Key Terminology

The Goal:

  1. DESIGN THE TEMPLATE:   The Main Key Term Page Should be a framework (template) for the rest of the definitions so that when you choose a word from the list it propagates seamlessly into the wiki page template. All definitions should follow this template. The template should have a section for general definitions and a section for  a deeper dive.  A footer section can house reference information. 
  2.  DEFINE TERMS -Search and combine definitions.  All the terms in the outline need to be examined and completed. 
Contributors
NameEmailDefinitions



New York Times, New York Magazine 

Bitcoin

Created in 2009 by the pseudonymous Satoshi Nakamoto, Bitcoin is the world’s largest cryptocurrency by market capitalization, though it’s gone through several cycles of booms and busts since its inception.

Blockchain

A blockchain is a distributed database shared across a large number of computers comprising a computer network. Information is stored and verified on these shared databases in a cryptographically secure way, by keeping data in groups known as blocks that are connected by chains of data. This structure chains data together irreversibly in chronological order and in a decentralized manner, leading some to see it as a more secure and open option for information storage and exchange.

Blockchain ETF

Exchange-traded funds invest in a specific bundle of specific stocks. Therefore, a blockchain ETF invests in a specific bundle of exclusively blockchain-based companies.

Block header

A block header is used to identify individual blocks in a blockchain. Each contains three sets of block metadata along with other individual components.

Block height

Block height is the number of confirmed blocks preceding a particular block in the blockchain. It’s representative of the blockchain’s current size or time in existence.

Consensus mechanism

A consensus mechanism is used in computer and blockchain systems to validate single data or single states of a distributed computer network. It encompasses any methodology that is used to achieve agreement, trust and security across a decentralized computer network. The two most common in the crypto world right now are proof of work and proof of stake.

Cryptocurrency

Cryptocurrencies are a form of digital currency that is secured via cryptography, most typically through decentralized networks on blockchain technology. That means that it’s distributed across a large number of computers outside of any central authority control. Cryptocurrency is often lauded for its decentralization, as it makes it impossible to counterfeit or double-spend transactions and has faster and cheaper money transfers. However, it has so far come with extreme price volatility, high energy consumption and use for criminal activities.

Decentralized applications (dApps)

dApps are digital applications that operate on a blockchain network of computers rather than on one computer alone. Examples of dApps are BitTorrent, Tor and more that allow for participants to consume, feed and seed content, or do all at the same time. Their decentralized nature makes them free from the control of a single authority, thereby increasing user privacy and offering flexible development.

Decentralized autonomous organizations (DAOs)

Simply put, a DAO is an organization built with blockchain technology, though they’ve been described as “crypto co-ops,” “financial flash mobs” and “group chats with a bank account.” Essentially, it’s an organization that forms with a specific end goal, most commonly to make big investments or purchases. Because of the involvement of blockchain technology, members of a DAO use crypto tokens to manage member rights, a common treasury and voting on certain decisions within the group. All of the important decisions from the group will appear on a permanent blockchain ledger shared by all members, making DAOs more democratic than traditional non-crypto organizations.

Decentralized finance (DeFi)

Decentralized finance, or DeFi, is an evolving realm of the crypto world that aims to use blockchain technology to replace traditional intermediaries and trust or permission mechanisms with an internet-native financial system — essentially a crypto Wild West version of Wall Street. It’s been valued at around $77 billion, with trading activity that’s grown by over 550% in the last year. Overall, DeFi is still a very much emerging part of the crypto world, and it remains largely unregulated at this point.

Distributed ledger technology

Another term for blockchain technology, distributed ledger technology describes a method for securely and accurately storing information using cryptography.

EOS

EOS is a blockchain-based platform launched in 2018 that allows for the development of dApps. Specifically, it has capabilities to support authentication, permissioning, data hosting, usage management and communication between dApps built on its platform and the internet. EOS also has its own cryptocurrency, the EOS token. Ethereum is its main competitor.

Ethereum

Known best for its cryptocurrency ETH, Ethereum is a blockchain-based platform that allows for public creation and maintenance of secure digital ledgers. Its cryptocurrency is the second largest in the world by market capitalization, only behind that of Bitcoin. While known for its cryptocurrency, Ethereum is notably different from Bitcoin in its long-term goals of using blockchain technology for a diverse range of applications. Notably, both Bitcoin and Ethereum operate on proof of work protocols, but Ethereum is working to transition to a proof of stake protocol.

Hard fork

A hard fork is an overhaul of a network’s protocol that can validate previously invalid blocks and transactions in a blockchain, or vice versa. Notable examples have occurred with Bitcoin to create Bitcoin Cash and Bitcoin SV, for instance. For a hard fork to succeed, all nodes must upgrade and agree on the new version.

Hash

A hash is a function that solves for a blockchain computation by converting an input of arbitrary length into an encrypted output of a fixed length. Hash functions are one-way, making it impossible to reverse-engineer the input from the output. They are considered a backbone of the blockchain network as their fixed length makes it impossible to guess and crack the blockchain.

Hashgraph consensus mechanism

The hashgraph consensus mechanism is based on the use of information about information, called “gossip,” and virtual voting to create consensus in verifying new blocks. The crypto community has yet to widely adopt it.

Hyperledger fabric

Launched by Linux in 2015, Hyperledger Fabric is an open-source enterprise-grade private permissioned blockchain. It was designed by IBM for industrial enterprise use and has features for faster transactions, smart contract technology and streamlined data sharing, in particular.

Hyperledger Iroha

Hyperledger Iroha is a platform of business blockchain frameworks intended to support infrastructure projects that require blockchain technology. Notably, its capabilities include the potential to build an identity management system, as well as software apps that can help unbanked people have access to financial services.

