This repository has been archived by the owner on May 24, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathglossary.txt
396 lines (396 loc) · 7.89 KB
/
glossary.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
Two-Factor Authentication (2FA) via Biometrics
Two-Factor Authentication (2FA) via Email
Two-Factor Authentication (2FA) via Hardware Token
Two-Factor Authentication (2FA) via One Time Code
Two-Factor Authentication (2FA) via Phone Call
Two-Factor Authentication (2FA) via Physical Mail
Two-Factor Authentication (2FA) via SMS
Two-Factor Authentication (2FA) via Software Token
Two-Factor Authentication (2FA)
34% attack (aka Consensus HiJacking)
51% Attack (aka Consensus HiJacking)
Acyclic Graph
Address
Adversarial Tactics, Techniques & Common Knowledge (ATT&CK)
Agreement Ledger
Altcoin
Anonymity
Anti-Money Laundering (AML)
Application Binary Interface (ABI)
Application Programming Interface (API)
Application Specific Integrated Circuit (ASIC)
Asset
asynchronous Byzantine Fault Tolerance (aBFT)
Attack Against Consensus Mechanisms
Attack Against Digital Assets
Attack Against Exchanges
Attack Against Governance
Attack Against Memory Pool
Attack Against Miners
Attack Against Mining Nodes
Attack Against Mining Pools
Attack Against Oracle Client
Attack Against Oracle Service
Attack Against Smart Asset
Attack Against Smart Contract
Attack Against Users
Attack Against Wallets
Attestation Ledger
Audit
Beacon Chain
Bearer-Negotiable Instrument (BNI)
Bitcoin - Satoshi Nakamoto
Bitcoin - Satoshi
Bitcoin - Wei
Bitcoin - XBT
Bitcoin 0.9 Standard Transaction Types
Bitcoin ATM
Bitcoin Block Header
Bitcoin Currency Units
Bitcoin Currency
Bitcoin halving
Bitcoin Payment System
Bitcoin Transaction Locktime
Bitcoin Tumbler
Bitcoin Vanity Address
Block Data
Block Explorer
Block Header
Block Height
Block Mining Timejack Attack
Block Reward
Block Withholding Attack
Block
Blockchain 1.0
Blockchain 2.0
Blockchain 3.0
Blockchain Applications
Blockchain as a Service (BaaS) Providers
Blockchain as a Service (BaaS)
Blockchain Attacks
Blockchain Developer
Blockchain Embedded Mining
Blockchain Hash
Blockchain Mining Hardware
Blockchain Mining
Blockchain Network Operator
Blockchain Network
Blockchain Pruning
Blockchain RTBF Risk
Blockchain Structure Attack
Blockchain User
Blockchain
BTC
Business logic layer
Byzantine Fault Tolerance (BFT)
Casper
Central Ledger
Centralized
Certificate Authority (CA)
Certificate Management
Chain linking
Chain
Chaincode Services
Chaincode Standard Transaction Types
Chaincode
ChainLocks
Chainwashing
Cloudwashing
Coin
Coinhive
Cold wallet
Commit
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Platform Enumeration (CPE)
Common Vulnerabilities and Exposures (CVE)
Common Vulnerability Reporting Framework (CVRF)
Common Vulnerability Scoring System (CVSS)
Common Weakness Enumeration (CWE)
Confirmation
Confirmed Block
Confirmed Transaction
Consensus Algorithms and Protocols Defensive Measures
Consensus Algorithms and Protocols
Consensus Delay
Consensus Mechanism
Consensus Point
Consensus
Consortium blockchains
Content Delivery Network (CDN)
Create, Read, Update, Delete (CRUD) Application
Credential Stuffing Attack
Cryptocurrency
Cryptographic Hashes
Cryptojacking
CryptoNight
Custodial Provider
Customer Due Diligence (CDD)
Cyclic Graph
DDoS Attack
Decentralized Apps (DAPPS)
Decentralized Autonomous Organization (DAO)
Decentralized Finance (DeFi)
Decentralized
Delayed Proof of Work (dPow)
delegated Byzantine Fault Tolerant (dBFT)
Delegated Proof-of-Stake (DPoS)
Denial of Service (DoS) Attack
Deposit Contract
Difficulty
Digest Access Authentication
Digital Asset
Digital Commodity
Digital Signature
Direct Participation
Distributed Database
Distributed Denial of Service (DDoS) Attack
Distributed Ledger Technology (DLT) Interoperability
Distributed Ledger Technology (DLT)
Distributed System
DLT Account
DLT Address
DLT Network
DLT Node
DLT Oracle
DLT Platform
DLT System
DLT User
Domain Name System (DNS) hijacks
Double Spending
Eclipse Attack
EigenTrust Practical Byzantine Fault Tolerance (T-PBFT)
Elliptic Curve Cryptography (ECC)
Elliptic Curve Digital Signature Algorithm (ECDSA) Signatures
