P2P Bridge
A P2P bridge is a feature on decentralized exchanges (DEX) that enables two users to swap the same cryptocurrency across two blockchain protocols without involving a third party.
P2P DEX
P2P DEX, or peer-to-peer decentralized exchange, is a blockchain-based application that supports P2P trading.
P2P Trading
Peer-to-peer (P2P) trading involves decentralized transactions where two users swap cryptocurrencies directly with each other. Both buyers and sellers interact without the involvement of a third party.
Pair
Trade between one cryptocurrency and another, for example, the trading pair BTC/ETH.
Paper Trading
Paper trading or simulated trading is the practice of using a virtual transactional environment to simulate trading without the use of real capital.
Paper Wallet
A physical document containing your private key or seed phrase.
Parachain
Parachains are application-specific data structures that run in parallel to each other within Polkadot.
Participation Node
Participation nodes are present in the Algorand platform to help in conducting the Pure Proof of Stake (PPoS) consensus process.
Passive Income
Passive income is money produced from investments that do not require the earner to be actively involved.
Password Manager
A password manager is a tool or software that stores all sorts of passwords needed for online applications and services.
Paul Le Roux
Paul Le Roux is a criminal kingpin that many believe could be the founder of Bitcoin, Satoshi Nakamoto.
Payee
A payee is a party within an exchange of goods or even services that can receive payment.
Peer-to-Peer (P2P)
The decentralized interactions between parties in a distributed network, partitioning tasks or workloads between peers.
Peer-to-Peer (P2P) Lending
Crypto P2P lending refers to a practice of lending assets without the involvement of a middleman. Such loans rely on collateral material originally owned by borrowers.
Peg
A “peg” is a specified price for the rate of exchange between two assets.
Pegged Currency
A stablecoin is a currency whose value is pegged to a real-world asset, such as a fiat currency.
Permissioned Ledger
A ledger designed with restrictions, such that only people or organizations requiring access have permission to access it.
Permissionless
Often used to describe blockchains, a system is said to be permissionless when there is no entity that can regulate who can use it and how it can be used.
Permissionless Market Creation
Permissionless market creation refers to a system in which anyone can set up a financial market that facilitates the exchange of funds or assets between two or more parties without needing approval.
Perpetual Contracts
A perpetual contract is a derivative similar to a futures contract but without an expiry date.
Perpetual Futures
Perpetual futures are like futures (derivative contracts or agreements to buy or sell a commodity at a specified price) but without an expiration date. They allow traders to leverage or hedge indefinitely, popular applications of this include Ethereum or Bitcoin.
Phishing
When a scammer pretends to be a trusted institution or person to trick people into revealing sensitive information such as Social Security numbers, passwords, banking details, etc., often through a malware link disguised as legitimate.
Phone Phishing
Phone phishing, also known as a telephone scam or vishing (voice phishing), refers to the practice of using fraudulent and malicious phone calls to extort money or sensitive information from victims.
Physical Bitcoins
A physical Bitcoin is a physical token that usually has an intricate design, as well as a public key and private key.
Platform
On CoinMarketCap, platform refers to the parent blockchain of tokens. It may also refer to a cryptocurrency exchange on which you may trade cryptocurrencies.
Play-to-Earn (Play2Earn)
The play-to-earn business model supports the notion of an open economy and gives financial rewards to players who bring value to its metaverse.
Play2Earn (Play-to-Earn)
The play-to-earn business model supports the notion of an open economy and gives financial rewards to players who bring value to its metaverse.
Player Payout
Player payouts is a new way of automatically paying online gaming participants immediately after the tournament ends.
Plutus (Cardano)
The scripting language used on Cardano blockchain for smart contract development.
Politeia (Decred)
A decentralized governance platform that allows Decred stakeholders to submit, track and discuss proposals for suggestion and implementation of new ideas.
Ponzi Scheme
A fraudulent investment involving the payment of purported returns to existing investors from funds contributed by new investors.
Portfolio
A collection of cryptocurrencies or crypto assets held by an investment company, hedge fund, financial institution or individual.
Portfolio Tracking
The act of tracking the movement and performance of assets of your financial holdings is termed portfolio tracking. This monitoring activity can cover stocks, commodities, mutual funds, ETFs, cryptocurrencies and NFTs
Position Size
Position size is a vital part of a trading strategy, since it is directly related to one’s potential profit or loss. Sizing a position also plays an important role in risk management as knowing when to execute larger or smaller trades, and when to increase or reduce the size of a position impacts profitability.
Post-Mine
The retroactive creation of new coins following a cryptocurrency’s launch, before public mining is possible.
Pre-IDO
Pre-IDO refers to token offerings before the actual initial DEX offering (IDO) takes place.
Pre-Mine
When some or all of a coin’s initial supply is generated during or before the public launch.
Pre-Sale
The sale of a cryptocurrency, ahead of it going public, to specific investors.
Prediction Market
Prediction Markets are exchange-traded markets where the future outcomes of events are traded. It indicates the confidence of the crowd in a specific future event.
Price Impact
The difference between market price and estimated price due to trade size.
Private Blockchain
A private blockchain is a type of blockchain in which only a single organization has authority over the network.