Nonce

An abbreviation for “number used only once,” a nonce is the first number a blockchain miner needs to find before it can solve for a block in the blockchain. They are notoriously difficult to find and miners are rewarded with cryptocurrency after identifying them. Examples of nonces outside of crypto include two-factor authentication, purchase authentication and other form of account recovery and identification.

Nonfungible tokens (NFTs)

It’s easiest to understand this concept by breaking it down in two parts. “Nonfungible” describes something that is not easy to exchange or mix with other similar goods or assets, per the Cambridge Dictionary. Meanwhile, a “token” is a thing serving as a visible or tangible representation of a fact, quality or feeling, according to Oxford Languages. By those definitions, a nonfungible token is a visible or tangible representation of something that cannot be easily exchanged for something similar. And that’s actually kind of how NFTs really work.

The key here is: These tokens can’t be easily exchanged because they are unique cryptographic assets, on a blockchain with unique identification codes and metadata that can’t be replicated. Unlike cryptocurrencies, which are fungible tokens, NFTs can’t be traded or exchanged at equivalency. They’re most commonly represented by artwork or real estate at present, but they have the potential to represent any real-world asset that would benefit from a more efficient buying, selling and trading process (with a reduced probability of fraud for identities, property rights and more).

Permissioned blockchain

A permissioned blockchain is a blockchain that is not publicly accessible and can only be accessed by users that have permission to do so. This access control offers increased security of blockchain systems like Bitcoin, as users are only able to take actions that blockchain administrators allow and must identify themselves digitally.

Proof of stake

Proof of stake is a decentralized consensus mechanism that requires coin owners to offer their own coins up as collateral (in other words, staking their coins) for a chance to validate blocks in a blockchain. Validators are selected randomly, instead of via the competition mechanism used in proof of work. To have the chance to be a validator, coin owners must stake a certain amount of their coins (i.e. Ethereum’s requirement of 32 ETH). Multiple validators must verify the new block before it can be finalized and closed. Proof of stake is known for being far less energy-consuming than proof of work.

Proof of work

Proof of work is a decentralized consensus mechanism that requires all members of a network (i.e. computer nodes in a blockchain) to complete a significant but feasible amount of work to solve an arbitrary mathematical puzzle. It’s widely used to validate transactions and mine new tokens in cryptocurrency mining, as it doesn’t require the need for a trusted third party. However, despite its benefits, proof of work is notorious for requiring huge amounts of energy.

Rug pull

A rug pull is a scam where software developers raise a huge sum of money in order to fund a crypto project, then take advantage of the nature of DeFi by using the lack of financial gatekeepers or verified third parties to disappear with that money.

Smart contracts

A smart contract involves the use of self-executing lines of code to outline the terms of agreement in the contract, which exists on a decentralized and distributed blockchain network. Smart contracts allow for agreements between two separate and even anonymous parties, without the need for any third party authority or system. Smart contracts are trackable and irreversible.

Soft fork

A soft fork is a change in software protocol for blockchain technology that only makes previously valid transactions invalid. For a soft fork to succeed, only a majority of nodes need to upgrade and agree on the new version.

Stablecoins

Stablecoins are a type of cryptocurrency that is tied to a reserve asset, like the dollar. They’re an attempt to create a more stable option, akin to fiat currencies, while also taking advantages of instant processing and privacy offered by cryptocurrency.

Tron

Tron is a blockchain-based digital platform founded in 2017 with the goal of hosting a global entertainment system digital content sharing. As of August 2021, it had over 50 million accounts. Tron also has its own cryptocurrency, Tronix, and was founded by BitTorrent CEO Justin Sun.

Web1

This describes the earliest iteration of the internet. Most internet users were consumers, rather than content creators, and most available websites were static informational pages such as Britannica Online, mp3.com and personal websites.

Web2

This describes the current state of the internet. The shift from Web1, which first began at the turn of the 21st century, indicated an increase in users creating content and more actively engaging with the internet, as opposed to simply consuming information on it. The move from Web1 to Web2 was not signified by any specific technical advancement, but rather a change in internet usage that demonstrated an increase in user information-sharing and interconnectedness.

Web3

This describes an idea of a future state of the internet. A marked advancement in usage style from Web2, Web3 is “the internet owned by the builders and users, orchestrated with tokens,” according to investor Packy McCormick. At the core of Web3 predictions is the idea of a decentralized and open internet with greater user utility. Though the definition of what this will actually look like is still taking shape, experts agree that Web3 will be marked by decentralization, trustless and permissionless interactions, wider use of artificial intelligence and machine learning and, finally, increased connectivity and ubiquity across applications and devices.

0x Protocol

The 0x protocol allows for peer-to-peer exchanges of assets on Ethereum’s blockchain. It was launched in 2017 by 0x Labs and is intended to create the infrastructure for new financial applications using blockchain technology.


Sophie Burkholder is a 2021-2022 corps member for Report for America, an initiative of The Groundtruth Project that pairs young journalists with local newsrooms. This position is supported by the Heinz Endowments.
Series: Web3 Month 2022-30-SUBSCRIBE TO OUR NEWSLETTERS











  • Need Graphic to show level of difficulty

Definition

Key Concepts

Level

Reference

Sponsor

Anti Money Laundering (AML)

Anti-money laundering (AML) refers to the laws, regulations and procedures intended to prevent criminals from disguising illegally obtained funds as legitimate income. Though anti-money laundering laws cover a limited range of transactions and criminal behavior, their implications are far-reaching. For example, AML regulations require banks and other financial institutions that issue credit or accept customer deposits to follow rules that ensure they are not aiding money-laundering.


