2-Factor Authentication
Two-factor authentication (2FA) is an access security measure that requires two different forms of authentication…
Practical knowledge, guides, and tips
Two-factor authentication (2FA) is an access security measure that requires two different forms of authentication…
When one person (or single group) controls over 50% of the total block creation and they disrupt the integrity of the blockchain….
A never-ending digital chain of data where records of transactions are stored…
Consensus is achieved when all participants of the network agree on the order and content of the blocks in the blockchain…
Wallets that are managed by a third party.
DApps (decentralized apps) are applications, just like those you download on your phone or PC, except that they run on a network of computers instead of relying on a single computer….
Identical copies of the Blockchain spread across a network of computers around the world…
Decenralized Finance
A Hedge Fund is a risky type of investment available to high-net-worth institutions and individuals..
A crypto wallet is said to be ‘Hot’ when it is connected to the internet…
Computer systems that are able to learn and adapt without following explicit instructions, by using algorithms and statistical models to analyze and draw inferences from patterns in data.
Our classification: Any interaction, beyond trading/staking, that involves an online presence as part of the method for earning an income in relation to the particular coin.
Tricking Internet users into revealing personal or confidential information which can then be used illicitly
Your Private Key is like a very long password for protecting access to a particular crypto account…
The public address is the location on a particular blockchain where details about your transactions (and therefore how much you own!) for that particular blockchain are stored and updated…
A seed phrase is a unique sequence of words ( usually 12 or more) that act as a type of password….
This is where an exchange offers account signup without KYC and subsequently requests it from users when they try to withdraw funds.
When you deposit your tokens/coins to a Staking Pool, used by a Validator, in order to gain a reward…
A validator determines whether or not a proposed block conforms to the rules that deem it as valid….
A wallet is a secure place where the codes for your crypto are stored. Check our post for a general overview of Crypto Wallets