No Code Glossary
Unlocking No-Code: A Comprehensive Glossary for Builders, Creators and Entrepreneurs
Search glossary
No Code Glossary
Unlocking No-Code: A Comprehensive Glossary for Builders, Creators and Entrepreneurs
Search glossary
No Code Glossary
Unlocking No-Code: A Comprehensive Glossary for Builders, Creators and Entrepreneurs
Search glossary
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
View All
Actively Validated Service
Any protocol that leverages EigenLayer to bootstrap decentralized security from Ethereum.
AI Privacy
AI privacy concerns involve exposing or misusing sensitive data during collection, storage & processing by AI systems. Learn more.
Application-Specific Rollups
Application-Specific Rollups process & batch transactions off-chain for specific apps, enhancing speed & reducing costs. Learn more.
Block
A block is a batch of verified transactions recorded on the blockchain, creating a permanent, time-stamped record linked to the previous block.
Decentralized Finance
A blockchain-based financial system offering open, peer-to-peer services like lending, trading, and savings without intermediaries.
EigenLayer
A protocol that lets users restake their Ethereum assets to expand security and utility for new decentralized systems.
Ethereum
A decentralized blockchain platform enabling smart contracts and decentralized applications (dApps) with its programmable, trustless environment.
Faucet
A faucet provides developers with free testnet tokens to simulate transactions and test decentralized apps in a risk-free environment.
Fraud Proof
A fraud proof is evidence used to show that a transaction or computation was executed incorrectly, ensuring network security & trust.
Fully Homomorphic Encryption
An encryption method that lets data be processed and analyzed while encrypted, ensuring secure computation without exposing sensitive information.
Gwei
A small unit of Ether used to measure gas fees on Ethereum, making it easier to calculate transaction costs precisely.
Hardware Root Of Trust
A hardware root of trust is a secure hardware foundation that ensures a device starts & runs securely by validating critical operations.
Hashing
A process converting data into a fixed-size string using a cryptographic algorithm, ensuring data integrity and secure verification.
Intersubjective Faults
A broad agreement among observers about discrepancies in system data or operator actions, requiring consensus-based resolution.
Key Pair
A key pair consists of a public and private key, used together to encrypt, decrypt, and authenticate data securely.
L2 Faucet
A faucet backed by Proof of Machinehood that allows users to receive tokens simply by attesting their device.
Liveness
A feature ensuring that the network continuously processes transactions, guaranteeing uninterrupted updates to the ledger.
Modular Blockchain
An architecture that separates key functions of a blockchain such as execution, consensus, and data availability to optimize scalability, security, and flexibility.
Multi-Prover
A system that enhances blockchain resilience by distributing trust across multiple proof methods, including Intel SGX's secure enclave.
Node Operator
A node operator manages and maintains blockchain nodes, ensuring network integrity by processing and verifying transactions. Learn more.
Onchain
Actions and data processed directly on a blockchain, ensuring transparency, security, and immutable record-keeping.
Optimistic Rollup
A Layer 2 scaling solution that assumes transactions are valid, verifying only when fraud proofs challenge them.
Privacy
A concept that safeguards personal data, ensuring that individuals control how their information is collected, shared, and used.
Proof of Machinehood
A mechanism that posts verifiable machine attestations onchain to establish machine authenticity.
RPC Endpoint
An RPC endpoint is a network point that facilitates communication between a client and a server in a blockchain network. Learn more here!
RPC Node
An RPC node is a key server for Web3 app interactions. Learn its workings & find ways to boost privacy and efficiency in blockchain here.
Secure Enclave
A secure enclave is a protected processor area that isolates & secures data & code, preventing unauthorized access or tampering.
Settlement Layer
A settlement layer is the main blockchain where transactions are finalized & securely recorded, ensuring their integrity & immutability.
Sybil Attack
A type of security threat where a single entity creates multiple fake identities to manipulate, disrupt, or gain control over a network, such as in voting systems or decentralized networks.
TEE Committee
A TEE Committee is a group of secure computing environments from different vendors ensuring trusted & tamper-proof computations.
TEE Prover
A TEE Prover uses secure hardware to verify blockchain transactions, ensuring they are tamper-proof and trustworthy. Learn more here.
Trusted Execution Environment
A Trusted Execution Environment (TEE) is a secure processor area protecting code and data integrity. Learn more here.
USDC
A stablecoin pegged to the United States dollar that is issued and managed by Circle.
Verax
An on-chain attestation registry that lets developers verify Proof of Machinehood attestations, ensuring trusted device authenticity.
Verifiable Computing
A cryptographic method that allows users to confirm the accuracy and integrity of computations performed by third parties.
Wallet
A tool that stores digital assets and secures private keys, enabling users to send, receive, and manage cryptocurrencies.
Web3
A decentralized internet model where users control their data, access services directly, and interact via blockchain technologies.
X.509 Certificate
A digital document that verifies the identity of entities, enabling secure communication through encryption and authentication.