Anti -laundering (AML) refers to the activities intended to prevent individuals from transferring value obtained illegally into a legitimate sources of income.

  • AML regulations require financial institutions to monitor customers' transactions and report on suspicious financial activity.


  • Anti Money Laundering (AML) seeks to deter criminals by making it harder for them to hide ill-gotten money.

  • Criminals use money laundering to conceal their crimes and the money derived from them.

  • AML regulations require financial institutions to monitor customers' transactions and report on suspicious financial activity.




Application

An application is software that runs on your computer or cell phone that allows you to perform certain tasks.  Mention Dapps?






Blockchain

"A blockchain is a peer-to-peer distributed ledger forged by consensus, combined with a system for "smart contracts" and other assistive technologies". hyperledger.org

A blockchain is a chain of blocks each containing transaction (transition) data. Each block, except the first block, is linked with the previous block together forming a chain. Once a block has entered the blockchain, it can not be altered resulting in data immutability . 

A blockchain is a continuously growing list of records, which are ordered and combined/grouped into blocks. Such blocks are linked (or "chained") using cryptography. The first block in a blockchain is called the genesis block, and each following block is appended after the last block in the chain.

Each block typically contains a cryptographic hash of the previous block. Since each new block contains a hash of the previous block, a blockchain is inherently resistant to modification of historical data. In typical blockchain implementations, the records that are grouped into a block are referred to as transactions that take place between parties and are added to the about-to-be-written block after they have been verified.

For use as a distributed ledger, a blockchain is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks. Once recorded, the data in any given block cannot be altered retroactively without the alteration of all subsequent blocks, which requires collusion of the network majority.

  • Money laundering is the illegal process of making "dirty" money appear legitimate instead of ill-gotten.

  • Criminals use a wide variety of money laundering techniques to make illegally obtained funds appear clean.

  • Online banking and cryptocurrencies have made it easier for criminals to transfer and withdraw money without detection.

  • The prevention of money laundering has become an international effort and now includes terrorist funding among its targets.


https://www.investopedia.com/terms/m/moneylaundering.asp


LFS272


Byzantine Fault Tolerant

Byzantine Fault Tolerant Consensus

Byzantine Fault Tolerance (BFT) is defined as the feature of a distributed network to reach consensus (agreement on the same value) even when some of the nodes in the network fail to respond or respond with incorrect information.

An important consideration to be aware of while setting up a blockchain network is the requirements of Byzantine Fault Tolerant (BFT) consensus, compared with the Crash Fault Tolerant (CFT) one. Due to the underlying complexity of BFT consensus algorithms, a best practice is for the community to leverage the latest academically-proven consensus algorithms based on rigorous and peer-reviewed demonstrations of the safety and liveness properties. Such algorithms include the Tendermint, Algorand, Mir-BFT and HotStuff. There is also some on-going work on Golang-based implementation of the BFT-SMART algorithm for Hyperledger Fabric.  These are important reference points for blockchain architects and developers interested in adopting BFT consensus in the future.  At Oracle ,we are actively exploring the available options to ensure they meet the rigorous proof requirements as well as deliver operational characteristics, including performance and resilience required in enterprise applications.





Certificates of Authority

Certificate Authority

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party—trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. Wikipedia

The Certificate Authority (CA) provides a number of certificate services to users of a blockchain. More specifically, these services relate to user enrollment, transactions invoked on the blockchain, and TLS -secured connections between users or components of the blockchain. This guide builds on either the fabric developer’s setup or the prerequisites articulated in the fabric network setup guide.





ChainA block contains an ordered set of transactions. It is cryptographically linked to the preceding block, and in turn it is linked to be subsequent blocks. The first block in such a chain of blocks is called the genesis block. Blocks are created by the ordering service, and then validated and committed by peers.



Chaincode

Chaincode - Smart contracts in Hyperledger Fabric. A smart contract defines the executable logic that generates new facts that are added to the ledger. A chaincode is typically used by administrators to group related smart contracts for deployment, but can also be used for low level system programming of Fabric,. 

that manages access and modifications to a set of key-value pairs in the World State via Transaction. In Hyperledger Fabric, smart contracts are packaged as chaincode. Chaincode is installed on peers and then defined and used on one or more channels.

A chaincode definition is used by organizations to agree on the parameters of a chaincode before it can be used on a channel. Each channel member that wants to use the chaincode to endorse transactions or query the ledger needs to approve a chaincode definition for their organization. Once enough channel members have approved a chaincode definition to meet the Lifecycle Endorsement policy (which is set to a majority of organizations in the channel by default), the chaincode definition can be committed to the channel. After the definition is committed, the first invoke of the chaincode (or, if requested, the execution of the Init function) will start the chaincode on the channel.






Consensus

A broader term overarching the entire transactional flow, which serves to generate an agreement on the order and to confirm the correctness of the set of transactions constituting a block.

  • Coming to an agreement: The mechanism gathers all the agreements from the group as much as it can.
  • Collaboration: Every one of the group aims toward a better agreement that results in the groups’ interests as a whole.
  • Co-operation: Every individual will work as a team and put their own interests aside.










ERC20 Standards Token  is the Ethereum token system ,which is used for Ethereum smart contracts platform. Developed in 2015, ERC-20 defines a common list of rules to function within the Ethereum ecosystem. 

The Ethereum community created these standards with six mandatory and three optional rules.

Mandatory

  • totalSupply
  • balanceOf
  • transfer
  • transferFrom
  • approve
  • allowance

Optional

  • Token Name
  • Symbol
  • Decimal (up to 18)

Other ERC Token standards for Ref. 

