Web3 Data Glossary

A curated collection of keywords in web3 data & analytics.

Web3 Data Glossary

A curated collection of keywords in web3 data & analytics.

Web3 Data Glossary

A curated collection of keywords in web3 data & analytics.

Browse Alphabetically

A

ABI

Application Binary Interface is represented in JSON format and specifies how to encode and decode data from a particular smart contract.

ABI

Application Binary Interface is represented in JSON format and specifies how to encode and decode data from a particular smart contract.

ABI

Application Binary Interface is represented in JSON format and specifies how to encode and decode data from a particular smart contract.

A/B Testing

A method of comparing two versions of a webpage, app, or marketing asset to see which performs better.

A/B Testing

Application Binary Interface is represented in JSON format and specifies how to encode and decode data from a particular smart contract.

A/B Testing

A method of comparing two versions of a webpage, app, or marketing asset to see which performs better.

Active users

The number of users interacting with your community or platform within a certain time frame. Expressed through monthly, weekly, or daily active users (MAUs, WAUs, and DAUs).

Active users

Application Binary Interface is represented in JSON format and specifies how to encode and decode data from a particular smart contract.

Active users

The number of users interacting with your community or platform within a certain time frame. Expressed through monthly, weekly, or daily active users (MAUs, WAUs, and DAUs).

Address

A unique set of alphanumeric characters that can send and receive cryptocurrency and NFTs on a blockchain.


Address

A unique set of alphanumeric characters that can send and receive cryptocurrency and NFTs on a blockchain.


Address

A unique set of alphanumeric characters that can send and receive cryptocurrency and NFTs on a blockchain.


Adoption Rate

The percentage of users who start using a product or feature over time.

Adoption Rate

The percentage of users who start using a product or feature over time.

Adoption Rate

The percentage of users who start using a product or feature over time.

Airdrops

Airdrops are used to distribute new or existing tokens to many wallet addresses, often as part of a promotional campaign or as a reward to early adopters.

Airdrops

Airdrops are used to distribute new or existing tokens to many wallet addresses, often as part of a promotional campaign or as a reward to early adopters.

Airdrops

Airdrops are used to distribute new or existing tokens to many wallet addresses, often as part of a promotional campaign or as a reward to early adopters.

Altcoin

Altcoin used to refer to any cryptocurrency that wasn’t Bitcoin, now it may refer to any new cryptocurrency with a relatively small market cap.

Altcoin

Altcoin used to refer to any cryptocurrency that wasn’t Bitcoin, now it may refer to any new cryptocurrency with a relatively small market cap.

Altcoin

Altcoin used to refer to any cryptocurrency that wasn’t Bitcoin, now it may refer to any new cryptocurrency with a relatively small market cap.

Analytics

The process of collecting, measuring, and analyzing data to gain insights and improve decision-making.

Analytics

The process of collecting, measuring, and analyzing data to gain insights and improve decision-making.

Analytics

The process of collecting, measuring, and analyzing data to gain insights and improve decision-making.

API

Application Programming Interface is a connection between two computers that allows them to communicate with each other. It also specifies how two software components should interact.

API

Application Programming Interface: A connection between two computers that allows them to communicate with each other. It also specifies how two software components should interact.

API

Application Programming Interface is a connection between two computers that allows them to communicate with each other. It also specifies how two software components should interact.

Arbitrum

A layer-2 network created by Offchain Labs that solves Ethereum's scalability issues. Some of its advantages are low fees and EVM compatibility.

Arbitrum

A layer-2 network created by Offchain Labs that solves Ethereum's scalability issues. Some of its advantages are low fees and EVM compatibility.

Arbitrum

A layer-2 network created by Offchain Labs that solves Ethereum's scalability issues. Some of its advantages are low fees and EVM compatibility.

Avalanche

A layer 1 blockchain founded in 2020 that is built on Proof of Stake (PoS). It's a native token called AVAX. Its network includes Mainnet and Fuji.

Avalanche

A layer 1 blockchain founded in 2020 that is built on Proof of Stake (PoS). It's a native token called AVAX. Its network includes Mainnet and Fuji.

Avalanche

A layer 1 blockchain founded in 2020 that is built on Proof of Stake (PoS). It's a native token called AVAX. Its network includes Mainnet and Fuji.

Average Session Time

How long a user spends on your site or dapp.

Average Session Time

How long a user spends on your site or dapp.

Average Session Time

How long a user spends on your site or dapp.

Average Revenue Per User (ARPU)

How much revenue you’ve made from your site or dapp.

Average Revenue Per User (ARPU)

How much revenue you’ve made from your site or dapp.

Average Revenue Per User (ARPU)

How much revenue you’ve made from your site or dapp.

ATH

All-time high (record for the highest sale price of a token)

ATH

All-time high (record for the highest sale price of a token)

ATH

All-time high (record for the highest sale price of a token)

ATL

All-time low (record for the lowest sale price of a token)

ATL

All-time low (record for the lowest sale price of a token)

ATL

All-time low (record for the lowest sale price of a token)

Authentication

Using digital signatures to prove the authenticity, validity, or identity of information and its sources. One of the main value propositions of cryptography.

Authentication

Using digital signatures to prove the authenticity, validity, or identity of information and its sources. One of the main value propositions of cryptography.

Authentication

Using digital signatures to prove the authenticity, validity, or identity of information and its sources. One of the main value propositions of cryptography.

B

Base

An Ethereum-based Layer 2 blockchain built by Coinbase that capitalizes on the benefits of the OP Stack from Optimism.

Base

An Ethereum-based Layer 2 blockchain built by Coinbase that capitalizes on the benefits of the OP Stack from Optimism.

Base

An Ethereum-based Layer 2 blockchain built by Coinbase that capitalizes on the benefits of the OP Stack from Optimism.

Bear Market

 A prolonged period of decline in a financial market.

Bear Market

 A prolonged period of decline in a financial market.

Bear Market

 A prolonged period of decline in a financial market.

Behavioral Analytics

The study of user actions within a product to understand engagement and improve experiences.

Behavioral Analytics

The study of user actions within a product to understand engagement and improve experiences.

Behavioral Analytics

The study of user actions within a product to understand engagement and improve experiences.

Bitcoin

The first ever cryptocurrency on a Proof of Work (PoW) blockchain, which was created in 2009 by Satoshi Nakamoto (a pseudonymous person.)


Bitcoin

The first ever cryptocurrency on a Proof of Work (PoW) blockchain, which was created in 2009 by Satoshi Nakamoto (a pseudonymous person.)


Bitcoin

The first ever cryptocurrency on a Proof of Work (PoW) blockchain, which was created in 2009 by Satoshi Nakamoto (a pseudonymous person.)


Blast

An Ethereum L2 platform created by the same team behind Blur NFT Marketplace. It rewards users and contributors with native yields in ETH, USDC, USDT, and DAI.

Blast

An Ethereum L2 platform created by the same team behind Blur NFT Marketplace. It rewards users and contributors with native yields in ETH, USDC, USDT, and DAI.

Blast

An Ethereum L2 platform created by the same team behind Blur NFT Marketplace. It rewards users and contributors with native yields in ETH, USDC, USDT, and DAI.

Block

A batch of transactions is written to the blockchain. Every block contains information about the previous block, thus chaining them together.

Block

A batch of transactions is written to the blockchain. Every block contains information about the previous block, thus chaining them together.

Block

A batch of transactions is written to the blockchain. Every block contains information about the previous block, thus chaining them together.

Blockchain

A publicly accessible digital ledger is used to store and transfer information without the need for a central authority. Blockchains are the core technology on which cryptocurrency protocols like Bitcoin and Ethereum are built.

Blockchain

A publicly accessible digital ledger is used to store and transfer information without the need for a central authority. Blockchains are the core technology on which cryptocurrency protocols like Bitcoin and Ethereum are built.

Blockchain

A publicly accessible digital ledger is used to store and transfer information without the need for a central authority. Blockchains are the core technology on which cryptocurrency protocols like Bitcoin and Ethereum are built.

BNB Chain

One of the most popular programmable blockchains and smart contract platforms. BNB Chain comprises BNB Beacon Chain (formerly Binance Chain) and BNB Smart Chain (formerly Binance Smart Chain).

BNB Chain

One of the most popular programmable blockchains and smart contract platforms. BNB Chain comprises BNB Beacon Chain (formerly Binance Chain) and BNB Smart Chain (formerly Binance Smart Chain).

BNB Chain

One of the most popular programmable blockchains and smart contract platforms. BNB Chain comprises BNB Beacon Chain (formerly Binance Chain) and BNB Smart Chain (formerly Binance Smart Chain).

Bounce Rate

The bounce rate is the relative number of visitors who have left the site after a single page view, compared to the total number of unique visitors.

Bounce Rate

The bounce rate is the relative number of visitors who have left the site after a single page view, compared to the total number of unique visitors.

