No Code Glossary

Unlocking No-Code: A Comprehensive Glossary for Builders, Creators and Entrepreneurs

Search glossary

No Code Glossary

Unlocking No-Code: A Comprehensive Glossary for Builders, Creators and Entrepreneurs

Search glossary

No Code Glossary

Unlocking No-Code: A Comprehensive Glossary for Builders, Creators and Entrepreneurs

Search glossary

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

View All

Actively Validated Service

Any protocol that leverages EigenLayer to bootstrap decentralized security from Ethereum.

AI Privacy

AI privacy concerns involve exposing or misusing sensitive data during collection, storage & processing by AI systems. Learn more.

Application-Specific Rollups

Application-Specific Rollups process & batch transactions off-chain for specific apps, enhancing speed & reducing costs. Learn more.

Block

A block is a batch of verified transactions recorded on the blockchain, creating a permanent, time-stamped record linked to the previous block.

Decentralized Finance

A blockchain-based financial system offering open, peer-to-peer services like lending, trading, and savings without intermediaries.

EigenLayer

A protocol that lets users restake their Ethereum assets to expand security and utility for new decentralized systems.

Ethereum

A decentralized blockchain platform enabling smart contracts and decentralized applications (dApps) with its programmable, trustless environment.

Faucet

A faucet provides developers with free testnet tokens to simulate transactions and test decentralized apps in a risk-free environment.

Fraud Proof

A fraud proof is evidence used to show that a transaction or computation was executed incorrectly, ensuring network security & trust.

Fully Homomorphic Encryption

An encryption method that lets data be processed and analyzed while encrypted, ensuring secure computation without exposing sensitive information.

Gwei

A small unit of Ether used to measure gas fees on Ethereum, making it easier to calculate transaction costs precisely.

Hardware Root Of Trust

A hardware root of trust is a secure hardware foundation that ensures a device starts & runs securely by validating critical operations.

Hashing

A process converting data into a fixed-size string using a cryptographic algorithm, ensuring data integrity and secure verification.

Intersubjective Faults

A broad agreement among observers about discrepancies in system data or operator actions, requiring consensus-based resolution.

Key Pair

A key pair consists of a public and private key, used together to encrypt, decrypt, and authenticate data securely.

L2 Faucet

A faucet backed by Proof of Machinehood that allows users to receive tokens simply by attesting their device.

Liveness

A feature ensuring that the network continuously processes transactions, guaranteeing uninterrupted updates to the ledger.

Modular Blockchain

An architecture that separates key functions of a blockchain such as execution, consensus, and data availability to optimize scalability, security, and flexibility.

Multi-Prover

A system that enhances blockchain resilience by distributing trust across multiple proof methods, including Intel SGX's secure enclave.

Node Operator

A node operator manages and maintains blockchain nodes, ensuring network integrity by processing and verifying transactions. Learn more.

Onchain

Actions and data processed directly on a blockchain, ensuring transparency, security, and immutable record-keeping.

Optimistic Rollup

A Layer 2 scaling solution that assumes transactions are valid, verifying only when fraud proofs challenge them.

Privacy

A concept that safeguards personal data, ensuring that individuals control how their information is collected, shared, and used.

Proof of Machinehood

A mechanism that posts verifiable machine attestations onchain to establish machine authenticity.

RPC Endpoint

An RPC endpoint is a network point that facilitates communication between a client and a server in a blockchain network. Learn more here!

RPC Node

An RPC node is a key server for Web3 app interactions. Learn its workings & find ways to boost privacy and efficiency in blockchain here.

Secure Enclave

A secure enclave is a protected processor area that isolates & secures data & code, preventing unauthorized access or tampering.

Settlement Layer

A settlement layer is the main blockchain where transactions are finalized & securely recorded, ensuring their integrity & immutability.

Sybil Attack

A type of security threat where a single entity creates multiple fake identities to manipulate, disrupt, or gain control over a network, such as in voting systems or decentralized networks.

TEE Committee

A TEE Committee is a group of secure computing environments from different vendors ensuring trusted & tamper-proof computations.

TEE Prover

A TEE Prover uses secure hardware to verify blockchain transactions, ensuring they are tamper-proof and trustworthy. Learn more here.