  1. ERC-20 Token Standard. https://eips.ethereum.org/EIPS/eip-20
  2. ERC-165 Standard Interface Detection. https://eips.ethereum.org/EIPS/eip-165
  3. ERC-173 Owned Standard. https://eips.ethereum.org/EIPS/eip-173
  4. ERC-223 Token Standard. https://github.com/ethereum/EIPs/issues/223
  5. ERC-677 transferAndCall Token Standard. https://github.com/ethereum/EIPs/issues/677
  6. ERC-721 Non-Fungible Token Standard https://eips.ethereum.org/EIPS/eip-721

  7. ERC-827 Token Standard. https://eips.ethereum.org/EIPS/eip-827
  8. ERC-1155 Multi-Token Standard https://eips.ethereum.org/EIPS/eip-1155






Digital Government

Digital government is the state-of-art concept from public administration science, a successor of e-government paradigm. The former model simply indicated the digitalisation of the public administration.

Digital government refers to the creation of new public services and service delivery models that leverage digital technologies and governmental and citizen information assets. The new paradigm focuses on the provision of user-centric , agile and innovative public services. Blockchain absolutely is the one of the most innovative digital technologies that has to be considered under the new paradigm of governmental policy making and service delivery.




Ref: Blockchain for Digital Governments (europa.eu)


Digital Identity

A decentralized identifier (DID) is a pseudo-anonymous identifier for a person, company, object, etc. Each DID is secured by a private key. Only the private key owner can prove that they own or control their identity. One person can have many DIDs, which limits the extent to which they can be tracked across the multiple activities in their life. For example, a person could have one DID associated with a gaming platform, and another, entirely separate DID associated with their credit reporting platform. 

In one example, users sign up to a self-sovereign identity and data platform to create and register a DID. During this process, the user creates a pair of private and public keys. Public keys associated to a DID can be stored on-chain in case keys are compromised or are rotated for security reasons. Additional data associated with a DID such as attestations can be anchored on-chain, but the full data itself should not be stored on-chain to maintain scalability and compliance with privacy regulations.

A decentralized identifier (DID) is a pseudo-anonymous identifier for a person, company, object, etc. Each DID is secured by a private key. Only the private key owner can prove that they own or control their identity. One person can have many DIDs, which limits the extent to which they can be tracked across the multiple activities in their life. For example, a person could have one DID associated with a gaming platform, and another, entirely separate DID associated with their credit reporting platform. 




Blockchain for Digital Identity: Real World Use Cases | ConsenSys

Ethereum

Ethereum 2.0 (Eth2) is the next phase in the evolution and improvement of the public Ethereum network. With a shift from a Proof of Work to Proof of Stake consensus algorithm, Ethereum 2.0 will result in improved scalability, security, and usability for the network.



Genesis Block

The Genesis Block is the first block or block zero in any blockchain-based system, It is the prototype of all other blocks in the blockchain  network. Based on this which additional blocks are added to form a chain of blocks, hence we call them blockchain. In theory, there is no real need for a Genesis Block. However, it is necessary to have a starting point that everyone can trust.

The hash of genesis block is added to all new transactions in a new block. This combination is used to create its unique hash. This process is repeated until all the new blocks are added to a blockchain. Without Genesis Block, it would be really difficult for the participant to trust a blockchain and to know  how and when it started.

Note : Every block in a blockchain stores a reference to the previous block. In the case of Genesis Block, there is no previous block for reference.

Technically it means that the Genesis Block has it’s “previous hash” value set to 0. Which  means that no data was processed before the Genesis Block.All other blocks will have sequential numbers starting by 1, and will have a “previous hash” set to the hash of the previous block.











LedgerA ledger holds facts about the current and historical state of a set of business objects.



Proof of Stake

Proof of Stake (PoS) is a class of consensus algorithm that selects and rewards validators as a function of a validator’s economic stake in the network. Unlike PoW, the probability of creating a block in a PoS network is not a result of hash power from burning energy, but rather the result of economic value-at-loss. Proof of Stake will be the consensus mechanism that Ethereum 2.0 uses to maintain the network. Unlike Proof of Work networks, Proof of Stake networks can achieve finality. (consensys)





Proof of Work

Proof of Work (PoW) is a class of consensus algorithm that rewards miners who expend computational energy to solve mathematical problems to propose new blocks. With PoW, the probability of mining a block and thus receiving block rewards is a function of how much computational energy (known as hash power) a miner expends. Popular blockchains such as Bitcoin, Ethereum (1.0), and Litecoin are all Proof of Work blockchains. ( consensys)





Stablecoin

What is Stablecoins and how many and how they work?

The way  Stablecoins achieves by collateralizing other real-world assets and pairing the value to them. As such, the value of stablecoins should never exceed the collateral in reserve, and therefore can (in most cases) be exchanged to the assets they’re pegged to at any time.

It's important to know that staple coins or non-mined ones  and  non pre-mined Instead, their total supply is always changing and reacting to the movements in the market. In order to control inflation, coins are burned when exchanged to the pegged asset. Likewise, when an asset is collateralized, newly created stablecoins enter the market.

Several different types of stablecoins currently exist. Even though the underlying principle is the same, the main difference is how a particular stablecoin maintains its value.

1, FIAT- backed Stable Coins , ex : USD $$

2, Commodity backed Stable coins , ex : GOLD

3, Cryptocurrency-backed stable coins, ex: bitcoin/eththereum  

4, Seigniorage/Algo backed Stable coins , ex, : no proven example. 

Ref : https://blog.knowledgesociety.tech/what-is-stablecoins-and-how-do-they-work/





Verifiable CredentialA Credential is a set of one or more
claims made by an issuer. A
Verifiable Credential is a
tamper-evident Credential that has
authorship that can be
W3C Verifiable Claims Working Group cryptographically verified.





