface (ABI): Web3 Explained
An Application Binary Interface (ABI) is a data encoding format used to interact with Ethereum smart contracts. The ABI defines how to encode and decode function calls, enabling external applications to communicate with smart contracts on the blockchain. Understanding ABIs is crucial for developers working with Ethereum, as they allow decentralized applications (dApps) to interact with complex on-chain logic through standardized formats.

A

Anti-Sybil: Web3 Explained
Anti-Sybil mechanisms prevent individuals from creating multiple fake identities to gain unfair influence in a decentralized network. In web3, Sybil attacks are a significant threat to consensus mechanisms, governance protocols, and token distribution systems. Anti-Sybil techniques often rely on identity verification, reputation systems, or economic incentives to ensure that each participant in the network is a unique and legitimate actor.

A

Address: Web3 Explained
An Ethereum address is a unique identifier used to send and receive cryptocurrency or interact with smart contracts. It functions like a digital account number. Ethereum addresses are typically derived from a user's public key using cryptographic hashing functions, and they serve as a destination for transactions within the Ethereum blockchain. Managing addresses securely is crucial for users and developers to avoid loss of funds or data.

A

51% attack: Web3 Explained
A 51% attack occurs when a single entity or group gains control of more than 50% of a blockchain's computational power or staked assets, enabling them to manipulate the network. In Ethereum, such an attack would allow malicious actors to reverse transactions, double-spend assets, or censor other participants. While highly unlikely in large networks like Ethereum, such attacks pose a serious risk to blockchain security.

A

zk-SNARK: Web3 Explained
Discover the power of zk-SNARKs in the world of Web3! This article unpacks the complexities of zero-knowledge proofs, exploring how they enhance privacy, security, and scalability in decentralized applications.

Z

Zero-Knowledge Proof: Web3 Explained
A zero-knowledge proof is a method of verification where a prover can prove to a verifier that they know a value, without conveying any information apart from the fact that they know the value. Cryptographers, privacy-focused blockchain developers, and researchers frequently use this term. To excel in working with zero-knowledge proofs, one should have a strong background in cryptography, understand different types of zero-knowledge proof systems (like zk-SNARKs and zk-STARKs), and be proficient in implementing and optimizing zero-knowledge protocols.

Z

Wrapped Token: Web3 Explained
A wrapped token is a tokenized version of another cryptocurrency that allows it to be used on a blockchain different from its native chain. DeFi users, cross-chain developers, and token designers commonly use this term. To excel in working with wrapped tokens, one should understand cross-chain bridges, be familiar with different token standards across blockchains, and know how to implement and use wrapped token contracts securely.

W

Rebase Arbitrage: Web3 Explained
This is a class of MEV focused on taking advantage of oracle updates and rebases. MEV searchers and developers of rebasing tokens or oracle-dependent protocols use this term. To excel in rebase arbitrage, one should understand oracle mechanisms, be familiar with rebasing token designs, and be proficient in high-speed trading around predictable blockchain events.

R

Pool Imbalance Sandwiching: Web3 Explained
This is a type of MEV where the searcher swaps the relative sizes of decentralized exchange liquidity pools during the front-run and resets them in the back-run. MEV searchers and DeFi protocol developers use this term. To excel in this area, one should have a deep understanding of AMM mechanics, be proficient in complex multi-step transactions, and understand the nuances of liquidity pool dynamics.

P

JIT (Just-In-Time) Arbitrage: Web3 Explained
JIT arbitrage occurs when a searcher sees a large swap in the mempool and then sandwiches the trade with liquidity in the underlying pool. MEV searchers and DeFi protocol developers frequently use this term. To excel in JIT arbitrage, one should have a deep understanding of DeFi protocols (especially AMMs), be proficient in mempool monitoring and high-speed transaction submission, and understand the intricacies of liquidity provision and removal in DeFi pools.

J

Liquidations (in DeFi context): Web3 Explained
In DeFi, liquidations occur when the collateral used for a loan no longer covers the value of the debt, triggering automatic repayment mechanisms. DeFi users, protocol developers, and MEV searchers commonly use this term. To excel in working with liquidations, one should understand DeFi lending protocols, be proficient in monitoring and predicting liquidation events, and know how to implement efficient liquidation bots.

L

Cross-Chain Arbitrage: Web3 Explained
Cross-chain arbitrage involves exploiting price differences of the same or related assets across different blockchain networks. It's a growing field within MEV as more chains and layer 2 solutions emerge. Traders, DeFi users, and cross-chain protocol developers commonly use this term. To excel in cross-chain arbitrage, one should understand multiple blockchain ecosystems, be proficient in cross-chain communication protocols, and have expertise in high-speed, cross-chain trading strategies.