Bounce Rate

The bounce rate is the relative number of visitors who have left the site after a single page view, compared to the total number of unique visitors.

Bridge

A bridge allows assets such as tokens or NFTs from different blockchain networks to be transferred or “bridged” between each other.

Bridge

A bridge allows assets such as tokens or NFTs from different blockchain networks to be transferred or “bridged” between each other.

Bridge

A bridge allows assets such as tokens or NFTs from different blockchain networks to be transferred or “bridged” between each other.

Browsers

Browser is the statistics of the browser used by the visitor. It is extracted from the User-Agent and Client Hints HTTP headers.

Browsers

Browser is the statistics of the browser used by the visitor. It is extracted from the User-Agent and Client Hints HTTP headers.

Browsers

Browser is the statistics of the browser used by the visitor. It is extracted from the User-Agent and Client Hints HTTP headers.

BUIDL

A term derived from the word "Build," which is similar to the term "HODL," and refers to building and contributing to the blockchain and cryptocurrency ecosystem.

BUIDL

A term derived from the word "Build," which is similar to the term "HODL," and refers to building and contributing to the blockchain and cryptocurrency ecosystem.

BUIDL

A term derived from the word "Build," which is similar to the term "HODL," and refers to building and contributing to the blockchain and cryptocurrency ecosystem.

Burn

“Burning” is the process of destroying and removing tokens or NFTs from circulation. Burning is the opposite of minting.

Burn

“Burning” is the process of destroying and removing tokens or NFTs from circulation. Burning is the opposite of minting.

Burn

“Burning” is the process of destroying and removing tokens or NFTs from circulation. Burning is the opposite of minting.

Bytecode

Instructions or codes are expressed in a numeric format so that a virtual machine can efficiently interpret them.

Bytecode

Instructions or codes are expressed in a numeric format so that a virtual machine can efficiently interpret them.

Bytecode

Instructions or codes are expressed in a numeric format so that a virtual machine can efficiently interpret them.

C

CeFi

Centralized Finance: Centralized businesses that participate in crypto. (i.e. BlockFi, DCG, Grayscale)

CeFi

Centralized Finance: Centralized businesses that participate in crypto. (i.e. BlockFi, DCG, Grayscale)

CeFi

Centralized Finance: Centralized businesses that participate in crypto. (i.e. BlockFi, DCG, Grayscale)

Centralized

A hierarchical structure in which authority and control are concentrated within a small group of decision-makers.


Centralized

A hierarchical structure in which authority and control are concentrated within a small group of decision-makers.


Centralized

A hierarchical structure in which authority and control are concentrated within a small group of decision-makers.


CEX

Centralized Exchange: A cryptocurrency exchange is managed by a centralized business or entity. (i.e. Coinbase, Gemini, Kraken)

CEX

Centralized Exchange: A cryptocurrency exchange is managed by a centralized business or entity. (i.e. Coinbase, Gemini, Kraken)

CEX

Centralized Exchange: A cryptocurrency exchange is managed by a centralized business or entity. (i.e. Coinbase, Gemini, Kraken)

Chain Id

How many users are using a particular chain such as Ethereum, Polygon, etc.

Chain Id

How many users are using a particular chain such as Ethereum, Polygon, etc.

Chain Id

How many users are using a particular chain such as Ethereum, Polygon, etc.

Churn Rate

The percentage of customers who stop using your service or product over a predetermined period.

Churn Rate

The percentage of customers who stop using your service or product over a predetermined period.

Churn Rate

The percentage of customers who stop using your service or product over a predetermined period.

Cookies

Small data files stored on a user’s device by a website to remember preferences, login details, and track browsing activity.

Cookies

Small data files stored on a user’s device by a website to remember preferences, login details, and track browsing activity.

Cookies

Small data files stored on a user’s device by a website to remember preferences, login details, and track browsing activity.

Coin

A cryptocurrency built on its native blockchain is intended to be used as a store of value and a medium of exchange within that ecosystem. (i.e. BTC, ETH)

Coin

A cryptocurrency built on its native blockchain is intended to be used as a store of value and a medium of exchange within that ecosystem. (i.e. BTC, ETH)

Coin

A cryptocurrency built on its native blockchain is intended to be used as a store of value and a medium of exchange within that ecosystem. (i.e. BTC, ETH)

Consensus

When numerous nodes—usually most nodes on the network—all have the same blocks in their locally validated best blockchain, they have achieved consensus.

Consensus

When numerous nodes—usually most nodes on the network—all have the same blocks in their locally validated best blockchain, they have achieved consensus.

Consensus

When numerous nodes—usually most nodes on the network—all have the same blocks in their locally validated best blockchain, they have achieved consensus.

Consensus mechanism

The rules and procedures that enable blockchain network validators to reach an agreement on a common, valid version of history as well as the next state of the virtual computer.

Consensus Mechanism

The rules and procedures that enable blockchain network validators to reach an agreement on a common, valid version of history as well as the next state of the virtual computer.

Consensus mechanism

The rules and procedures that enable blockchain network validators to reach an agreement on a common, valid version of history as well as the next state of the virtual computer.

Contract

A contract is an account that contains and is controlled by EVM code. Contracts cannot be controlled by private keys directly unless built into the EVM code, a contract has no owner once released.

Contract

A contract is an account that contains and is controlled by EVM code. Contracts cannot be controlled by private keys directly unless built into the EVM code, a contract has no owner once released.

Contract

A contract is an account that contains and is controlled by EVM code. Contracts cannot be controlled by private keys directly unless built into the EVM code, a contract has no owner once released.

Conversion Funnel

The path users take from awareness to completing a desired action (e.g., purchase, signup).

Conversion Funnel

The path users take from awareness to completing a desired action (e.g., purchase, signup).

Conversion Funnel

The path users take from awareness to completing a desired action (e.g., purchase, signup).

Conversion Rate

The percentage of users who complete a specific action out of the total visitors.

Conversion Rate

The percentage of users who complete a specific action out of the total visitors.

Conversion Rate

The percentage of users who complete a specific action out of the total visitors.

Countries

Countries are the statistics for the country of origin of the visitors.

Countries

Countries are the statistics for the country of origin of the visitors.

Countries

Countries are the statistics for the country of origin of the visitors.

Current Visitors

How many unique visitors are currently interacting with your site or dapp.

Current Visitors

How many unique visitors are currently interacting with your site or dapp.

Current Visitors

How many unique visitors are currently interacting with your site or dapp.

Customer Acquisition Cost (CAC)

How much you’ve spent to acquire a customer.

Customer Acquisition Cost (CAC)

How much you’ve spent to acquire a customer.

Customer Acquisition Cost (CAC)

How much you’ve spent to acquire a customer.

Customer Lifetime Value (CLTV)

CLV estimates the total revenue a user generates over their entire engagement with your dapp.

Customer Lifetime Value (CLTV)

CLV estimates the total revenue a user generates over their entire engagement with your dapp.

Customer Lifetime Value (CLTV)

CLV estimates the total revenue a user generates over their entire engagement with your dapp.

Cryptocurrency

One use of blockchain networks, the most well-known of which is Bitcoin. Many industry practitioners prefer the term “tokens” because it more aptly communicates the abstract, generalizable nature of the technology.

Cryptocurrency

One use of blockchain networks, the most well-known of which is Bitcoin. Many industry practitioners prefer the term “tokens” because it more aptly communicates the abstract, generalizable nature of the technology.

Cryptocurrency

One use of blockchain networks, the most well-known of which is Bitcoin. Many industry practitioners prefer the term “tokens” because it more aptly communicates the abstract, generalizable nature of the technology.

Cryptography

The practice/method of exchanging secure and encrypted messages between two or more parties.

Cryptography

The practice/method of exchanging secure and encrypted messages between two or more parties.

Cryptography

The practice/method of exchanging secure and encrypted messages between two or more parties.

Customer Experience (CX)

The overall perception and interaction a customer has with a brand or product.

Customer Experience (CX)

The overall perception and interaction a customer has with a brand or product.

Customer Experience (CX)

The overall perception and interaction a customer has with a brand or product.

D

DAO

Decentralized Autonomous Organization: A self-governing, blockchain-based community that uses self-executing code, token voting, or some other programmatic mechanism for coordination.

DAO

Decentralized Autonomous Organization: A self-governing, blockchain-based community that uses self-executing code, token voting, or some other programmatic mechanism for coordination.

DAO

Decentralized Autonomous Organization: A self-governing, blockchain-based community that uses self-executing code, token voting, or some other programmatic mechanism for coordination.

DApp

Decentralized Application: An application built on open-source code that lives on the blockchain. Dapps exist independent of centralized groups or figures and often incentivize users to maintain them through rewarded tokens.

DApp

Decentralized Application: An application built on open-source code that lives on the blockchain. Dapps exist independent of centralized groups or figures and often incentivize users to maintain them through rewarded tokens.

DApp

Decentralized Application: An application built on open-source code that lives on the blockchain. Dapps exist independent of centralized groups or figures and often incentivize users to maintain them through rewarded tokens.

