The smallest unit of bitcoin with a value of 0.00000001 BTC.
The individual or group of individuals that created Bitcoin.
The scaling problem is the limitations of a blockchain's transaction throughout and ability to have fast and low cast transactions.
A scaling solution is a method of enable a system to expand.
A scheme that is designed to dupe people out of cash or crypto.
Coins that are created as "get rich quick schemes" by their developers are referred to as a scamcoin.
A scammer is someone that participates in a fraudulent scheme.
A scholarship is a popular practice in the Axie Infinity universe where managers lend their free Axies to new players (scholars) and earn passively from the battle rewards.
A computer script is a list of commands that are executed by a certain program or scripting language.
An alternative proof-of-work (PoW) algorithm to SHA-256, used in Bitcoin mining. Scrypt mining relies more heavily on memory than on pure CPU power, aiming to reduce the advantage that ASICs have and hence increasing network participation and energy efficiency.
A set of solutions built on top of a public blockchain to extend its scalability and efficiency, especially for micro-transactions or actions. Examples include Plasma, TrueBit, Lightning Network and more.
A secondary market is a place where investors or traders can buy and sell different kinds of assets or securities that they own, with others.
A secure element is a type of hardware chip that runs a specified number of applications.
Secure Multi-Party Computation (sMPC)
SMPC is a subfield of cryptography that allows parties to compute a function while keeping the inputs private.
Securities and Exchange Commission (SEC)
An independent agency of the United States federal government, responsible for enforcing federal securities laws, proposing securities rules, and regulating the securities industry, the nation's stock and options exchanges, and other related activities and organizations.
The term securities refers to a fungible and tradable financial instrument that carries a type of monetary value.
A security token is essentially a digital form of traditional securities.
Security Token Offering
A security token offering (STO) is a public offering where tokenized digital securities are sold.
A single starting point when deriving keys for a deterministic wallet.
Segregated Witness (SegWit)
A Bitcoin Improvement Proposal (BIP) that aimed to fix transaction malleability on Bitcoin.
A situation in which a miner mines a new block but does not broadcast this new block to the other miners.
A situation where a large limit order has been placed to sell when a cryptocurrency reaches a certain value.
The ambition of the Semantic Web is to enable computers to manipulate information on our behalf.
A settlement layer is a layer that essentially provides an anchor for an entire ecosystem.
A cryptographic hash function that generates a 256-bit signature for a text, used in Bitcoin proof-of-work (PoW).
Essentially, a shard is a portion of a blockchain network that has been split into multiple shards, which has its own data.
In the world of cryptocurrencies, sharding can reduce the network congestion as well as increase transactions per second through the creation of new chains
Sharding is a scaling approach that enables splitting of blockchain states into partitions containing states and transaction history, so that each shard can be processed in parallel.
The act of enthusiastically promoting a cryptocurrency or ICO project.
A coin with no obvious potential value or usage.
SHO (Strong Holder Offering)
A strong holder offering (SHO) is a fundraising mechanism where eligible investors are chosen based on their on-chain activities and other proprietary data sets.
A trading technique in which a trader borrows an asset in order to sell it, with the expectation that the price will continue to decline. In the event that the price does decline, the short seller will then buy the asset at this lower price in order to return it to the lender of the asset, making the difference in profit.
A blockchain ledger that runs in parallel to a primary blockchain, where there is a two-way link between the primary chain and sidechain.
Side Channel Attack
A side channel attack is a hacking method that exploits a computer’s inherent “tells" that unintentionally convey information.
Signals are a call to action to either buy or sell an asset.
An online black market that existed on the dark web, now shut down by the FBI.
A type of scam that exploits two-factor authentication measures.
Simplified Payment Verification (SPV)
A lightweight client to verify blockchain transactions.
Slippage happens when traders have to settle for a different price than what they initially requested due to a price movement.
A smart contract is a computer protocol intended to facilitate, verify or enforce a contract on the blockchain without third parties.
Smart Contract Audit
A smart contract audit is a security check done by cybersecurity professionals meant to ensure that the on-chain code behind a smart contract is devoid of bugs or security vulnerabilities.
Smart tokens are simply regular tokens that not only transmit value they contain but also all the information needed to execute a transaction simultaneously.
The minimum amount that an initial coin offering (ICO) wants to raise.
Soft Fork (Blockchain)
A protocol upgrade where only previously valid transactions are made invalid, with most soft forks requiring miners to upgrade their mining software.
The programming language used by Ethereum for developing smart contracts.
A special purpose acquisition company (SPAC) is formed by investors in order to publicly list an organization without going through the troubles that come with the traditional IPO process.
A hard spoon is a meta-protocol that exists on top of a blockchain.
A contract or transaction buying or selling a cryptocurrency for immediate settlement, or payment and delivery, of the cryptocurrency on the market.
A public market in which cryptocurrencies are traded for immediate settlement. It contrasts with a futures market, in which settlement is due at a later date.
Spyware is a malware that records all of the activities on an electronic device.
A cryptocurrency with extremely low volatility, sometimes used as a means of portfolio diversification. Examples include gold-backed cryptocurrency or fiat-pegged cryptocurrency.
Participation in a proof-of-stake (PoS) system to put your tokens in to serve as a validator to the blockchain and receive rewards.
Staking Pools allows users to combine their resources in order to increase their chances of earning rewards. This mechanism offers more staking power to the network to verify and validate new blocks.
A block which was successfully mined but not included on the current longest blockchain, usually because another block at the same height was added to the chain first.
A second-layer scaling solution that reduces the total on-chain transactions necessary, moving the transactions off-chain and letting participants sign to the main chain after multiple off-chain transactions.
A stochastic oscillator is a popular technical indicator used for identifying overbought and oversold stock/asset/cryptocurrency levels that rely on an asset's price history, as it tend to fluctuate within a specific price range..
A stop-loss order in trading allows investors to determine the lowest price at which they are willing to sell an asset and trigger an automatic sell order when and if this price is reached.
Decentralized storage refers to the concept of storing files online by splitting them into encrypted fragments and delegating these fragments to multiple nodes on a distributed network, e.g. a blockchain.
Storage miners are cryptocurrency miners who rely on offering sufficient storage space for nodes to reach consensus and validate transactions.
Store of Value
A store of value is an asset, commodity or currency that can be saved, retrieved as well as exchanged in the future without it losing any value.
Substrate is a web app development framework developed by Parity Technologies.
A supercomputer is a superior version of a general-purpose computer, which has a significantly increased capacity and processing power.
Supply and Demand
Supply and demand are the levels in an economy that determine the market's willingness to buy or sell assets or services, respectively.
A supply chain is the collection of steps that a product or service needs to go through before reaching the final customer.
Supply Chain Attack
A supply chain attack is a tactic used by hackers to compromise third-party suppliers to major corporations, governments and organizations to gain valuable information.
Swing trading is a market trading technique that aims to profit from short to medium-term price changes in stocks, commodities, and/or currencies over a period of days or weeks.
Sybil attacks undermine an online network by creating many IDs, accounts or nodes to upset the balance of power.
The ticker of a cryptocurrency; for example, Bitcoin's symbol is BTC.
Synthetic assets, sometimes referred to as synths, are a combination of cryptocurrencies and traditional derivative assets. In other words, synths are tokenized derivatives.