C

Censorship (in MEV context): Web3 Explained
In the context of MEV, censorship is the process of manipulating blocks to exclude specific transactions for a number of blocks, often to maintain an arbitrage opportunity or make a specific purchase before another user. MEV searchers and blockchain security researchers frequently use this term. To excel in understanding and mitigating censorship, one should have a deep knowledge of blockchain consensus mechanisms, understand miner incentives, and be familiar with techniques for detecting and preventing transaction censorship.

C

Bulletproofs: Web3 Explained
Bulletproofs are short, non-interactive zero-knowledge proofs that require no trusted setup. They are used to convince a verifier that an encrypted plaintext is well-formed. Cryptographers and privacy-focused blockchain developers commonly use this term. To excel in working with Bulletproofs, one should have a strong background in cryptography, understand zero-knowledge proof systems, and be familiar with implementing and optimizing Bulletproof protocols.

B

Base Fee: Web3 Explained
The base fee is an algorithmically determined fee that users on the Ethereum blockchain must pay to complete a transaction. It was introduced as part of EIP-1559. Developers, users, and miners in the Ethereum ecosystem use this term. To excel in working with base fees, one should understand Ethereum's fee market mechanism, be able to predict base fee changes, and know how to optimize transaction timing to minimize costs.

B

Archival Nodes: Web3 Explained
An archival node is a full node in the blockchain that keeps a complete history of transactions and address state changes since the genesis block. Blockchain developers and researchers frequently use this term. To excel in working with archival nodes, one should understand blockchain data structures, be proficient in querying historical blockchain data, and be familiar with the trade-offs between different node types in terms of storage requirements and query capabilities.

A

Arbitrage: Web3 Explained
Arbitrage in web3 is the practice of exploiting price differences of the same asset across different markets or platforms to make a profit. It's a key factor in Maximal Extractable Value (MEV). Traders, DeFi users, and MEV searchers commonly use this term. To excel in arbitrage, one should understand DeFi protocols, be proficient in writing high-speed trading bots, and have a deep knowledge of blockchain mempool mechanics and gas optimization techniques.

A

ABI (Application Binary Interface): Web3 Explained
ABI is an interface between two binary program modules at the level of machine code. In the context of web3, ABIs are crucial for interacting with smart contracts, defining how to encode and decode data when calling contract functions. Developers and smart contract auditors frequently use this term. To excel in working with ABIs, one should understand Ethereum's contract ABI specification, be proficient in encoding and decoding ABI data, and be familiar with tools that generate and parse ABIs.

A

IPFS (InterPlanetary File System): Web3 Explained
IPFS is a peer-to-peer network and protocol designed to create a decentralized system for storing and sharing files, websites, applications, and data. It's often used in conjunction with blockchain technology to store and distribute content in a decentralized manner. This term is used by developers working on decentralized storage solutions and content distribution. To excel in using IPFS, one should understand content-addressed storage, be familiar with IPFS APIs and tools, and know how to integrate IPFS with other web3 technologies for decentralized data storage and retrieval.

I

Layer 2 Solutions: Web3 Explained
Layer 2 solutions are blockchain protocols built on top of existing blockchains (like Ethereum) to improve scalability and reduce transaction costs. Examples include rollups and state channels. This term is used by blockchain developers and those working on scaling solutions. To excel in Layer 2 development, one should understand the underlying blockchain's architecture, be familiar with different Layer 2 technologies and their trade-offs, and be able to design and implement efficient off-chain systems that maintain security guarantees.

L

Tokenomics: Web3 Explained
Tokenomics refers to the economic model of a token within its ecosystem, including factors like supply, distribution, and utility. This term is used by token designers, economists, and project leads in the crypto space. To excel in tokenomics, one should understand economic principles, game theory, and incentive design, as well as be familiar with different token models and their impacts on project sustainability and user behavior.

T

Interoperability: Web3 Explained
Interoperability in web3 refers to the ability of different blockchain networks to communicate and share data with each other. This term is used by blockchain architects, protocol developers, and those working on cross-chain applications. To excel in this area, one should understand cross-chain communication protocols, be familiar with bridge technologies, and be able to design and implement systems that can operate across multiple blockchain networks.