Encryption
Ethash
Ether
Ethereum - Contract Accounts
Ethereum - Gas
Ethereum WebAssembly (eWASM)
Ethereum
Exchange
External Accounts (Ethereum)
Fabric Tier
Federated Byzantine Agreement (FBA)
Fiat Currency
Fiat Gateway
Finality
Financial Action Task Force (FATF)
Flash loan
Fork
Front Running Attacks
Genesis Block
Gossip Protocol
Hard Fork
Hash Value
Hashing
Hashrate Denominations
Honey Badger Byzantine Fault Tolerance (HoneyBadgerBFT)
Hosted Wallet
Hot Wallet
Hyperledger
Identity and Access Management (IAM)
Immutability
Increase Block Size
Increase Block Time
Indirect Participation
Initial Coin Offering (ICO)
Integration Tier
Intel Software Guard Extensions (SGX)
Inter-Chain
Interledger Protocol (ILP)
Intermediate Certificate Authority (CA)
Interoperability
InterPlanetary File System (IPFS)
Istanbul Byzantine Fault Tolerance (IBFT)
Joint Consensus
Key Exposure
Key Management
Key Theft
Know Your Customer (KYC)
Leaf Node
Leased Proof of Stake (LPoS)
Ledger Split
Ledger
Libra
Light Node
Litecoin
Long Range Attack
Main Chain
Majority Attack
Malicious Miner
Marcov Chain Monte Carlo (MCMC)
Member Node
Membership Services
Mempool
Merged Mining
Merkle Root
Merkle Tree
MH per second (MHsec)
Miner
Mining Pool
Mining Solo
Mining
Multi Signature
Multi-Factor Authentication (MFA)
Nakamoto Consensus
Network Routing Attacks
NIST 800-63
Node
Nominated Proof of Stake
Nonce
NXT
Obelisk Consensus Algorithm
Off Chain Governance
Off Chain
Off Ledger
Off-Ledger Currency
On Chain Governance
On Chain
On Ledger
On-Ledger Currency
One-Time Signatures (OTS)
OpenTransactions Project
Opportunity loss
Oracle
Orphan Block
Participant
Password Theft Attack
Peer Monitoring
Peer to peer (P2P)
Peer to Peer Transaction Platforms
Peer
Penalty System
Penetration Testing
Permissioned Ledger
Permissionless Ledger
Persistent Scripts
Phishing
PirlGuard
Practical Byzantine Fault Tolerance (PBFT)
Pre-Prepare
Prepare
Private Blockchain
Private Key
Proof of Activity (PoA)
Proof of Assignment
Proof of Authority (PoA)
Proof of Burn (PoB)
Proof of Capacity (PoC)
Proof of Elapsed Time (PoET)
Proof of Formulation (PoF)
Proof of Importance
Proof of Space (PoS)
Proof of Stake (PoS)
Proof of Trust
Proof of Vote (PoV)
Proof of Weight (PoWeight)
Proof of Work (PoW)
Provenance
Prune
Public Blockchain
Public Key
Quick Response (QR) Code
Quorum
Raft Consensus Algorithm
Record
Recovery
Replay Attack
Replicated Ledger
Reply
Request
Resilience
Reusable Proof of Work (RPoW)
Ring Signature
Ripple Protocol Consensus Algorithm (RPCA)
Ripple
Robust Proof of Stake
Root Node
Routing Awareness
Synchronized Clocking
Satoshi Nakamoto
Satoshi
Schnorr Signatures
Script
Scrypt
Secrets Management
Secure Hash Algorithm (SHA)
Secure Onboarding
Seed
Segregated Witness (Segwit)
SHA-256
Shard Chain
Sharding
Shared Ledger
Shit Coin
Short Address
Sidechain
Signature Scheme
Signing
SIM Swap
Simple Payment Verification (SPV)
Simplified Byzantine Fault Tolerance
Simplified Payment Verification (SPV)
Smart Contract
Soft Fork
Solidity
Stable Coin
Staking Pool
Staking Provider
State Channel
State
Stellar Consensus Protocol (SCP)
Subchain
Suspicious Transaction Report (STR)
Swarm
Sybil Attack
Tainted % Bitcoin
Testnet
Time-Stamping Blocks
Timejacking Attack
Timestamp Blockchain
Timestamp Trusted
Timestamp
Token
Tokenization
Tokenless Ledger
Tokens AssetBacked
Tokens Intrinsic
Top Block
Traditional Data Source
Transaction Block
Transaction Fee
Transaction Record
Transaction
Transactions Confirmed (CTXNs)
Transactions Unconfirmed (UTXNs)
Transactor
Transparency
Trust
Trusted Stamping Authority (TSA)
Turing Completeness
Unbanked
Unpermissioned (Permissionless) Ledgers
Unspent Transaction Output (UTXO)
User Agent
User-facing application
Validated
Validating Peer
Validation
Validator Node
Validator
Vendor - Altcoins
Vendors - Blockchain as a Service (BaaS)
Virgin Bitcoin
Virtual Asset
Wallet Distributed Denial-of-Service (DDOS)
Wallet Hardware
Wallet theft
Wallet
Weak Key Risk
Whisper (Ethereum)
World State
X11
Zero Confirmation Transaction
ZeroKnowledge Proofs
ZkSNARK (Zeroknowledge Succinct Noninteractive ARguments of Knowledge)