Daily Active Users (DAU)

The number of unique users engaging with a product daily.

Daily Active Users (DAU)

Decentralized Application: An application built on open-source code that lives on the blockchain. Dapps exist independent of centralized groups or figures and often incentivize users to maintain them through rewarded tokens.

Daily Active Users (DAU)

The number of unique users engaging with a product daily.

DeFi

Decentralized Finance: A category of blockchain-based financial applications and infrastructure that is designed to replace financial intermediaries with software.

DeFi

Decentralized Finance: A category of blockchain-based financial applications and infrastructure that is designed to replace financial intermediaries with software.

DeFi

Decentralized Finance: A category of blockchain-based financial applications and infrastructure that is designed to replace financial intermediaries with software.

Decentralization

A system that operates without the control of a central figure or authority, and replaces it with a distributed peer-to-peer network.

Decentralization

A system that operates without the control of a central figure or authority, and replaces it with a distributed peer-to-peer network.

Decentralization

A system that operates without the control of a central figure or authority, and replaces it with a distributed peer-to-peer network.

Devices

How many users are using a particular device such as desktop, mobile, tablet, etc.

Devices

How many users are using a particular device such as desktop, mobile, tablet, etc.

Devices

How many users are using a particular device such as desktop, mobile, tablet, etc.

Device Fingerprint

A unique identifier generated based on a device’s hardware, software, and browser settings to track and recognize users without cookies.

Device Fingerprint

Decentralized Finance: A category of blockchain-based financial applications and infrastructure that is designed to replace financial intermediaries with software.

Device Fingerprint

A unique identifier generated based on a device’s hardware, software, and browser settings to track and recognize users without cookies.

DEX

Decentralized exchange: A platform where various cryptocurrencies can be swapped, traded, and added to liquidity pools. A DEX is run by smart contracts and not controlled by a single business entity, group, or individual.

DEX

Decentralized exchange: A platform where various cryptocurrencies can be swapped, traded, and added to liquidity pools. A DEX is run by smart contracts and not controlled by a single business entity, group, or individual.

DEX

Decentralized exchange: A platform where various cryptocurrencies can be swapped, traded, and added to liquidity pools. A DEX is run by smart contracts and not controlled by a single business entity, group, or individual.

e

EIPs

Ethereum Improvement Proposals describe standards for the Ethereum platform, including core protocol specifications, client APIs, and contract standards.

EIPs

Ethereum Improvement Proposals describe standards for the Ethereum platform, including core protocol specifications, client APIs, and contract standards.

EIPs

Ethereum Improvement Proposals describe standards for the Ethereum platform, including core protocol specifications, client APIs, and contract standards.

ENS

Ethereum Name Service takes the same concept as the DNS but adjusts it for the needs of Ethereum users. The ENS is a distributed, open, and extensible naming system based on the Ethereum blockchain.

ENS

Ethereum Improvement Proposals describe standards for the Ethereum platform, including core protocol specifications, client APIs, and contract standards.

ENS

Ethereum Name Service takes the same concept as the DNS but adjusts it for the needs of Ethereum users. The ENS is a distributed, open, and extensible naming system based on the Ethereum blockchain.

ERC

Ethereum Request for Comments: An application-level standard for Ethereum (i.e. ERC-20 is a common protocol for deploying fungible tokens on Ethereum).

ERC

Ethereum Request for Comments: An application-level standard for Ethereum (i.e. ERC-20 is a common protocol for deploying fungible tokens on Ethereum).

ERC

Ethereum Request for Comments: An application-level standard for Ethereum (i.e. ERC-20 is a common protocol for deploying fungible tokens on Ethereum).

ERC20

The Ethereum token standard, providing a standardized smart contract structure for fungible tokens.

ERC20

The Ethereum token standard, providing a standardized smart contract structure for fungible tokens.

ERC20

The Ethereum token standard, providing a standardized smart contract structure for fungible tokens.

ERC721

An Ethereum token standard that allows for the formation of unique tokens, otherwise known as NFTs. Unlike ERC-20, ERC-721 tokens have specific properties that allow each to be uniquely identified and valued independently of one another.

ERC721

An Ethereum token standard that allows for the formation of unique tokens, otherwise known as NFTs. Unlike ERC-20, ERC-721 tokens have specific properties that allow each to be uniquely identified and valued independently of one another.

ERC721

An Ethereum token standard that allows for the formation of unique tokens, otherwise known as NFTs. Unlike ERC-20, ERC-721 tokens have specific properties that allow each to be uniquely identified and valued independently of one another.

Ether

The primary internal cryptographic token of the Ethereum network. Ether is used to pay transaction and computation fees for Ethereum transactions.

Ether

The primary internal cryptographic token of the Ethereum network. Ether is used to pay transaction and computation fees for Ethereum transactions.

Ether

The primary internal cryptographic token of the Ethereum network. Ether is used to pay transaction and computation fees for Ethereum transactions.

Ethereum

A public blockchain serving as the foundation for decentralized applications. Ethereum is a complete language, that allows users to write and deploy complex, self-executing smart contracts that live on the blockchain.

Ethereum

A public blockchain serving as the foundation for decentralized applications. Ethereum is a complete language, that allows users to write and deploy complex, self-executing smart contracts that live on the blockchain.

Ethereum

A public blockchain serving as the foundation for decentralized applications. Ethereum is a complete language, that allows users to write and deploy complex, self-executing smart contracts that live on the blockchain.

Events

Events are user-defined custom events. They have a name and optional metadata key/value pairs. When you expand the activity feed, you can view and filter the metadata.

Metadata can be anything. For example, you can define an event Button clicked and track which button was clicked as the metadata field button=Header.

Events

Ethereum Virtual Machine: The engine in which transaction code gets executed. EVM enables the development of thousands of different applications on one platform.

Smart contracts written in smart contract-specific programming languages are compiled into “bytecode,” which EVM can read and execute.

Events

Events are user-defined custom events. They have a name and optional metadata key/value pairs. When you expand the activity feed, you can view and filter the metadata.

Metadata can be anything. For example, you can define an event Button clicked and track which button was clicked as the metadata field button=Header.

EVM

Ethereum Virtual Machine: the engine in which transaction code gets executed. EVM enables the development of thousands of different applications on one platform.

Smart contracts written in smart contract-specific programming languages are compiled into “bytecode,” which EVM can read and execute.

EVM

Ethereum Virtual Machine: The engine in which transaction code gets executed. EVM enables the development of thousands of different applications on one platform.

Smart contracts written in smart contract-specific programming languages are compiled into “bytecode,” which EVM can read and execute.

EVM

Ethereum Virtual Machine: the engine in which transaction code gets executed. EVM enables the development of thousands of different applications on one platform.

Smart contracts written in smart contract-specific programming languages are compiled into “bytecode,” which EVM can read and execute.

Externally Owned Account

An account controlled by a private key. Externally owned accounts cannot contain EVM code

Externally Owned Account

An account controlled by a private key. Externally owned accounts cannot contain EVM code

Externally Owned Account

An account controlled by a private key. Externally owned accounts cannot contain EVM code

f

Farcaster

A protocol for developing decentralized social network applications built on Optimism, which is a layer-two scaling solution for Ethereum.

Farcaster

A protocol for developing decentralized social network applications built on Optimism, which is a layer-two scaling solution for Ethereum.

Farcaster

A protocol for developing decentralized social network applications built on Optimism, which is a layer-two scaling solution for Ethereum.

Faucets

Sources of token supply and a tool for keeping prices balanced in a virtual economy. Airdrops and DAO Treasury distributions are two common types of faucets.

Faucets

Sources of token supply and a tool for keeping prices balanced in a virtual economy. Airdrops and DAO Treasury distributions are two common types of faucets.

Faucets

Sources of token supply and a tool for keeping prices balanced in a virtual economy. Airdrops and DAO Treasury distributions are two common types of faucets.

Federated network

A variety of protocol network that doesn’t use centralized corporate data centers to host people’s data but rather relies on peer nodes to run their software instances, called "servers,"  to host network data.

Federated Network

A variety of protocol network that doesn’t use centralized corporate data centers to host people’s data but rather relies on peer nodes to run their software instances, called "servers,"  to host network data.

Federated network

A variety of protocol network that doesn’t use centralized corporate data centers to host people’s data but rather relies on peer nodes to run their software instances, called "servers,"  to host network data.

Fiat

Fiat money is a type of money that is not backed by any commodity, such as gold or silver, and is typically declared by a decree from the government to be legal tender.

Fiat

Fiat money is a type of money that is not backed by any commodity, such as gold or silver, and is typically declared by a decree from the government to be legal tender.

Fiat

Fiat money is a type of money that is not backed by any commodity, such as gold or silver, and is typically declared by a decree from the government to be legal tender.

Fork

A fork occurs when a blockchain splits into two different branches. There can be many reasons for a fork (usually upgrades), and the community usually votes on the decision to fork a network.

