Web3pedia: Empowering Your Decentralized Journey
Unlock the Power of Web3: Your Gateway to the Decentralized Revolution.
Discover, Learn, and Empower: Unleash the Potential of Web3
- 51% Attack:
- Absolute Advantage:
- Active Management:
- Address
- Ad Hoc
- Airdrop
- Algorithm
- Allocation
- All or None Order (AON):
- All-Time High (ATH):
- Alpha
- Altcoin
- Angel Investor:
- Anti Money Laundering (AML):
- Application Programming Interface (API):
- Application-Specific Integrated Circuit (ASIC):
- Arbitrage:
- ASIC-resistant:
- Ask Price:
- Asset Management:
- Asynchronous
- Atomic Swap:
- Attack surface:
- Auction
- Bags
- Beacon Chain
- Bear Market
- Benchmark
- BEP-2
- BEP-20
- BEP-721
- Beta (Coefficient)
- Beta (Release)
- Bid-Ask
- Bid Price
- Bitcoin
- Bitcoin Core
- Bitcoin Dominance
- Bitcoin Pizza
- Black Swan Event
- Block
- Blockchain
- Blockchain Charity Foundation
- Block Explorer
- Block Header
- Block Height
- Block Reward
- Bloom Filter
- Blue-Chip Token
- Bollinger Bands
- Bounty
- BRC-20 Tokens
- Breakeven Multiple
- Break-Even Point (BEP)
- Breakout
- BUIDL
- Bull Market
- Buy Wall
- Candidate Block:
- Candlestick
- Capitulation:
- Censorship-resistance:
- Central Bank:
- Centralized
- Central Processing Unit (CPU):
- Cipher
- Circulating Supply:
- Cloud
- Coin
- Collateral
- Colocation
- Commodity Futures Trading Commission (CFTC):
- Compound Interest:
- Confirmation Time:
- Confluence
- Consumer Price Index (CPI):
- Counterparty Risk:
- Credentials
- Cross-Chain Bridges:
- Cryptocurrency
- Cryptography:
- Crypto Protocol:
- Crypto Winter:
- Custody
- Daemon
- Dead Cat Bounce:
- Decentralized Application (DApp):
- Decentralized Autonomous Cooperative (DAC):
- Decentralized Autonomous Organization (DAO)
- Decentralized Exchange (DEX):
- Decentralized Finance (DeFi):
- Decentralized Indexes:
- Decryption
- Deep Web:
- Delisting
- Design Flaw Attack:
- Diamond Hands:
- Difficulty
- Difficulty Bomb:
- Divergence
- Diversification
- Dollar Cost Averaging (DCA):
- Double Spending:
- Do Your Own Research (DYOR):
- Eclipse Attack:
- Efficient Market Hypothesis (EMH)
- Encryption
- Enterprise Ethereum Alliance (EEA):
- ERC-20:
- ERC-721:
- Exchange
- Fake Out:
- Falling Knife:
- Fan Tokens:
- Fear Of Missing Out (FOMO):
- Fear, Uncertainty, and Doubt (FUD):
- Fiat
- Fill Or Kill Order (FOK):
- Finality
- First-Mover Advantage (FMA):
- Fiscal Policy:
- Flappening
- Flippening
- Forced Liquidation:
- Forex (FX):
- Formal Verification:
- Full Node:
- Fundamental Analysis (FA):
- Fungibility
- Futures Contract:
- Gas
- Gas Limit:
- General Public License:
- Genesis Block:
- GitHub
- Golden Cross:
- Gossip Protocol:
- Gwei
- Hackathon
- Hacker:
- Haha Money Printer Go Brrrrr:
- Halving
- Hard Cap:
- Hash
- Hashed TimeLock Contract (HTLC):
- Hash Rate:
- High-Frequency Trading (HFT):
- HODL
- Honeypot
- Iceberg Order:
- Immutability
- Index
- Initial Coin Offering (ICO):
- Initial Exchange Offering (IEO):
- Initial Public Offering (IPO):
- Integrated Circuit (IC):
- Interoperability
- InterPlanetary File System (IPFS):
- IOU
- Isolated Margin:
- Issuance
- Just-in-Time Compilation:
- JWT (JSON Web Token):
- Keccak
- Know Your Customer (KYC):
- Latency
- Law of Demand:
- Layer 2:
- Ledger
- Leveraged Tokens:
- Library
- Lightning Network:
- Linux
- Liquidity:
- Liquidity Provider:
- Listing
- Mainnet
- Mainnet Swap:
- Maker
- Malware
- Margin Trading:
- Market Capitalization:
- Market Momentum:
- Market Order:
- Masternode:
- Maximum Supply:
- Mempool
- Merged Mining:
- Merkle Tree:
- Metadata
- Metaverse
- Mining
- Mining Farm:
- Monetary Policy:
- Moon
- Multisignature
- NFT Mystery Boxes:
- Node
- Nonce
- Non-fungible Token (NFT):
- OCO Order:
- Off-chain:
- Offshore account:
- Open-Source Software (OSS):
- Oracle
- ORC-20 Tokens:
- Order Book:
- Ordinals
- Orphan Block:
- Paper Wallet:
- Passive Management:
- Peer-to-Peer (P2P)
- Pegged Currency
- Permissionless Blockchain
- Phishing
- Plasma
- Polkadot Crowd Loan
- Ponzi Scheme
- Price Action
- Prisoner's Dilemma
- Private Key
- Private Sale
- Progressive Web Application (PWA)
- Proof of Attendance Protocol (POAP)
- Proof of Reserves (PoR)
- Proof of Stake (PoS)
- Proposer-Builder Separation (PBS)
- Pseudorandom
- Quantum Computing
- Race Attack
- Ransomware
- Rekt
- Relative Strength Index (RSI)
- Resistance
- Return on Investment (ROI)
- Roadmap
- Routing Attack
- Satoshi
- Satoshi Nakamoto
- Securities and Exchange Commission (SEC)
- Security Audit
- Seed Phrase
- Segregated Witness (SegWit)
- Selfish Mining
- Sell Wall
- Sentiment
- Sharding
- Sharpe Ratio
- Smart Contract
- Snapshot
- Source Code
- Stablecoin
- Staking Pool
- State Channel
- Store of Value
- Supercomputer
- Supply Chain
- Support
- Taker
- Tank
- Ticker
- Token
- Token Lockup
- Token Sale
- Total Supply
- Total Value Locked (TVL)
- TradFi
- Transaction ID (TXID)
- Transactions Per Second (TPS)
- TrueUSD (TUSD)
- Trustless
- Turing Complete
- Unit of Account
- Unspent Transaction Output (UTXO)
- User Interface (UI)
- Verification Code
- Virtual Machine
- Vladimir Club
- Volatility
- Volume
- Wallet
- Weak Hands
- Weak Subjectivity
- Web 1.0
- Web 2.0
- Web 3.0
- Web 5.0
- Wei
- Whale
- Whiskers
- Whitelist
- Wick
- Win Rate
- Wrapped Ether (WETH)
- XEM (NEM Blockchain)
- XLM (Stellar Lumens)
- XRP (Ripple)
- XTZ (Tezos)
- Yearn.Finance
- Yellow paper
- YFI Token
- Yield Curve
- Yield Farming
- Yield Guild Game
- Zero-Knowledge Proofs
- zk-SNARKs
- zk-STARKs