Private Key/Secret Key
A piece of code generated in asymmetric-key encryption process, paired with a public key, to be used in decrypting information hashed with the public key.
Procedural Programming
Procedural programming refers to a series of instructions that inform a computer what it should do step-by-step to achieve the task.
Profit and Loss (P&L) Statement
A profit and loss (P&L) statement is a financial document that gives that sum up the earnings, costs, and expenditures incurred during a specified period.
Programmability
Programmability implies that something is capable of following instructions.
Programmable Privacy
Programmable privacy redefines data protection in decentralized applications (dApps), offering a flexible concept that empowers users and developers to personalize privacy settings.
Proof Market
A proof market is a decentralized marketplace where users can buy and sell cryptographic proofs to verify ownership, the validity of a particular transaction and the authenticity of a piece of information or computation results.
Proof of Attendance Protocol
Proof of Attendance Protocol (POAP) refers to a business offering to use the ERC-721 NFT protocol on Ethereum to ascribe individuals a unique, non-fungible blockchain-based identifier that only the person can access
Proof of Reserves (PoR)
Proof of Reserves (PoR) is a method of using cryptographic verification to demonstrate possession of digital assets.
Proof of Stake Authority (PoSA)
Proof of Stake Authority is an innovative consensus algorithm that represents a hybrid of Proof-of-Stake and Proof-of-Authority.
Proof-of-Authority (PoA)
A blockchain consensus mechanism that delivers comparatively fast transactions using identity as a stake.
Proof-of-Burn
Proof-of-burn is an attempt at creating a system that can prevent fraudulent transactions on a blockchain and can also improve the overall efficiency and functioning of the blockchain.
Proof-of-Burn (PoB)
A blockchain consensus mechanism aiming to bootstrap one blockchain to another with increased energy efficiency, by verifying that a cost was incurred in “burning” a coin by sending it to an unspendable address.
Proof-of-Developer (PoD)
Any verification that provides evidence of a real, living software developer who created a cryptocurrency, in order to prevent an anonymous developer from making away with any raised funds without delivering a working model.
Proof-of-Donation
Proof-of-donation refers to the integration of charitable donations into the functionality of a blockchain.
Proof-of-History (PoH)
Proof of History (PoH) nodes have internal clocks that validate events and time. The incoming events are hashed using a verifiable delay function, also known as VDF, that increases the speed and scalability of a blockchain.
Proof-of-Immutability (PoIM)
Proof-of-Immutability (PoIM) is a novel blockchain architecture designed to protect data privacy in a distributed network. PoIM enables the blockchain to persist data in a decentralized and provably immutable manner, without having to distribute the data among nodes.
Proof-of-Replication
Proof-of-replication (PoRep) is the way that a storage miner proves to the network that they are storing an entirely unique copy of a piece of data.
Proof-of-Spacetime
In simplest terms, PoSt means that someone can now guarantee that they are spending a certain amount of space for storage.
Proof-of-Stake (PoS)
A blockchain consensus mechanism in addition to Proof-of-Work that maintains the integrity of blockchain.
Proof-of-Time (PoT)
Proof-of-Time (PoT) is a decentralized, scalable, verifiably secure, and environmentally-friendly consensus algorithm that checks event data by choosing validators based on their ranking scores and a fixed stake.
Proof-of-Validation
Proof-of-validation (PoV) is a unique proof-of-stake (PoS) consensus mechanism that works to achieve consensus through staked validator nodes.
Proof-of-Work (PoW)
A blockchain consensus mechanism involving solving of computationally intensive puzzles to validate transactions and create new blocks. *see Proof-of-Stake (PoS).
Protocol
The set of rules that define interactions on a network, usually involving consensus, transaction validation, and network participation on a blockchain.
Protocol Layer
A protocol layer of the blockchain is defined as the rules and processes that govern how the network will operate. This is where we can find the different algorithms that determine how consensus is achieved and who gets to create new blocks.
Pseudonymous
Writing under a false name, such as “Satoshi Nakamoto.”
Public Address
A public address is the cryptographic hash of a public key, allowing the user to use it as an address to request for payment.
Public Blockchain
A blockchain that can be accessed by anyone.
Public Key
A public key refers to a series of alphanumeric characters used to encrypt plain text messages into ciphertext.
Public Sale
A public sale is the final stage of an ICO in which a company offers its token to the public at a significant discount before the token is listed on cryptocurrency exchanges.
Public-Key Cryptography
Public-key cryptography is a collection of algorithms-based cryptographic procedures that are used to jumble secret data and make it look randomized.
Public-Key Infrastructure
A public key infrastructure (PKI) is a collection of roles, rules, hardware, software, and processes for creating, managing, distributing, using, storing, and revoking digital certificates, as well as managing public-key encryption.
Pump and Dump (P&D) Scheme
A form of fraud involving the artificial inflation of the price of a cryptocurrency with false and misleading positive statements.
Pure Proof of Stake (PPoS)
Pure Proof of Stake (PPoS) is Algorand’s consensus mechanism that allows random selection of validators based on the consistency of their stakes.
Put Option
A put option contract offers an owner the opportunity, but not the compulsion, to buy an underlying security at a certain price within a given time frame.
Pyramid Scheme
A pyramid scheme is a scam with a hierarchical top-down structure.