Fork

A fork occurs when a blockchain splits into two different branches. There can be many reasons for a fork (usually upgrades), and the community usually votes on the decision to fork a network.

Fork

A fork occurs when a blockchain splits into two different branches. There can be many reasons for a fork (usually upgrades), and the community usually votes on the decision to fork a network.

Fractionalization

The process of subdividing an asset into multiple pieces. Commonly used for dividing a single non-fungible token into many fungible tokens.

Fractionalization

The process of subdividing an asset into multiple pieces. Commonly used for dividing a single non-fungible token into many fungible tokens.

Fractionalization

The process of subdividing an asset into multiple pieces. Commonly used for dividing a single non-fungible token into many fungible tokens.

Fungible tokens

A fungible token represents an asset or equity that can be traded with another token or digital asset. Tokens on the blockchain are immutable, meaning they have a fixed name, symbol, and total supply unless otherwise made mutable with the help of a smart contract.

Fungible Tokens

A fungible token represents an asset or equity that can be traded with another token or digital asset. Tokens on the blockchain are immutable, meaning they have a fixed name, symbol, and total supply unless otherwise made mutable with the help of a smart contract.

Fungible tokens

A fungible token represents an asset or equity that can be traded with another token or digital asset. Tokens on the blockchain are immutable, meaning they have a fixed name, symbol, and total supply unless otherwise made mutable with the help of a smart contract.

G

Gas

The cost of completing a transaction on a blockchain network. On Ethereum, for example, gas transaction costs are a small fraction of Ethereum’s native token, ETH.

Gas

The cost of completing a transaction on a blockchain network. On Ethereum, for example, gas transaction costs are a small fraction of Ethereum’s native token, ETH.

Gas

The cost of completing a transaction on a blockchain network. On Ethereum, for example, gas transaction costs are a small fraction of Ethereum’s native token, ETH.

Geth

Go Ethereum: One of the most prominent implementations of the Ethereum protocol is written in Go.

Geth

Go Ethereum: One of the most prominent implementations of the Ethereum protocol is written in Go.

Geth

Go Ethereum: One of the most prominent implementations of the Ethereum protocol is written in Go.

GM

Good morning - a friendly greeting in the crypto community for a pleasant morning and a great day ahead, often used on platforms like Twitter and Discord.

GM

Good morning - a friendly greeting in the crypto community for a pleasant morning and a great day ahead, often used on platforms like Twitter and Discord.

GM

Good morning - a friendly greeting in the crypto community for a pleasant morning and a great day ahead, often used on platforms like Twitter and Discord.

Go-to-Market (GTM) Strategy

A plan for launching a product and reaching target customers effectively.

Go-to-Market (GTM) Strategy

A plan for launching a product and reaching target customers effectively.

Go-to-Market (GTM) Strategy

A plan for launching a product and reaching target customers effectively.

Gwei

A gwei is one billionth of an ETH, the native token of the Ethereum blockchain.

Gwei

A gwei is one billionth of an ETH, the native token of the Ethereum blockchain.

Gwei

A gwei is one billionth of an ETH, the native token of the Ethereum blockchain.

H

Hackathon/Hacker House

In-person meetings of developers and other community members to work collaboratively to solve one or more common objectives.

Hackathon/Hacker House

In-person meetings of developers and other community members to work collaboratively to solve one or more common objectives.

Hackathon/Hacker House

In-person meetings of developers and other community members to work collaboratively to solve one or more common objectives.

Hash

A unique, fixed-length cryptographic code, or identifier, representing a piece of data. Hashes are essential to modern cryptography and blockchain networks, which use them to ensure digital security and data integrity.

Hash

A unique, fixed-length cryptographic code, or identifier, representing a piece of data. Hashes are essential to modern cryptography and blockchain networks, which use them to ensure digital security and data integrity.

Hash

A unique, fixed-length cryptographic code, or identifier, representing a piece of data. Hashes are essential to modern cryptography and blockchain networks, which use them to ensure digital security and data integrity.

Hardware Wallet (Cold Wallet)

A physical device that stores cryptocurrency private keys offline, making them less vulnerable to hacking than software wallets (Hot wallet)

Hardware Wallet (Cold Wallet)

A physical device that stores cryptocurrency private keys offline, making them less vulnerable to hacking than software wallets (Hot wallet)

Hardware Wallet (Cold Wallet)

A physical device that stores cryptocurrency private keys offline, making them less vulnerable to hacking than software wallets (Hot wallet)

HD Wallet

A wallet using the hierarchical deterministic (HD) key creation and transfer protocol (BIP-32)

HD Wallet

A wallet using the hierarchical deterministic (HD) key creation and transfer protocol (BIP-32)

HD Wallet

A wallet using the hierarchical deterministic (HD) key creation and transfer protocol (BIP-32)

I

Impermanent Loss

Impermanent loss happens when you provide liquidity to a liquidity pool, and the price of your deposited assets changes compared to when you deposited them.

Impermanent Loss

Impermanent loss happens when you provide liquidity to a liquidity pool, and the price of your deposited assets changes compared to when you deposited them.

Impermanent Loss

Impermanent loss happens when you provide liquidity to a liquidity pool, and the price of your deposited assets changes compared to when you deposited them.

Internal Transactions

Internal transactions are transactions that occur between smart contracts. This can also include transactions from a smart contract to an external address when sending ETH to a user.

Internal Transactions

Internal transactions are transactions that occur between smart contracts. This can also include transactions from a smart contract to an external address when sending ETH to a user.

Internal Transactions

Internal transactions are transactions that occur between smart contracts. This can also include transactions from a smart contract to an external address when sending ETH to a user.

IP addresses

A unique numerical label assigned to a device connected to the internet, used for identifying location and network access.

IP addresses

A unique numerical label assigned to a device connected to the internet, used for identifying location and network access.

IP addresses

A unique numerical label assigned to a device connected to the internet, used for identifying location and network access.

IPFS

InterPlanetary File System: A protocol, network, and open-source project designed to create a content-addressable, peer-to-peer method of storing and sharing hypermedia in a distributed filesystem.

IPFS

InterPlanetary File System: A protocol, network, and open-source project designed to create a content-addressable, peer-to-peer method of storing and sharing hypermedia in a distributed filesystem.

IPFS

InterPlanetary File System: A protocol, network, and open-source project designed to create a content-addressable, peer-to-peer method of storing and sharing hypermedia in a distributed filesystem.

K

Killer App

A software application that is so compelling it drives the adoption of a new technology or platform. Often, killer apps exploit a new technology or platform’s unique capabilities.

Killer App

A software application that is so compelling it drives the adoption of a new technology or platform. Often, killer apps exploit a new technology or platform’s unique capabilities.

Killer App

A software application that is so compelling it drives the adoption of a new technology or platform. Often, killer apps exploit a new technology or platform’s unique capabilities.

L

Layer 1 (L1)

A main network that refers to a blockchain that defines protocol rules (i.e. Bitcoin, Ethereum, Solana).

Layer 1 (L1)

A main network that refers to a blockchain that defines protocol rules (i.e. Bitcoin, Ethereum, Solana).

Layer 1 (L1)

A main network that refers to a blockchain that defines protocol rules (i.e. Bitcoin, Ethereum, Solana).

Layer 2 (L2)

A program or technology that exists on top of a Layer 1 blockchain, often created to accomplish something that may not be easily achievable by its parent Layer 1 (i.e. increase speed or functionality).

Layer 2 (L2)

A program or technology that exists on top of a Layer 1 blockchain, often created to accomplish something that may not be easily achievable by its parent Layer 1 (i.e. increase speed or functionality).

Layer 2 (L2)

A program or technology that exists on top of a Layer 1 blockchain, often created to accomplish something that may not be easily achievable by its parent Layer 1 (i.e. increase speed or functionality).

Light Client

A blockchain client that does not store the entire blockchain. Instead, the light client relies on other nodes in the network to provide the necessary information.

Light Client

A blockchain client that does not store the entire blockchain. Instead, the light client relies on other nodes in the network to provide the necessary information.

Light Client

A blockchain client that does not store the entire blockchain. Instead, the light client relies on other nodes in the network to provide the necessary information.

Light Nodes

Do not have the entirety of the current blockchain state and depend on a full node, which is useful for low-memory and computational devices.

Light Nodes

Do not have the entirety of the current blockchain state and depend on a full node, which is useful for low-memory and computational devices.

Light Nodes

Do not have the entirety of the current blockchain state and depend on a full node, which is useful for low-memory and computational devices.

Liquidity

A measure for how easily an asset can be converted to another (usually cash but also common for Layer 1 tokens)

Liquidity

A measure for how easily an asset can be converted to another (usually cash but also common for Layer 1 tokens)

Liquidity

A measure for how easily an asset can be converted to another (usually cash but also common for Layer 1 tokens)

Liquidity Pool

A liquidity pool is a pool of cryptocurrencies available to trade on a decentralized exchange (DEX). Pools are usually composed of assets deposited by users, which can be traded with other assets in the pool through smart contracts.