Zero Knowledge Proofs
A cryptographic tool that enables one party to prove a statement is true to another without revealing any extra details.
Zero Knowledge Rollup
A Layer 2 blockchain solution that uses cryptographic proofs to securely verify and bundle transactions off-chain.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
View All
Actively Validated Service
Any protocol that leverages EigenLayer to bootstrap decentralized security from Ethereum.
AI Privacy
AI privacy concerns involve exposing or misusing sensitive data during collection, storage & processing by AI systems. Learn more.
Application-Specific Rollups
Application-Specific Rollups process & batch transactions off-chain for specific apps, enhancing speed & reducing costs. Learn more.
Block
A block is a batch of verified transactions recorded on the blockchain, creating a permanent, time-stamped record linked to the previous block.
Decentralized Finance
A blockchain-based financial system offering open, peer-to-peer services like lending, trading, and savings without intermediaries.
EigenLayer
A protocol that lets users restake their Ethereum assets to expand security and utility for new decentralized systems.
Ethereum
A decentralized blockchain platform enabling smart contracts and decentralized applications (dApps) with its programmable, trustless environment.
Faucet
A faucet provides developers with free testnet tokens to simulate transactions and test decentralized apps in a risk-free environment.
Fraud Proof
A fraud proof is evidence used to show that a transaction or computation was executed incorrectly, ensuring network security & trust.
Fully Homomorphic Encryption
An encryption method that lets data be processed and analyzed while encrypted, ensuring secure computation without exposing sensitive information.
Gwei
A small unit of Ether used to measure gas fees on Ethereum, making it easier to calculate transaction costs precisely.
Hardware Root Of Trust
A hardware root of trust is a secure hardware foundation that ensures a device starts & runs securely by validating critical operations.
Hashing
A process converting data into a fixed-size string using a cryptographic algorithm, ensuring data integrity and secure verification.
Intersubjective Faults
A broad agreement among observers about discrepancies in system data or operator actions, requiring consensus-based resolution.
Key Pair
A key pair consists of a public and private key, used together to encrypt, decrypt, and authenticate data securely.
L2 Faucet
A faucet backed by Proof of Machinehood that allows users to receive tokens simply by attesting their device.
Liveness
A feature ensuring that the network continuously processes transactions, guaranteeing uninterrupted updates to the ledger.
Modular Blockchain
An architecture that separates key functions of a blockchain such as execution, consensus, and data availability to optimize scalability, security, and flexibility.
Multi-Prover
A system that enhances blockchain resilience by distributing trust across multiple proof methods, including Intel SGX's secure enclave.
Node Operator
A node operator manages and maintains blockchain nodes, ensuring network integrity by processing and verifying transactions. Learn more.
Onchain
Actions and data processed directly on a blockchain, ensuring transparency, security, and immutable record-keeping.
Optimistic Rollup
A Layer 2 scaling solution that assumes transactions are valid, verifying only when fraud proofs challenge them.
Privacy
A concept that safeguards personal data, ensuring that individuals control how their information is collected, shared, and used.
Proof of Machinehood
A mechanism that posts verifiable machine attestations onchain to establish machine authenticity.
RPC Endpoint
An RPC endpoint is a network point that facilitates communication between a client and a server in a blockchain network. Learn more here!
RPC Node
An RPC node is a key server for Web3 app interactions. Learn its workings & find ways to boost privacy and efficiency in blockchain here.
Secure Enclave
A secure enclave is a protected processor area that isolates & secures data & code, preventing unauthorized access or tampering.
Settlement Layer
A settlement layer is the main blockchain where transactions are finalized & securely recorded, ensuring their integrity & immutability.
Sybil Attack
A type of security threat where a single entity creates multiple fake identities to manipulate, disrupt, or gain control over a network, such as in voting systems or decentralized networks.
TEE Committee
A TEE Committee is a group of secure computing environments from different vendors ensuring trusted & tamper-proof computations.
TEE Prover
A TEE Prover uses secure hardware to verify blockchain transactions, ensuring they are tamper-proof and trustworthy. Learn more here.
Trusted Execution Environment
A Trusted Execution Environment (TEE) is a secure processor area protecting code and data integrity. Learn more here.
USDC
A stablecoin pegged to the United States dollar that is issued and managed by Circle.
Verax
An on-chain attestation registry that lets developers verify Proof of Machinehood attestations, ensuring trusted device authenticity.
Verifiable Computing
A cryptographic method that allows users to confirm the accuracy and integrity of computations performed by third parties.
Wallet
A tool that stores digital assets and secures private keys, enabling users to send, receive, and manage cryptocurrencies.
Web3
A decentralized internet model where users control their data, access services directly, and interact via blockchain technologies.
X.509 Certificate
A digital document that verifies the identity of entities, enabling secure communication through encryption and authentication.
Zero Knowledge Proofs
A cryptographic tool that enables one party to prove a statement is true to another without revealing any extra details.
Zero Knowledge Rollup
A Layer 2 blockchain solution that uses cryptographic proofs to securely verify and bundle transactions off-chain.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
View All