Search our executive blockchain insights and services.
Web2 A succinct definition of Web2 Web2Level UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYWEB2Copy linkShare on TwitterShare on FacebookShare on LinkedinWeb2While Web1 was focused on making information accessible to the public, Web2 — the current version of the internet we know today — is about creating and contributing. It has become the basis for the commercialisation of the internet, spawning significant applications, such as e-commerce, social media, and virtual communicati…
Learn MoreVerifiable Delay Functions (VDFs) A succinct definition of Verifiable Delay Functions (VDFs) Verifiable Delay Functions (VDFs)Level UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYVERIFIABLE DELAY FUNCTIONS (VDFS)Copy linkShare on TwitterShare on FacebookShare on LinkedinVerifiable Delay Functions (VDFs)Verifiable Delay Functions (VDFs) are cryptographic constructs essential for the security and efficiency of blockchain and cryptocurrency. In simple terms, a VDF is a mathematical puzz…
Learn MoreBlockchain Trilemma A succinct definition of Blockchain Trilemma Blockchain TrilemmaLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYBLOCKCHAIN TRILEMMACopy linkShare on TwitterShare on FacebookShare on LinkedinBlockchain TrilemmaOriginally coined by Vitalik Buterin, the creator of Ethereum, the blockchain trilemma is an issue that currently plagues all blockchains. To be precise, it is commonly considered that most blockchains can only provide two out of three of the following b…
Learn MoreSoft Fork A succinct definition of Soft Fork Soft ForkLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYSOFT FORKCopy linkShare on TwitterShare on FacebookShare on LinkedinSoft ForkA soft fork is a backward-compatible upgrade to a blockchain’s protocol that is less disruptive than a hard fork since it doesn’t require a complete split of the network. It introduces new rules or conditions that are not present in the older version, but allows non-upgraded nodes (computers in the …
Learn MorePrivate Key A succinct definition of Private Key Private KeyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYPRIVATE KEYCopy linkShare on TwitterShare on FacebookShare on LinkedinPrivate KeyA private key is a string of randomly generated letters and numbers used alongside an algorithm to encrypt and decrypt data. It can be in the form of a 256-character-long binary code, a QR code, a 64-digit hexadecimal code, or a mnemonic phrase. Regardless of their form, private keys are an i…
Learn MoreCypherpunk A succinct definition of Cypherpunk CypherpunkLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCYPHERPUNKCopy linkShare on TwitterShare on FacebookShare on LinkedinCypherpunkThe term ‘cypherpunk’ refers to a movement and ideology focused on using cryptography and privacy-enhancing technologies to promote individual freedom and privacy. Cypherpunks believe in the right to personal privacy, especially in the digital age, and advocate for the use of encryption to prot…
Learn MoreByzantine Fault Tolerance (BFT) A succinct definition of Byzantine Fault Tolerance (BFT) Byzantine Fault Tolerance (BFT)Level UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYBYZANTINE FAULT TOLERANCE (BFT)Copy linkShare on TwitterShare on FacebookShare on LinkedinByzantine Fault Tolerance (BFT)Byzantine Fault Tolerance (BFT) is the ability to tolerate failures in distributed computing systems. The term originated from the hypothetical phenomenon known as the Byzantine Generals Problem…
Learn MoreCustodial Wallet A succinct definition of Custodial Wallet Custodial WalletLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCUSTODIAL WALLETCopy linkShare on TwitterShare on FacebookShare on LinkedinCustodial WalletCustodial wallets are typically used by centralised exchanges (CEXs), which control the wallet for the user. They are easier to use for individuals who do not want to keep track of multiple keys and seed phrases. CEXs typically provide a user-friendly experience, as th…
Learn MoreDescending Triangle A succinct definition of Descending Triangle Descending TriangleLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYDESCENDING TRIANGLECopy linkShare on TwitterShare on FacebookShare on LinkedinDescending TriangleA descending triangle is a bearish chart pattern often observed in technical analysis of financial markets, including cryptocurrency markets. It’s characterised by two trendlines: a horizontal line that connects a series of similar lows, which represen…
Learn MoreCustomer Due Diligence (CDD) A succinct definition of Customer Due Diligence (CDD) Customer Due Diligence (CDD)Level UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCUSTOMER DUE DILIGENCE (CDD)Copy linkShare on TwitterShare on FacebookShare on LinkedinCustomer Due Diligence (CDD)Customer Due Diligence (CDD) is the process of assessing and verifying the identity of customers as part of regulatory compliance and risk management in the cryptocurrency industry. This process is essential f…
Learn More