Liquidity Pool

A liquidity pool is a pool of cryptocurrencies available to trade on a decentralized exchange (DEX). Pools are usually composed of assets deposited by users, which can be traded with other assets in the pool through smart contracts.

Liquidity Pool

A liquidity pool is a pool of cryptocurrencies available to trade on a decentralized exchange (DEX). Pools are usually composed of assets deposited by users, which can be traded with other assets in the pool through smart contracts.

M

Mantle

 A layer-2 network designed with a modular architecture, low fees, and high security to enhance the scalability and functionality of decentralized applications (dApps) built on Ethereum.

Mantle

 A layer-2 network designed with a modular architecture, low fees, and high security to enhance the scalability and functionality of decentralized applications (dApps) built on Ethereum.

Mantle

 A layer-2 network designed with a modular architecture, low fees, and high security to enhance the scalability and functionality of decentralized applications (dApps) built on Ethereum.

Mainnet

The production version of a blockchain network where transactions and other operations are recorded and processed. It is a blockchain protocol’s primary and original network, as opposed to a testnet.

Mainnet

The production version of a blockchain network where transactions and other operations are recorded and processed. It is a blockchain protocol’s primary and original network, as opposed to a testnet.

Mainnet

The production version of a blockchain network where transactions and other operations are recorded and processed. It is a blockchain protocol’s primary and original network, as opposed to a testnet.

Marketing Qualified Lead (MQL)

A prospect identified as more likely to become a customer based on engagement.

Marketing Qualified Lead (MQL)

A prospect identified as more likely to become a customer based on engagement.

Marketing Qualified Lead (MQL)

A prospect identified as more likely to become a customer based on engagement.

Mint

The act of creating new tokens or NFTs onto a blockchain.

Mint

The act of creating new tokens or NFTs onto a blockchain.

Mint

The act of creating new tokens or NFTs onto a blockchain.

N

NFTs

Non-fungible Tokens: meaning each token is unique and not interchangeable with any other. Applications include representing ownership of physical goods, digital media, intellectual property, royalty rights, in-game items, or network identifiers akin to DNS names.

NFTs

Non-fungible Tokens: meaning each token is unique and not interchangeable with any other. Applications include representing ownership of physical goods, digital media, intellectual property, royalty rights, in-game items, or network identifiers akin to DNS names.

NFTs

Non-fungible Tokens: meaning each token is unique and not interchangeable with any other. Applications include representing ownership of physical goods, digital media, intellectual property, royalty rights, in-game items, or network identifiers akin to DNS names.

Nodes

A server or computer running blockchain-specific software used for connecting to and interacting with that blockchain.

Nodes

A server or computer running blockchain-specific software used for connecting to and interacting with that blockchain.

Nodes

A server or computer running blockchain-specific software used for connecting to and interacting with that blockchain.

Nonce

In cryptocurrency mining, a nonce is a number added to a block header to produce a hash that meets a specific difficulty target and allows the block to be added to the blockchain.

Nonce

In cryptocurrency mining, a nonce is a number added to a block header to produce a hash that meets a specific difficulty target and allows the block to be added to the blockchain.

Nonce

In cryptocurrency mining, a nonce is a number added to a block header to produce a hash that meets a specific difficulty target and allows the block to be added to the blockchain.

O

Off-chain

This means a coalition of community members steers it like protocol networks

Off-chain

This means a coalition of community members steers it like protocol networks

Off-chain

This means a coalition of community members steers it like protocol networks

On-chain

This means through mechanisms such as token voting, self-executing code, or a combination.

On-chain

This means through mechanisms such as token voting, self-executing code, or a combination.

On-chain

This means through mechanisms such as token voting, self-executing code, or a combination.

Onboarding

The process of guiding new users to understand and use a product effectively.

Onboarding

The process of guiding new users to understand and use a product effectively.

Onboarding

The process of guiding new users to understand and use a product effectively.

Oracles

A service supplying smart contracts with data from the outside world. Smart contracts are unable to access data that exists off-chain, so they rely on oracles to retrieve, verify, and provide external information. (i.e. Chainlink, Band Protocol)

Oracles

A service supplying smart contracts with data from the outside world. Smart contracts are unable to access data that exists off-chain, so they rely on oracles to retrieve, verify, and provide external information. (i.e. Chainlink, Band Protocol)

Oracles

A service supplying smart contracts with data from the outside world. Smart contracts are unable to access data that exists off-chain, so they rely on oracles to retrieve, verify, and provide external information. (i.e. Chainlink, Band Protocol)

Optimism

The Optimism network is a layer-2 scaling solution for Ethereum, that uses “optimistic rollup” technology to allow faster and cheaper transactions off-chain, while still being secured by the underlying Ethereum blockchain.

Optimism

The Optimism network is a layer-2 scaling solution for Ethereum, that uses “optimistic rollup” technology to allow faster and cheaper transactions off-chain, while still being secured by the underlying Ethereum blockchain.

Optimism

The Optimism network is a layer-2 scaling solution for Ethereum, that uses “optimistic rollup” technology to allow faster and cheaper transactions off-chain, while still being secured by the underlying Ethereum blockchain.

P

Page Views

How many times a page has been viewed across your site or dapp.

Page Views

How many times a page has been viewed across your site or dapp.

Page Views

How many times a page has been viewed across your site or dapp.

P2E

Play-to-earn (“P2E”) games allow players to acquire in-game assets, items, or currencies. These assets can be used in other games or sold on secondary markets for real money.

P2E

Play-to-earn (“P2E”) games allow players to acquire in-game assets, items, or currencies. These assets can be used in other games or sold on secondary markets for real money.

P2E

Play-to-earn (“P2E”) games allow players to acquire in-game assets, items, or currencies. These assets can be used in other games or sold on secondary markets for real money.

PFP

An NFT used as a profile picture (PFP). Popular NFT PFPs include Bored Apes and Crypto Punks.

PFP

An NFT used as a profile picture (PFP). Popular NFT PFPs include Bored Apes and Crypto Punks.

PFP

An NFT used as a profile picture (PFP). Popular NFT PFPs include Bored Apes and Crypto Punks.

Polygon

The Polygon network is a layer-2 scaling solution for Ethereum that uses a system of interconnected Ethereum sidechains to facilitate faster, cheaper transactions and lower gas fees.

Polygon

The Polygon network is a layer-2 scaling solution for Ethereum that uses a system of interconnected Ethereum sidechains to facilitate faster, cheaper transactions and lower gas fees.

Polygon

The Polygon network is a layer-2 scaling solution for Ethereum that uses a system of interconnected Ethereum sidechains to facilitate faster, cheaper transactions and lower gas fees.

PoH

Proof of History: A consensus mechanism that relies on an internal clock to track the passage of time

PoH

Proof of History: A consensus mechanism that relies on an internal clock to track the passage of time

PoH

Proof of History: A consensus mechanism that relies on an internal clock to track the passage of time

PoS

Proof of stake: A cryptocurrency consensus mechanism for processing transactions and creating new blocks in a blockchain.

PoS

Proof of stake: A cryptocurrency consensus mechanism for processing transactions and creating new blocks in a blockchain.

PoS

Proof of stake: A cryptocurrency consensus mechanism for processing transactions and creating new blocks in a blockchain.

PoW

Proof of work: is a consensus mechanism by which a blockchain network achieves distributed consensus by choosing the next block producer (miner) via a computational race. The miner who solves a cryptographic puzzle the fastest gets to add the next block to the chain and is rewarded for their work in cryptocurrency.

PoW

Proof of work: is a consensus mechanism by which a blockchain network achieves distributed consensus by choosing the next block producer (miner) via a computational race. The miner who solves a cryptographic puzzle the fastest gets to add the next block to the chain and is rewarded for their work in cryptocurrency.

PoW

Proof of work: is a consensus mechanism by which a blockchain network achieves distributed consensus by choosing the next block producer (miner) via a computational race. The miner who solves a cryptographic puzzle the fastest gets to add the next block to the chain and is rewarded for their work in cryptocurrency.

Private (Secret) Key

The secret value that allows Ethereum users to prove ownership of an account or contract, by producing a digital signature.

Private (Secret) Key

The secret value that allows Ethereum users to prove ownership of an account or contract, by producing a digital signature.

Private (Secret) Key

The secret value that allows Ethereum users to prove ownership of an account or contract, by producing a digital signature.

Protocol

The foundational software layer of a program. Protocol has become a general term used to refer to both layer 1 blockchain networks and the layer 2 applications built on top of them - Bitcoin, Ethereum, Uniswap, and Lightning Network can all be considered protocols.

Protocol

The foundational software layer of a program. Protocol has become a general term used to refer to both layer 1 blockchain networks and the layer 2 applications built on top of them - Bitcoin, Ethereum, Uniswap, and Lightning Network can all be considered protocols.