NEED GRAPHICS TO REPRESENT USER LEVEL......

Concepts vs. interpretations vs natural lang.

TermDefinitionStatusOwner
AMLAnti -laundering (AML) refers to the activities intended to prevent individuals from transferring value obtained illegally into a legitimate sources of income.
  • AML regulations require financial institutions to monitor customers' transactions and report on suspicious financial activity.

IN PROGESS


ApplicationAn application is software that runs on your computer or cell phone that allows you to perform certain tasks.  Mention Dapps?

IN PROGESS


Blockchain

"A blockchain is a peer-to-peer distributed ledger forged by consensus, combined with a system for "smart contracts" and other assistive technologies". hyperledger.org

A blockchain is a chain of blocks each containing transaction (transition) data. Each block, except the first block, is linked with the previous block together forming a chain. Once a block has entered the blockchain, it can not be altered resulting in data immutability . 



Byzantine Fault Tolerant

Byzantine Fault Tolerant ConsensusByzantine Fault Tolerance (BFT) is defined as the feature of a distributed network to reach consensus (agreement on the same value) even when some of the nodes in the network fail to respond or respond with incorrect information.An important consideration to be aware of while setting up a blockchain network is the requirements of Byzantine Fault Tolerant (BFT) consensus, compared with the Crash Fault Tolerant (CFT) one. Due to the underlying complexity of BFT consensus algorithms, a best practice is for the community to leverage the latest academically-proven consensus algorithms based on rigorous and peer-reviewed demonstrations of the safety and liveness properties. Such algorithms include the Tendermint, Algorand, Mir-BFT and HotStuff. There is also some on-going work on Golang-based implementation of the BFT-SMART algorithm for Hyperledger Fabric.  These are important reference points for blockchain architects and developers interested in adopting BFT consensus in the future.  At Oracle ,we are actively exploring the available options to ensure they meet the rigorous proof requirements as well as deliver operational characteristics, including performance and resilience required in enterprise applications.
IN PROGESS

Certificates of Authority

Certificate Authority

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party—trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. Wikipedia

The Certificate Authority (CA) provides a number of certificate services to users of a blockchain. More specifically, these services relate to user enrollment, transactions invoked on the blockchain, and TLS -secured connections between users or components of the blockchain. This guide builds on either the fabric developer’s setup or the prerequisites articulated in the fabric network setup guide.

IN PROGESS


ChainA block contains an ordered set of transactions. It is cryptographically linked to the preceding block, and in turn it is linked to be subsequent blocks. The first block in such a chain of blocks is called the genesis block. Blocks are created by the ordering service, and then validated and committed by peers.

IN PROGESS


Chaincode

Chaincode - Smart contracts in Hyperledger Fabric. A smart contract defines the executable logic that generates new facts that are added to the ledger. A chaincode is typically used by administrators to group related smart contracts for deployment, but can also be used for low level system programming of Fabric,. 

that manages access and modifications to a set of key-value pairs in the World State via Transaction. In Hyperledger Fabric, smart contracts are packaged as chaincode. Chaincode is installed on peers and then defined and used on one or more channels.

A chaincode definition is used by organizations to agree on the parameters of a chaincode before it can be used on a channel. Each channel member that wants to use the chaincode to endorse transactions or query the ledger needs to approve a chaincode definition for their organization. Once enough channel members have approved a chaincode definition to meet the Lifecycle Endorsement policy (which is set to a majority of organizations in the channel by default), the chaincode definition can be committed to the channel. After the definition is committed, the first invoke of the chaincode (or, if requested, the execution of the Init function) will start the chaincode on the channel.


IN PROGESS


Consensus

A broader term overarching the entire transactional flow, which serves to generate an agreement on the order and to confirm the correctness of the set of transactions constituting a block.

  • Coming to an agreement: The mechanism gathers all the agreements from the group as much as it can.
  • Collaboration: Every one of the group aims toward a better agreement that results in the groups’ interests as a whole.
  • Co-operation: Every individual will work as a team and put their own interests aside.

IN PROGESS


Verifiable Credential A Credential is a set of one or more
claims made by an issuer. A
Verifiable Credential is a
tamper-evident Credential that has
authorship that can be
W3C Verifiable Claims Working Group cryptographically verified.
A Credential is a set of one or more
claims made by an issuer. A
Verifiable Credential is a
tamper-evident Credential that has
authorship that can be
W3C Verifiable Claims Working Group cryptographically verified.


ERC20 Standards Token  is the Ethereum token system ,which is used for Ethereum smart contracts platform. Developed in 2015, ERC-20 defines a common list of rules to function within the Ethereum ecosystem. 

The Ethereum community created these standards with six mandatory and three optional rules.

Mandatory

  • totalSupply
  • balanceOf
  • transfer
  • transferFrom
  • approve
  • allowance

Optional

  • Token Name
  • Symbol
  • Decimal (up to 18)

Other ERC Token standards for Ref. 

  1. ERC-20 Token Standard. https://eips.ethereum.org/EIPS/eip-20
  2. ERC-165 Standard Interface Detection. https://eips.ethereum.org/EIPS/eip-165
  3. ERC-173 Owned Standard. https://eips.ethereum.org/EIPS/eip-173
  4. ERC-223 Token Standard. https://github.com/ethereum/EIPs/issues/223
  5. ERC-677 transferAndCall Token Standard. https://github.com/ethereum/EIPs/issues/677
  6. ERC-721 Non-Fungible Token Standard https://eips.ethereum.org/EIPS/eip-721

  7. ERC-827 Token Standard. https://eips.ethereum.org/EIPS/eip-827
  8. ERC-1155 Multi-Token Standard https://eips.ethereum.org/EIPS/eip-1155


IN PROGESS


Ethereum

Ethereum 2.0 (Eth2) is the next phase in the evolution and improvement of the public Ethereum network. With a shift from a Proof of Work to Proof of Stake consensus algorithm, Ethereum 2.0 will result in improved scalability, security, and usability for the network.