I

Decentralized Finance (DeFi): Web3 Explained
DeFi refers to the ecosystem of financial applications built on blockchain networks, aiming to recreate and innovate upon traditional financial systems in a decentralized manner. This term is used by developers, financial experts, and entrepreneurs in the web3 space. To excel in DeFi development, one should understand traditional finance concepts, be proficient in smart contract development, and stay updated on the latest DeFi protocols and best practices for security and risk management.

D

Oracles: Web3 Explained
Oracles are services that provide external data to blockchain networks and smart contracts, bridging the gap between on-chain and off-chain information. This term is used by blockchain developers and those working on projects that require real-world data. To excel in working with oracles, one should understand the oracle problem (the challenge of getting reliable data onto a blockchain), be familiar with oracle services like Chainlink, and know how to implement oracle data feeds securely in smart contracts.

O

Gas Fees: Web3 Explained
Gas fees are the transaction costs on the Ethereum network, paid in Ether (ETH) for executing operations like deploying contracts or making transactions. This term is used by developers, users, and product managers in the Ethereum ecosystem. To excel in managing gas fees, one should understand Ethereum's fee structure, implement gas optimization techniques in smart contracts, and be familiar with layer 2 solutions that can reduce gas costs.

G

Consensus Mechanisms: Web3 Explained
Consensus mechanisms are protocols that ensure all nodes in a blockchain network agree on the validity of transactions. Common types include Proof of Work (PoW) and Proof of Stake (PoS). This term is used by blockchain developers, researchers, and protocol designers. To excel in this area, one should deeply understand different consensus algorithms, their trade-offs in terms of security and scalability, and be able to implement or interact with consensus protocols in blockchain development.

C

Wallets: Web3 Explained
In the context of web3, wallets are software applications or hardware devices that store private keys and allow users to interact with blockchain networks, manage digital assets, and sign transactions. This term is used by developers, users, and product managers in the crypto space. To excel in wallet integration and development, one should understand cryptographic key management, be familiar with wallet connection standards like WalletConnect, and prioritize security in user key storage and transaction signing.

W

Web3.js / Ethers.js: Web3 Explained
These are JavaScript libraries that allow developers to interact with Ethereum nodes and smart contracts. They're essential tools for building the front-end of DApps and connecting them to the blockchain. Web3 developers frequently use these terms. To excel in using these libraries, one should have a strong foundation in JavaScript and asynchronous programming, understand Ethereum's architecture, and be familiar with common patterns for interacting with smart contracts.

W

Solidity: Web3 Explained
Solidity is the primary programming language for writing smart contracts on the Ethereum blockchain. It's a statically-typed language designed to target the Ethereum Virtual Machine (EVM). Blockchain developers and smart contract auditors commonly use this term. To excel in Solidity, one should understand its unique features and limitations, be familiar with common design patterns and security best practices, and have experience with development environments like Truffle or Hardhat.

S

Tokens (Fungible and Non-Fungible): Web3 Explained
Tokens are digital assets created and managed on a blockchain. Fungible tokens are interchangeable (like cryptocurrencies), while non-fungible tokens (NFTs) represent unique digital assets. This term is used by developers, artists, and entrepreneurs in the web3 space. To excel in token development and implementation, one should understand token standards (like ERC-20 for fungible tokens and ERC-721 for NFTs), tokenomics, and be familiar with tools for token creation and management.

T

Decentralized Applications (DApps): Web3 Explained
DApps are applications that run on a decentralized network, typically a blockchain, rather than being hosted on centralized servers. They often interact with smart contracts and provide a user interface for blockchain functionality. Web3 developers, designers, and product managers commonly use this term. To excel in DApp development, one should be proficient in both front-end technologies (like React.js) and blockchain interaction libraries (like web3.js or ethers.js), as well as understand the unique UX challenges of decentralized systems.

D

Smart Contracts: Web3 Explained
Smart contracts are self-executing contracts with the terms of the agreement directly written into code. They run on blockchain networks, primarily Ethereum, and automatically execute when predetermined conditions are met. Developers and product managers in the web3 space frequently use this term. To excel in smart contract development, one should master Solidity (Ethereum's primary smart contract language), understand security best practices, and be familiar with testing and auditing tools.

S

Blockchain: Web3 Explained
A blockchain is a distributed, immutable ledger that records transactions across a network of computers. It's the foundational technology behind cryptocurrencies and many web3 applications. Developers, engineers, and entrepreneurs in the web3 space use this term extensively. To excel in blockchain development, one should understand its core concepts like decentralization, consensus mechanisms, and cryptography, as well as gain proficiency in blockchain-specific programming languages and frameworks.

B