Protocol

The foundational software layer of a program. Protocol has become a general term used to refer to both layer 1 blockchain networks and the layer 2 applications built on top of them - Bitcoin, Ethereum, Uniswap, and Lightning Network can all be considered protocols.

Protocol Networks

The original internet network type, exemplified by email and the web, is known more technically as the protocols SMTP and HTTP. Protocol networks are open, permissionless systems that are controlled by communities of software developers and other network stakeholders.

Protocol Networks

The original internet network type, exemplified by email and the web, is known more technically as the protocols SMTP and HTTP. Protocol networks are open, permissionless systems that are controlled by communities of software developers and other network stakeholders.

Protocol Networks

The original internet network type, exemplified by email and the web, is known more technically as the protocols SMTP and HTTP. Protocol networks are open, permissionless systems that are controlled by communities of software developers and other network stakeholders.

Product Analytics

The use of data to understand product performance and user behavior.

Product Analytics

The use of data to understand product performance and user behavior.

Product Analytics

The use of data to understand product performance and user behavior.

Product-Led Growth (PLG)

A strategy where the product itself drives user acquisition and retention.

Product-Led Growth (PLG)

A strategy where the product itself drives user acquisition and retention.

Product-Led Growth (PLG)

A strategy where the product itself drives user acquisition and retention.

Product Management

The discipline of guiding a product's development, launch, and lifecycle.

Product Management

The discipline of guiding a product's development, launch, and lifecycle.

Product Management

The discipline of guiding a product's development, launch, and lifecycle.

Product Roadmap

A strategic plan outlining the future development of a product.

Product Roadmap

A strategic plan outlining the future development of a product.

Product Roadmap

A strategic plan outlining the future development of a product.

Product Strategy

A high-level plan defining how a product will meet business and user needs.

Product Strategy

A high-level plan defining how a product will meet business and user needs.

Product Strategy

A high-level plan defining how a product will meet business and user needs.

Public Key Encryption

A special kind of encryption where there is a process for generating two keys at the same time (typically called a private key and a public key), such that documents encrypted using one key can be decrypted with the other.

Public Key Encryption

A special kind of encryption where there is a process for generating two keys at the same time (typically called a private key and a public key), such that documents encrypted using one key can be decrypted with the other.

Public Key Encryption

A special kind of encryption where there is a process for generating two keys at the same time (typically called a private key and a public key), such that documents encrypted using one key can be decrypted with the other.

R

Referrals

How many users are referred to your site or dapp by a particular user. We use the referral and ref query parameters to track referrals.

Referrals

How many users are referred to your site or dapp by a particular user. We use the referral and ref query parameters to track referrals.

Referrals

How many users are referred to your site or dapp by a particular user. We use the referral and ref query parameters to track referrals.

Referrers / Sources

How many users are referred to your site or dapp by a particular source such as a search engines, social media platform, etc.

Referrers are the statistics for the referring site. The data is extracted from the Referers (with a r) HTTP header and may not be set by the browser. In these cases it will be listed as unknown.

Referrers / Sources

How many users are referred to your site or dapp by a particular source such as a search engines, social media platform, etc.

Referrers are the statistics for the referring site. The data is extracted from the Referers (with a r) HTTP header and may not be set by the browser. In these cases it will be listed as unknown.

Referrers / Sources

How many users are referred to your site or dapp by a particular source such as a search engines, social media platform, etc.

Referrers are the statistics for the referring site. The data is extracted from the Referers (with a r) HTTP header and may not be set by the browser. In these cases it will be listed as unknown.

Retention Rate

The percentage of customers who continue to use your service or product over a predetermined period.

Retention Rate

The percentage of customers who continue to use your service or product over a predetermined period.

Retention Rate

The percentage of customers who continue to use your service or product over a predetermined period.

Reward

An amount of ether is included in each new block as a reward by the network to the miner who found the proof-of-work solution.

Reward

An amount of ether is included in each new block as a reward by the network to the miner who found the proof-of-work solution.

Reward

An amount of ether is included in each new block as a reward by the network to the miner who found the proof-of-work solution.

Rollup

A scaling solution that aims to improve transaction throughput and decrease fees by batching multiple transactions off-chain and then submitting them to the main chain as a single transaction. (i.e. Optimism, ZK, Arbitrum)

Rollup

A scaling solution that aims to improve transaction throughput and decrease fees by batching multiple transactions off-chain and then submitting them to the main chain as a single transaction. (i.e. Optimism, ZK, Arbitrum)

Rollup

A scaling solution that aims to improve transaction throughput and decrease fees by batching multiple transactions off-chain and then submitting them to the main chain as a single transaction. (i.e. Optimism, ZK, Arbitrum)

RPC

Remote Procedure Call, which is a protocol that allows programs to execute procedures or functions on a remote server as if they were local.

RPC

Remote Procedure Call, which is a protocol that allows programs to execute procedures or functions on a remote server as if they were local.

RPC

Remote Procedure Call, which is a protocol that allows programs to execute procedures or functions on a remote server as if they were local.

Rug Pull

A scam maneuver where a crypto project takes the invested funds and runs. A rug pull can also occur for assets with centralized ownership. If someone can sell a large portion of the circulating supply at once, this rapidly increases the supply, which can cause the price of the asset to plummet.

Rug Pull

A scam maneuver where a crypto project takes the invested funds and runs. A rug pull can also occur for assets with centralized ownership. If someone can sell a large portion of the circulating supply at once, this rapidly increases the supply, which can cause the price of the asset to plummet.

Rug Pull

A scam maneuver where a crypto project takes the invested funds and runs. A rug pull can also occur for assets with centralized ownership. If someone can sell a large portion of the circulating supply at once, this rapidly increases the supply, which can cause the price of the asset to plummet.

S

Scalability

A protocol’s capacity to handle higher demand and increase transaction throughput as the network grows.

Scalability

A protocol’s capacity to handle higher demand and increase transaction throughput as the network grows.

Scalability

A protocol’s capacity to handle higher demand and increase transaction throughput as the network grows.

S-curve

A growth-over-time chart that many new technologies follow as they go from minimal to mainstream adoption. It resembles the letter “S”.

S-curve

A growth-over-time chart that many new technologies follow as they go from minimal to mainstream adoption. It resembles the letter “S”.

S-curve

A growth-over-time chart that many new technologies follow as they go from minimal to mainstream adoption. It resembles the letter “S”.

Seed Phrase

A string of words used as a master password to access a crypto wallet. Because a single wallet can contain multiple accounts, all with their own private keys, a seed phrase makes it easy to access them all with the same password.

Seed Phrase

A string of words used as a master password to access a crypto wallet. Because a single wallet can contain multiple accounts, all with their own private keys, a seed phrase makes it easy to access them all with the same password.

Seed Phrase

A string of words used as a master password to access a crypto wallet. Because a single wallet can contain multiple accounts, all with their own private keys, a seed phrase makes it easy to access them all with the same password.

Self-executing

Self-executing means it can function by itself, not controlled by any other party. Self-executing smart contracts would cut costs/overhead by removing the need for an arbitrator and trusting a third party.

Self-executing

Self-executing means it can function by itself, not controlled by any other party. Self-executing smart contracts would cut costs/overhead by removing the need for an arbitrator and trusting a third party.

Self-executing

Self-executing means it can function by itself, not controlled by any other party. Self-executing smart contracts would cut costs/overhead by removing the need for an arbitrator and trusting a third party.

Sessions

A session (also known as a visit) is a set of actions that a user takes on your site. Each session is a 24 hour window. If a visitor returns after this window, a new session is counted.

Sessions

A session (also known as a visit) is a set of actions that a user takes on your site. Each session is a 24 hour window. If a visitor returns after this window, a new session is counted.

Sessions

A session (also known as a visit) is a set of actions that a user takes on your site. Each session is a 24 hour window. If a visitor returns after this window, a new session is counted.

Sidechain

A parallel blockchain used to offload transactions from the main chain to increase scalability or add other functionality. Sidechains are connected to their main chain, or parent chain, via a two-way link, which allows data and assets to be seamlessly transferred. (i.e. Matic, Dai)



Sidechain

A parallel blockchain used to offload transactions from the main chain to increase scalability or add other functionality. Sidechains are connected to their main chain, or parent chain, via a two-way link, which allows data and assets to be seamlessly transferred. (i.e. Matic, Dai)



Sidechain

A parallel blockchain used to offload transactions from the main chain to increase scalability or add other functionality. Sidechains are connected to their main chain, or parent chain, via a two-way link, which allows data and assets to be seamlessly transferred. (i.e. Matic, Dai)



Signing

“Signing” in Web3 is the process of creating a digital signature using a combination of your wallet’s private keys, cryptography, and encryption. When you sign anything using your wallet, the receiving address (or “signee”) decrypts and verifies that the request was sent by your private key and completes the transaction.