IN PROGESS


Genesis Block

The Genesis Block is the first block or block zero in any blockchain-based system, It is the prototype of all other blocks in the blockchain  network. Based on this which additional blocks are added to form a chain of blocks, hence we call them blockchain. In theory, there is no real need for a Genesis Block. However, it is necessary to have a starting point that everyone can trust.

The hash of genesis block is added to all new transactions in a new block. This combination is used to create its unique hash. This process is repeated until all the new blocks are added to a blockchain. Without Genesis Block, it would be really difficult for the participant to trust a blockchain and to know  how and when it started.

Note : Every block in a blockchain stores a reference to the previous block. In the case of Genesis Block, there is no previous block for reference.

Technically it means that the Genesis Block has it’s “previous hash” value set to 0. Which  means that no data was processed before the Genesis Block.All other blocks will have sequential numbers starting by 1, and will have a “previous hash” set to the hash of the previous block.

IN PROGESS


LedgerA ledger holds facts about the current and historical state of a set of business objects

IN PROGESS


Proof of Stake

Proof of Stake (PoS) is a class of consensus algorithm that selects and rewards validators as a function of a validator’s economic stake in the network. Unlike PoW, the probability of creating a block in a PoS network is not a result of hash power from burning energy, but rather the result of economic value-at-loss. Proof of Stake will be the consensus mechanism that Ethereum 2.0 uses to maintain the network. Unlike Proof of Work networks, Proof of Stake networks can achieve finality. (consensys)

IN PROGESS


Proof of Work

Proof of Work (PoW) is a class of consensus algorithm that rewards miners who expend computational energy to solve mathematical problems to propose new blocks. With PoW, the probability of mining a block and thus receiving block rewards is a function of how much computational energy (known as hash power) a miner expends. Popular blockchains such as Bitcoin, Ethereum (1.0), and Litecoin are all Proof of Work blockchains. ( consensys)

IN PROGESS


Stablecoin

What are Stablecoins and how many and how do they work?

The way  Stablecoins achieves by collateralizing other real-world assets and pairing the value to them. As such, the value of stablecoins should never exceed the collateral in reserve, and therefore can (in most cases) be exchanged to the assets they’re pegged to at any time.

It's important to know that staple coins or non-mined ones  and  non pre-mined Instead, their total supply is always changing and reacting to the movements in the market. In order to control inflation, coins are burned when exchanged to the pegged asset. Likewise, when an asset is collateralized, newly created stablecoins enter the market.

Several different types of stablecoins currently exist. Even though the underlying principle is the same, the main difference is how a particular stablecoin maintains its value.

1, FIAT- backed Stable Coins , ex : USD $$

2, Commodity backed Stable coins , ex : GOLD

3, Cryptocurrency-backed stable coins, ex: bitcoin/eththereum  

4, Seigniorage/Algo backed Stable coins , ex, : no proven example. 


Ref : https://blog.knowledgesociety.tech/what-is-stablecoins-and-how-do-they-work/


IN PROGESS


Cryptocurrencies


CryptographyProcess for protecting data from theft or modifications. It uses an algorithm and a secure key to allow only the sender and the intended recipient of a message to view its contents.
Félix
DappShort for "decentralized app". Software applications that run on a distributed peer-to-peer decentralized network. Dapps are not controlled by any single authority.
Félix
DeFiShort for "decentralized finance". Merger of traditional financial services with decentralized technologies, using smart contracts.
Félix
Digital Identity

A digital identity arises organically from the use of personal information on the web and from the shadow data created by the individual’s actions online. A digital identity may be a pseudonymous profile linked to the device’s IP address, for example, a randomly-generated unique ID. Data points that can help form a digital identity include usernames and passwords, drivers license number, online purchasing history, date of birth, online search activities, medical history, etc. Biometrics, Behavioral, Biographic are the modals that make up a person’s identity.

In one example, users sign up to a self-sovereign identity and data platform to create and register a DID. During this process, the user creates a pair of private and public keys. Public keys associated to a DID can be stored on-chain in case keys are compromised or are rotated for security reasons. Additional data associated with a DID such as attestations can be anchored on-chain, but the full data itself should not be stored on-chain to maintain scalability and compliance with privacy regulations.

A decentralized identifier (DID) is a pseudo-anonymous identifier for a person, company, object, etc. Each DID is secured by a private key. Only the private key owner can prove that they own or control their identity. One person can have many DIDs, which limits the extent to which they can be tracked across the multiple activities in their life. For example, a person could have one DID associated with a gaming platform, and another, entirely separate DID associated with their credit reporting platform. 

Blockchain for Digital Identity: Real World Use Cases | ConsenSys



Phumza
Digital Government

Digital government is the state-of-art concept from public administration science, a
successor of e-government paradigm. The former model simply indicated the
digitalisation of the public administration.

Digital government refers to the creation of new public services and service delivery models that leverage digital technologies and governmental and citizen information assets. The new paradigm focuses on the provision of user-centric , agile and innovative public services. Blockchain absolutely is the one of the most innovative digital technologies that has to be considered under the new paradigm of governmental policy making and service delivery.


Ref: Blockchain for Digital Governments (europa.eu)


Phumza
Distributed Ledger






September 21,2020



Ethereum: Decentralized open-source blockchain that features smart contract functionalities. 

