Search our executive blockchain insights and services.
…Crypto.com Glossary: Your Guide to Key Terms and Jargon in Blockchain and CryptocurrencyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyCrypto GlossaryLearn all of the most important blockchain and cryptocurrency terms and jargon here.Trending TermsSolana Program LibraryThe Solana Program Library (SPL) is a collection of ready-to-use, open-source components for building decentralised applications (dapps) on the Solana blockchain.HODLerA ‘HODLer’ is someone who holds onto their digit…
Learn More…In the WebAuthn context, credentials are cryptographic private keys — in other words, the actual secrets that make Passkeys secure. Just like with cryptocurrency wallets, each private key has a matching public key that resides on the server and will be used to check signatures created with the private key. Each passkey is unique and bound to a username and a website or app, meaning a user will have at least as many Passkeys as they have accounts; and, in most cases, even more, as most users …
Learn More…The public key allows anyone to verify that a message signed with the private key is valid. Submitting a Payment Alice’s wallet holds the private keys to each of her addresses. She tells her Bitcoin client that she’d like to transfer BTC to Bob’s address. The Bitcoin client then signs her transaction request with the private key of the address she is transferring bitcoins from. Anyone on the network can now use the public key to verify that the transaction request is actually coming from t…
Learn More…A popular and secure software wallet is the Crypto.com DeFi Wallet. Learn more about the different types of cryptocurrency wallets here. Hardware wallets (cold wallets) Considered the most secure option, hardware wallets store a user’s private keys offline on a physical device, offering protection against malware and hacking attempts compared to hot wallets. As these devices keep a user’s Bitcoin offline, they are considered ‘cold wallets’. Popular cold wallets include Trezor, Ledger, an…
Learn More…Multi-Signature Authentication A succinct definition of Multi-Signature Authentication Multi-Signature AuthenticationLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYMULTI-SIGNATURE AUTHENTICATIONCopy linkShare on TwitterShare on FacebookShare on LinkedinMulti-Signature AuthenticationMulti-signature authentication (often referred to as multisig in cryptocurrency and blockchain) is a security feature that requires multiple private keys to authorise a transaction. Instead of relyin…
Learn More…Any changes to the original data automatically result in a new hash, rendering it an invalid transaction on the blockchain.Key TakeawayCryptography is keeping information secure from malicious actors by transforming an original text into something only the intended reader can understand.Related WordsSolana Program LibraryThe Solana Program Library (SPL) is a collection of ready-to-use, open-source components for building decentralised applications (dapps) on the Solana blockchain.HODLerA ‘HODL…
Learn More…In the WebAuthn context, credentials are cryptographic private keys — in other words, the actual secrets that make Passkeys secure. Just like with cryptocurrency wallets, each private key has a matching public key that resides on the server and will be used to check signatures created with the private key. Each passkey is unique and bound to a username and a website or app, meaning a user will have at least as many Passkeys as they have accounts; and, in most cases, even more, as most users …
Learn More…Hardware Wallet A succinct definition of Hardware Wallet Hardware WalletLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYHARDWARE WALLETCopy linkShare on TwitterShare on FacebookShare on LinkedinHardware WalletA hardware wallet is an offline physical cryptocurrency wallet that heavily emphasises the security of private keys. Hardware-based cold storage is generally considered more secure than software-based hot wallets because it keeps the private keys of a digital wallet complet…
Learn More…Here’s how to spot phishing airdrops and protect your assets from scammers. Key Takeaways: Airdrop scams are fraudulent schemes designed to steal personal information, private keys, or funds by exploiting the allure of free cryptocurrency tokens. Be aware of the various types of airdrop scams, including phishing scams, fake airdrops, malware airdrops, and impersonation scams. To avoid falling victim to airdrop scams, always verify the authenticity of airdrops, avoid sharing private keys, rese…
Learn More…Here’s how to spot phishing airdrops and protect your assets from scammers. Key Takeaways: Airdrop scams are fraudulent schemes designed to steal personal information, private keys, or funds by exploiting the allure of free cryptocurrency tokens. Be aware of the various types of airdrop scams, including phishing scams, fake airdrops, malware airdrops, and impersonation scams. To avoid falling victim to airdrop scams, always verify the authenticity of airdrops, avoid sharing private keys, rese…
Learn More