Signing

“Signing” in Web3 is the process of creating a digital signature using a combination of your wallet’s private keys, cryptography, and encryption. When you sign anything using your wallet, the receiving address (or “signee”) decrypts and verifies that the request was sent by your private key and completes the transaction.

Signing

“Signing” in Web3 is the process of creating a digital signature using a combination of your wallet’s private keys, cryptography, and encryption. When you sign anything using your wallet, the receiving address (or “signee”) decrypts and verifies that the request was sent by your private key and completes the transaction.

Sharding

A method of separating a network’s nodes into smaller groups (shards) in an attempt to increase scalability. These shards are then able to reach consensus on behalf of the entire network, removing the need for every node to process every transaction.

Sharding

A method of separating a network’s nodes into smaller groups (shards) in an attempt to increase scalability. These shards are then able to reach consensus on behalf of the entire network, removing the need for every node to process every transaction.

Sharding

A method of separating a network’s nodes into smaller groups (shards) in an attempt to increase scalability. These shards are then able to reach consensus on behalf of the entire network, removing the need for every node to process every transaction.

Slashing

A punishment that confiscates a validator’s staked collateral in some proof of stake blockchain networks, like Ethereum. Slashing can occur if a validator gets caught lying, such as by voting for contradictory state transitions or proposing multiple conflicting state transitions simultaneously.

Slashing

A punishment that confiscates a validator’s staked collateral in some proof of stake blockchain networks, like Ethereum. Slashing can occur if a validator gets caught lying, such as by voting for contradictory state transitions or proposing multiple conflicting state transitions simultaneously.

Slashing

A punishment that confiscates a validator’s staked collateral in some proof of stake blockchain networks, like Ethereum. Slashing can occur if a validator gets caught lying, such as by voting for contradictory state transitions or proposing multiple conflicting state transitions simultaneously.

Slippage

Self-executing code deployed on a blockchain. Smart contracts allow transactions to be made without an intermediary figure and without the parties involved having to trust one another.

Slippage

Self-executing code deployed on a blockchain. Smart contracts allow transactions to be made without an intermediary figure and without the parties involved having to trust one another.

Slippage

Self-executing code deployed on a blockchain. Smart contracts allow transactions to be made without an intermediary figure and without the parties involved having to trust one another.

Smart Contract

The act of heavily promoting a cryptocurrency, stock, or other asset to increase adoption and, in turn, raise its price. This is usually done via spamming on social media and generally carries a negative connotation.

Smart Contract

The act of heavily promoting a cryptocurrency, stock, or other asset to increase adoption and, in turn, raise its price. This is usually done via spamming on social media and generally carries a negative connotation.

Smart Contract

The act of heavily promoting a cryptocurrency, stock, or other asset to increase adoption and, in turn, raise its price. This is usually done via spamming on social media and generally carries a negative connotation.

Solidity

The native programming language of Ethereum, mainly used to write smart contracts.

Solidity

The native programming language of Ethereum, mainly used to write smart contracts.

Solidity

The native programming language of Ethereum, mainly used to write smart contracts.

Stablecoins

Tokens designed to maintain a stable price. These can be pegged to currencies, like the U.S. dollar, or regulated algorithmically by automated market-making processes.

Stablecoins

Tokens designed to maintain a stable price. These can be pegged to currencies, like the U.S. dollar, or regulated algorithmically by automated market-making processes.

Stablecoins

Tokens designed to maintain a stable price. These can be pegged to currencies, like the U.S. dollar, or regulated algorithmically by automated market-making processes.

Staking

The process by which validators lock tokens in code-enforced escrow accounts to help secure a proof of stake blockchain network. Staking is a kind of “security” sink-in that takes tokens out of circulation.

Staking

The process by which validators lock tokens in code-enforced escrow accounts to help secure a proof of stake blockchain network. Staking is a kind of “security” sink-in that takes tokens out of circulation.

Staking

The process by which validators lock tokens in code-enforced escrow accounts to help secure a proof of stake blockchain network. Staking is a kind of “security” sink-in that takes tokens out of circulation.

State Transition

The essence of computation. A state transition is what happens when a machine modifies its internal state, or memory, according to the logic of a processor. Blockchains are virtual computers that undergo state transitions according to their consensus mechanisms.

State Transition

The essence of computation. A state transition is what happens when a machine modifies its internal state, or memory, according to the logic of a processor. Blockchains are virtual computers that undergo state transitions according to their consensus mechanisms.

State Transition

The essence of computation. A state transition is what happens when a machine modifies its internal state, or memory, according to the logic of a processor. Blockchains are virtual computers that undergo state transitions according to their consensus mechanisms.

Storage

A key/value database contained in each account, where keys and values are both 32-byte strings but can otherwise contain anything.

Storage

A key/value database contained in each account, where keys and values are both 32-byte strings but can otherwise contain anything.

Storage

A key/value database contained in each account, where keys and values are both 32-byte strings but can otherwise contain anything.

Sui

A PoS-based Layer 1 blockchain designed to provide instant settlement and high throughput for latency-sensitive decentralized applications.

Sui

A PoS-based Layer 1 blockchain designed to provide instant settlement and high throughput for latency-sensitive decentralized applications.

Sui

A PoS-based Layer 1 blockchain designed to provide instant settlement and high throughput for latency-sensitive decentralized applications.

T

Take Rate

The percentage of revenue passing through a network that is claimed by the network owner rather than by network participants. Protocol and blockchain networks feature persistently low or no take rates, while corporate networks tend to have high ones.

Take Rate

The percentage of revenue passing through a network that is claimed by the network owner rather than by network participants. Protocol and blockchain networks feature persistently low or no take rates, while corporate networks tend to have high ones.

Take Rate

The percentage of revenue passing through a network that is claimed by the network owner rather than by network participants. Protocol and blockchain networks feature persistently low or no take rates, while corporate networks tend to have high ones.

Testnet

Short for "test network," a network used to simulate the behavior of the main Ethereum network.

Testnet

Short for "test network," a network used to simulate the behavior of the main Ethereum network.

Testnet

Short for "test network," a network used to simulate the behavior of the main Ethereum network.

Tokens

Units of ownership in blockchain networks. Often thought of as digital assets or currencies, but more accurately defined as data structures that can track quantities, permissions, and other metadata for users. Tokens can be fungible, like bitcoin, or non-fungible, like NFTs.

Tokens

Units of ownership in blockchain networks. Often thought of as digital assets or currencies, but more accurately defined as data structures that can track quantities, permissions, and other metadata for users. Tokens can be fungible, like bitcoin, or non-fungible, like NFTs.

Tokens

Units of ownership in blockchain networks. Often thought of as digital assets or currencies, but more accurately defined as data structures that can track quantities, permissions, and other metadata for users. Tokens can be fungible, like bitcoin, or non-fungible, like NFTs.

Tokenomics

Short for “token economics," a field concerning the design of incentive systems for virtual economies, as in blockchain networks. Healthy systems should balance sources of market supply and demand — such as faucets and sinks, to maintain equilibrium.

Tokenomics

Short for “token economics," a field concerning the design of incentive systems for virtual economies, as in blockchain networks. Healthy systems should balance sources of market supply and demand — such as faucets and sinks, to maintain equilibrium.

Tokenomics

Short for “token economics," a field concerning the design of incentive systems for virtual economies, as in blockchain networks. Healthy systems should balance sources of market supply and demand — such as faucets and sinks, to maintain equilibrium.

Transaction

A transaction is a digitally signed message authorizing some particular action associated with the blockchain. In a currency, the dominant transaction type is sending currency units or tokens to someone else.

Transaction

A transaction is a digitally signed message authorizing some particular action associated with the blockchain. In a currency, the dominant transaction type is sending currency units or tokens to someone else.

Transaction

A transaction is a digitally signed message authorizing some particular action associated with the blockchain. In a currency, the dominant transaction type is sending currency units or tokens to someone else.

Trustlessness

The state of a system in which there’s no need for a higher authority, such as an intermediary or central entity, to oversee transactions. Instead, trustless systems, like blockchain networks, can securely verify the validity of transactions all by themselves using cryptography and consensus mechanisms.

Trustlessness

The state of a system in which there’s no need for a higher authority, such as an intermediary or central entity, to oversee transactions. Instead, trustless systems, like blockchain networks, can securely verify the validity of transactions all by themselves using cryptography and consensus mechanisms.

Trustlessness

The state of a system in which there’s no need for a higher authority, such as an intermediary or central entity, to oversee transactions. Instead, trustless systems, like blockchain networks, can securely verify the validity of transactions all by themselves using cryptography and consensus mechanisms.

U

Unique Active Wallets

How many unique wallets are actively interacting with your site or dapp.

Unique Active Wallets

How many unique wallets are actively interacting with your site or dapp.

Unique Active Wallets

How many unique wallets are actively interacting with your site or dapp.

User Agent

User agents are the identifiers of the browser and device of the visitor. Browsers or devices identify themselves to websites.