Genesis Block: First block of a blockchain. It is sometimes referred to Block Zero (0)

Proof of Stake: Consensus mechanism used to add new blocks to the blockchain. In Proof of Stake, validators lock up some assets as a stake, and then vote on the blocks that they believe will be added next to the chain. When the block gets added, they get a reward proportional to their stake.

Proof of Work: Consensus algorithm used to add new blocks to the blockchain. In Proof of Work, participants (miners) compete against each other, trying to validate transactions by solving complex cryptographic puzzles. Miners who solve the cryptographic puzzle get asset rewards.

Stable Coin: Assets designed to limit their market price fluctuation. 

Byzantine Fault Tolerant Consensus

NIST considers standard terms

https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8301-draft.pdf

Terminology

A project is an active entity that has project member(s) and produces project result(s). Its member(s) use project sites to coordinate and disseminate result(s). A project does not need to be a formal legal entity. Key terms relating to project are:

  • Project members are the group of one or more people or companies who work together to attempt to produce project results. Some FLOSS projects may have different kinds of members, with different roles, but that's outside our scope.
  • Project results are what the project members work together to produce as their end goal. Normally this is software, but project results may include other things as well. Criteria that refer to "software produced by the project" are referring to project results.
  • Project sites are the sites dedicated to supporting the development and dissemination of project results, and include the project website, repository, and download sites where applicable (see sites_https).
  • The project website, aka project homepage, is the main page on the world wide web (WWW) that a new user would typically visit to see information about the project; it may be the same as the project's repository site (this is often true on GitHub).
  • The project repository manages and stores the project results and revision history of the project results. This is also referred to as the project source repository, because we only require managing and storing of the editable versions, not of automatically generated results (in many cases generated results are not stored in a repository).

blockchain; cryptoasset; cryptocurrency; data portability; decentralized governance; digital asset;
106 digital token; distributed ledger; fintech; off-chain scaling; self-hosting; smart contract; state
107 channel; tokenization; transaction confidentiality; verifiable data; wallet; zero-knowledge proof.

Consensus Layer - Responsible for generating an agreement on the order and
confirming the correctness of the set of transactions that constitute a block.
Smart Contract Layer - Responsible for processing transaction requests and
determining if transactions are valid by executing business logic.
• Communication Layer - Responsible for peer-to-peer message transport between
the nodes that participate in a shared ledger instance.
Data Store Abstraction - Allows different data-stores to be used by other modules.
Crypto Abstraction - Allows different crypto algorithms or modules to be swapped
out without affecting other modules.
• Identity Services - Enables the establishment of a root of trust during setup of a
blockchain instance, the enrollment and registration of identities or system entities
during network operation, and the management of changes like drops, adds, and
revocations. Also, provides authentication and authorization.
• Policy Services - Responsible for policy management of various policies specified
in the system, such as the endorsement policy, consensus policy, or group
management policy. It interfaces and depends on other modules to enforce the
various policies.
APIs - Enables clients and applications to interface to blockchains.
Interoperation - Supports the interoperation between different blockchain instances

Keywords
 blockchain; cryptoasset; cryptocurrency; data portability; decentralized governance; digital asset;
digital token; distributed ledger; fintech; off-chain scaling; self-hosting; smart contract; state
 channel; tokenization; transaction confidentiality; verifiable data; wallet; zero-knowledge proof.

Acronyms

APIs = application program interface, no apostrophe

BFT = Byzantine Fault-Tolerance or Tolerant

BFTP = Byzantine Fault-Tolerant Protocol

CA = certificate authority

CRL = certificate revocation list 

DID = decentralized identity 

DLT = distributed ledger technology

DLTs =  distributed ledger technologies, no apostrophe

MOU = memo of understanding

NIZK = Non-Interactive Zero Knowledge 

PBFT = Practical Byzantine Fault Tolerant 

PII = personally identifiable information

PoC = proof of concept, plural PoCs = proofs of concept, not proof of concepts

PoET = proof of elapsed time

PoS = proof of stake 

PoW = proof of work 

RBAC = role-based access control 

RPS = reads per second

TPS = transactions per second

SDKs = software development kits, no apostrophe unless possessive = SDKs’ version number

SNARK = Succinct Non-Interactive Argument of Knowledge 

UXTO = unspent transaction output

ZK = zero knowledge

August 24, 2020




  • Business process flows: These are the commons steps in a business process, or supply chain process. In the solar project finance example page, these are Identify a project, Originate a project, Raise the Funds, Build the project, and Run the project. The application environment is specifically aligned with the processes since they provide services across

  • Governance Framework: This pertains to the Governance Frameworks in common Trust Over Ip stacks.

  • DIDs and Agent Credentials: Common ID layer and verifiable credential layer that determined who is who in the common network, and what data can be shared between each agent. Tools for this are provided from Hyperledger Indy (DID) and Hyperledger Aries (Agent Credentials).

  • Common DLT Data Layer: This can be a permissioned ledger that stores data from the network that applications can use for their specific services across the business process flow, granted that they have access from the other applications and the underlying agentes (eg. the user). Such a layer can use Hyperledger Fabric.

  • Business Protocols and Taxonomies: The common language use by the business process flows can be understood as a shared taxonomy, which defines common schemas and methods. This is business specific.

  • Client Layer: This layer is a common entry point for every application in the network, it makes it easy for applications to interact with the network and even integrate their own set of network solutions, since application may be leveraging tools from other DLT environments.

  • Application Environment: These are the actual applications and platform of applications using the network and providing different concrete services to the end-user for their processes. Applications in this model can be proprietary or open source, but require using the open source network to establish the trusted interactions across them.














Term

Status

Definition

AML

NEEDS REVIEW

Application

NEEDS REVIEW

BLOCK

A block contains one or more transactions stored within the blockchain. Blocks are created by the ordering service, and then validated and committed by peers. 

Analogy: A block is similar to a page of a ledger.


Blockchain

A block contains an ordered set of transactions. It is cryptographically linked to the preceding block, and in turn it is linked to be subsequent blocks. A blockchain is a list of records (blocks), linked (or chained) chronologically. The first block in such a chain of blocks is called the genesis block

Analogy: a blockchain is similar to a book of records that keeps a log of all transactions ("blocks"), in chronological order.



Chain

The ledger’s chain is a transaction log structured as hash-linked blocks of transactions. Peers receive blocks of transactions from the ordering service, mark the block’s transactions as valid or invalid based on endorsement policies and concurrency violations, and append the block to the hash chain on the peer’s file system.
Chaincode

Embedded logic that encodes the rules for specific types of network transactions.

DApp

Decentralized application - Whole or part of logic on a decentralized network; built on a peer-to-peer network like a blockchain; May have their own blockchain.

Initiatives

Groups of stakeholders collaborating to educate, develop pilots, & set policy.

Blockchain Platform

A decentralized, distributed, immutable ledger.

Project

Implementation of an Application, DApp, or Intermediary System.

Intermediary System

Standard or specification for data and procedure that may include libraries, protocols, applications; is not a blockchain in and of itself.

Private Consortium

Organization members collaborating to set standards, governance, development, and hosting of a private blockchain and its related applications.

Public Permissioned Consortium


Organization members collaborating to set standards, governance, development, and hosting of a public permissioned blockchain and its related applications.

Channel 

Private blockchain overlay that allows for data confidentiality and isolation. Channels are defined by a Configuration Block

Configuration block
Block that contains the configuration data that defines members and policies for a system chain or channel. 
Consensus

General agreement that allows to confirm the correctness and the order of the set of transactions of a specific block.

Smart contract

Decentralized, immutable and deterministic protocols that provide automation in blockchain solutions and allow to remove third-parties and let peer-to-peer interactions.  Smart contract activities can be verifiedOnce agreed between the parties and deployed on a distributed ledger, their activities and outcomes can be verified, so they can be trusted by all stakeholders. 

Genesis block
First block of a block chain, that initializes the ordering service.
Transaction
A transaction is created when a chaincode is invoked from a client application to read or write data from the ledger.
Smart contract
Code – invoked by a client application external to the blockchain network – that manages access and modifications to a set of key-value pairs in the latest values for all keys included in the chain transaction log via transactions.


Person

A human being, alive or deceased, as recognized by each jurisdiction’s legal definitions.

Organization

An organized group of one or more people with a particular purpose

Role

People have roles in Organizations for specific periods of time.

Resource 

Anything could be a resource, depending on its context defined in metadata. 

Event

People and Organizations have events with each other and with resources on or over specific periods of Time.

Relationship

Organizations, Resources, and Events all can have standard association types

Identity

The unique fact of being who or what a person or thing is

Digital Identity

A unique fact of being who or what a person is IN the digital world.  It may be connected to a real world Identity (thus being a digital twin) or may not (alias/persona)

Digital Identifier

Unique information used to identify people, organizations, or things within a context.  For example: SSN, e-mail, SASID, LASID. A digital identity can have more than one digital identifier.

PII

Personally Identifiable Information is any item, collection, or grouping of information about an individual that is maintained by an organization, including identifying information, education, financial transactions, medical history, Social Security Numbers, and criminal or employment history.

Personal Information

PII, demographics, and linked event information. Some information becomes personal in context (such as small group size aggregates).

Learner Information

Information about a learner.

Privacy Rights

Rights of a person to control access to and use of their personal information. More formal definition: “the right of a person to be free from intrusion into or publicity concerning matters of a personal nature”

Authentication

Actions and mechanisms that can authenticate the identity of a person that includes information about an authentication provider, the login identifier used to authenticate a person's identity, and other information related to authentication of a person’s identity.

Authorization

The authority to access to data or services to authorized entities.

Access Control

The protocols in a system that limit access to data or services to authorized entities.   Information about a data system or application that an authenticated person or system may access

Self-sovereign identity

An identity system architecture based on the core principle that Identity Owners have the right to permanently control one or more Identifiers together with the usage of the associated Identity Data

Information Security

Systems of controls designed to enforce privacy access controls and operational continuity.

Data Stewardship/Processor

Responsibility to have proper security for privacy access controls. 

Trust

A person or systems ability to rely on something from another.  Fiduciary trust can be delegated from one entity to another.

Competency Definition

An information resource that includes a statement that describes a capability or behavior that a person may learn or be able to do within a given situation and environment along with definitions of the potential levels of mastery and metadata related to that statement

Competency Assertion

Event data that includes an Assertion by an Issuer about a Person regarding their competency as of a certain date.

Credential Definition

An information Resource that defines a competency or qualification, achievement, personal or organizational quality, experience, attribute, or aspect of an identity typically used to indicate suitability

Credential Award

Event data that includes an Assertion by an Agent/Issuer that documents a Person or Organization’s qualification, achievement, personal or organizational quality, experience, attribute, or aspect of an identity as of a certain date or date range.





Hyperledger Glossary for marketing



  1. Dashboard
  2.  Community Architects Team
  3.  Works in Progress


Skip to end of bannerGo to start of bannerSkip to end of metadata


Hyperledger Glossary for marketing

Marketing 


  • What is a project?
    • A project is a top-level DLT or component that has been ratified by the TSC.
    • Projects should ship
    • The bar for new projects is high.
      • Burrow
      • Fabric
      • Indy
      • Iroha
      • Sawtooth
      • GRID (should be a sub-project of Sawtooth, or a lab)
    • What are the benefits?
    • What kind of Sup