User Agent

User agents are the identifiers of the browser and device of the visitor. Browsers or devices identify themselves to websites.

User Agent

User agents are the identifiers of the browser and device of the visitor. Browsers or devices identify themselves to websites.

User Behavior Analytics

Insights into how users interact with a product, helping optimize UX and retention.

User Behavior Analytics

Insights into how users interact with a product, helping optimize UX and retention.

User Behavior Analytics

Insights into how users interact with a product, helping optimize UX and retention.

User Engagement

The level of interaction users have with a product over time.

User Engagement

The level of interaction users have with a product over time.

User Engagement

The level of interaction users have with a product over time.

User ID

A unique identifier assigned to each user in a system.

User ID

A unique identifier assigned to each user in a system.

User ID

A unique identifier assigned to each user in a system.

User Persona

A representation of a target user based on research.

User Persona

A representation of a target user based on research.

User Persona

A representation of a target user based on research.

User Segmentation

Dividing users into groups based on characteristics or behavior.

User Segmentation

Dividing users into groups based on characteristics or behavior.

User Segmentation

Dividing users into groups based on characteristics or behavior.

User Stories

Short descriptions of features from a user’s perspective in product development.

User Stories

Short descriptions of features from a user’s perspective in product development.

User Stories

Short descriptions of features from a user’s perspective in product development.

Utility

The usefulness of something. Often used to describe the functionality of a token, app, or protocol.

Utility

The usefulness of something. Often used to describe the functionality of a token, app, or protocol.

Utility

The usefulness of something. Often used to describe the functionality of a token, app, or protocol.

UTM parameters

How many users come to your site or dapp from a particular source. We track these UTM codes:

  • utm_source (e.g.: google.com)

  • utm_medium (e.g.: search)

  • utm_campaign (e.g.: summer_sale)

  • utm_content

  • utm_term

UTM parameters

How many users come to your site or dapp from a particular source. We track these UTM codes:

  • utm_source (e.g.: google.com)

  • utm_medium (e.g.: search)

  • utm_campaign (e.g.: summer_sale)

  • utm_content

  • utm_term

UTM parameters

How many users come to your site or dapp from a particular source. We track these UTM codes:

  • utm_source (e.g.: google.com)

  • utm_medium (e.g.: search)

  • utm_campaign (e.g.: summer_sale)

  • utm_content

  • utm_term

V

Validator

Computers that maintain the security of a blockchain network by verifying the validity of proposed transactions. Validators reach an agreement on state transitions according to the rules prescribed by their consensus mechanisms.

Validator

Computers that maintain the security of a blockchain network by verifying the validity of proposed transactions. Validators reach an agreement on state transitions according to the rules prescribed by their consensus mechanisms.

Validator

Computers that maintain the security of a blockchain network by verifying the validity of proposed transactions. Validators reach an agreement on state transitions according to the rules prescribed by their consensus mechanisms.

Visitors

How many unique visitors are interacting with your site or dapp across multiple page views and events. A visitor is only counted once within a 24 hour window. The 24 hour limit is necessary to comply with GDPR.

Visitors

How many unique visitors are interacting with your site or dapp across multiple page views and events. A visitor is only counted once within a 24 hour window. The 24 hour limit is necessary to comply with GDPR.

Visitors

How many unique visitors are interacting with your site or dapp across multiple page views and events. A visitor is only counted once within a 24 hour window. The 24 hour limit is necessary to comply with GDPR.

W

Wallets

Software based on cryptographic key pairs that enable blockchain network interactions, such as holding and controlling tokens. In blockchain networks, wallets play a role akin to the role web browsers play for web users.

Wallets

Software based on cryptographic key pairs that enable blockchain network interactions, such as holding and controlling tokens. In blockchain networks, wallets play a role akin to the role web browsers play for web users.

Wallets

Software based on cryptographic key pairs that enable blockchain network interactions, such as holding and controlling tokens. In blockchain networks, wallets play a role akin to the role web browsers play for web users.

Wallet Address

Also known as a public key, this is an alphanumeric code that serves as the address for a blockchain wallet, similar to a bank account number. Other users can send digital assets to your wallet via your public key, but only you can access your wallet’s contents by using the corresponding private key.

Formo uses the wallet address as a persistent identifier for a visitor where available.

Wallet Address

Also known as a public key, this is an alphanumeric code that serves as the address for a blockchain wallet, similar to a bank account number. Other users can send digital assets to your wallet via your public key, but only you can access your wallet’s contents by using the corresponding private key.

Formo uses the wallet address as a persistent identifier for a visitor where available.

Wallet Address

Also known as a public key, this is an alphanumeric code that serves as the address for a blockchain wallet, similar to a bank account number. Other users can send digital assets to your wallet via your public key, but only you can access your wallet’s contents by using the corresponding private key.

Formo uses the wallet address as a persistent identifier for a visitor where available.

Wallet Connects

How many users have connected their crypto wallets to your dapp.

Wallet Connects

How many users have connected their crypto wallets to your dapp.

Wallet Connects

How many users have connected their crypto wallets to your dapp.

Wallet Labels

Labels are assigned to a wallet address based on its past onchain activity and public information offchain.

Wallet Labels

Labels are assigned to a wallet address based on its past onchain activity and public information offchain.

Wallet Labels

Labels are assigned to a wallet address based on its past onchain activity and public information offchain.

Wallet Profiles

Wallet profiles are a collection of onchain and offchain data about a wallet.

Wallet Profiles

Wallet profiles are a collection of onchain and offchain data about a wallet.

Wallet Profiles

Wallet profiles are a collection of onchain and offchain data about a wallet.

Wallet Type

How many users are using a particular wallet type such as MetaMask, Rainbow Wallet, etc.

Wallet Type

How many users are using a particular wallet type such as MetaMask, Rainbow Wallet, etc.

Wallet Type

How many users are using a particular wallet type such as MetaMask, Rainbow Wallet, etc.

Wallet Reputation Score

A score that indicates the quality and intent of a wallet address.

Wallet Reputation Score

A score that indicates the quality and intent of a wallet address.

Wallet Reputation Score

A score that indicates the quality and intent of a wallet address.

Website Analytics

The collection and analysis of website traffic and user behavior data.

Website Analytics

The collection and analysis of website traffic and user behavior data.

Website Analytics

The collection and analysis of website traffic and user behavior data.

Web2

Another name for the second phase of the commercial internet, circa 2006–2020. Also known as the read-write era.

Web2

Another name for the second phase of the commercial internet, circa 2006–2020. Also known as the read-write era.

Web2

Another name for the second phase of the commercial internet, circa 2006–2020. Also known as the read-write era.

Web3

Another name for the third phase of the commercial internet, circa the present day. Powered by blockchain networks, it is also known as the read-write own era.

Web3

Another name for the third phase of the commercial internet, circa the present day. Powered by blockchain networks, it is also known as the read-write own era.

Web3

Another name for the third phase of the commercial internet, circa the present day. Powered by blockchain networks, it is also known as the read-write own era.

Whale

An individual or organization that holds a large amount of cryptocurrency. Whales often significantly influence the market due to their ability to buy or sell large amounts of cryptocurrency at once, potentially causing large price movements.

Whale

An individual or organization that holds a large amount of cryptocurrency. Whales often significantly influence the market due to their ability to buy or sell large amounts of cryptocurrency at once, potentially causing large price movements.

Whale

An individual or organization that holds a large amount of cryptocurrency. Whales often significantly influence the market due to their ability to buy or sell large amounts of cryptocurrency at once, potentially causing large price movements.

Whitelist

A list of pre-approved individuals or entities allowed to participate in an exclusive early access activity, such as airdrop or token sale.

Whitelist

A list of pre-approved individuals or entities allowed to participate in an exclusive early access activity, such as airdrop or token sale.

Whitelist

A list of pre-approved individuals or entities allowed to participate in an exclusive early access activity, such as airdrop or token sale.

Z

Zero Address

A special Ethereum address, composed entirely of zeros, is specified as the destination address of a contract creation transaction.

Zero Address

A special Ethereum address, composed entirely of zeros, is specified as the destination address of a contract creation transaction.

Zero Address

A special Ethereum address, composed entirely of zeros, is specified as the destination address of a contract creation transaction.

Zero-knowledge Proofs

A method in cryptography where one party can prove a statement's truth without revealing any additional information.

Zero-knowledge Proofs

A method in cryptography where one party can prove a statement's truth without revealing any additional information.

Zero-knowledge Proofs

A method in cryptography where one party can prove a statement's truth without revealing any additional information.

zkSync Era

A specific network within the zkSync ecosystem that operates as a Layer-2 scaling solution for Ethereum.

zkSync Era

A specific network within the zkSync ecosystem that operates as a Layer-2 scaling solution for Ethereum.

zkSync Era

A specific network within the zkSync ecosystem that operates as a Layer-2 scaling solution for Ethereum.