Trusted Execution Environment

A Trusted Execution Environment (TEE) is a secure processor area protecting code and data integrity. Learn more here.

USDC

A stablecoin pegged to the United States dollar that is issued and managed by Circle.

Verax

An on-chain attestation registry that lets developers verify Proof of Machinehood attestations, ensuring trusted device authenticity.

Verifiable Computing

A cryptographic method that allows users to confirm the accuracy and integrity of computations performed by third parties.

Wallet

A tool that stores digital assets and secures private keys, enabling users to send, receive, and manage cryptocurrencies.

Web3

A decentralized internet model where users control their data, access services directly, and interact via blockchain technologies.

X.509 Certificate

A digital document that verifies the identity of entities, enabling secure communication through encryption and authentication.

Zero Knowledge Proofs

A cryptographic tool that enables one party to prove a statement is true to another without revealing any extra details.

Zero Knowledge Rollup

A Layer 2 blockchain solution that uses cryptographic proofs to securely verify and bundle transactions off-chain.

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

View All

Actively Validated Service

Any protocol that leverages EigenLayer to bootstrap decentralized security from Ethereum.

AI Privacy

AI privacy concerns involve exposing or misusing sensitive data during collection, storage & processing by AI systems. Learn more.

Application-Specific Rollups

Application-Specific Rollups process & batch transactions off-chain for specific apps, enhancing speed & reducing costs. Learn more.

Block

A block is a batch of verified transactions recorded on the blockchain, creating a permanent, time-stamped record linked to the previous block.

Decentralized Finance

A blockchain-based financial system offering open, peer-to-peer services like lending, trading, and savings without intermediaries.

EigenLayer

A protocol that lets users restake their Ethereum assets to expand security and utility for new decentralized systems.

Ethereum

A decentralized blockchain platform enabling smart contracts and decentralized applications (dApps) with its programmable, trustless environment.

Faucet

A faucet provides developers with free testnet tokens to simulate transactions and test decentralized apps in a risk-free environment.

Fraud Proof

A fraud proof is evidence used to show that a transaction or computation was executed incorrectly, ensuring network security & trust.

Fully Homomorphic Encryption

An encryption method that lets data be processed and analyzed while encrypted, ensuring secure computation without exposing sensitive information.

Gwei

A small unit of Ether used to measure gas fees on Ethereum, making it easier to calculate transaction costs precisely.

Hardware Root Of Trust

A hardware root of trust is a secure hardware foundation that ensures a device starts & runs securely by validating critical operations.

Hashing

A process converting data into a fixed-size string using a cryptographic algorithm, ensuring data integrity and secure verification.

Intersubjective Faults

A broad agreement among observers about discrepancies in system data or operator actions, requiring consensus-based resolution.

Key Pair

A key pair consists of a public and private key, used together to encrypt, decrypt, and authenticate data securely.

L2 Faucet

A faucet backed by Proof of Machinehood that allows users to receive tokens simply by attesting their device.

Liveness

A feature ensuring that the network continuously processes transactions, guaranteeing uninterrupted updates to the ledger.

Modular Blockchain

An architecture that separates key functions of a blockchain such as execution, consensus, and data availability to optimize scalability, security, and flexibility.

Multi-Prover

A system that enhances blockchain resilience by distributing trust across multiple proof methods, including Intel SGX's secure enclave.

Node Operator

A node operator manages and maintains blockchain nodes, ensuring network integrity by processing and verifying transactions. Learn more.

Onchain

Actions and data processed directly on a blockchain, ensuring transparency, security, and immutable record-keeping.

Optimistic Rollup

A Layer 2 scaling solution that assumes transactions are valid, verifying only when fraud proofs challenge them.

Privacy

A concept that safeguards personal data, ensuring that individuals control how their information is collected, shared, and used.

Proof of Machinehood

A mechanism that posts verifiable machine attestations onchain to establish machine authenticity.

RPC Endpoint

An RPC endpoint is a network point that facilitates communication between a client and a server in a blockchain network. Learn more here!

RPC Node

An RPC node is a key server for Web3 app interactions. Learn its workings & find ways to boost privacy and efficiency in blockchain here.

Secure Enclave

A secure enclave is a protected processor area that isolates & secures data & code, preventing unauthorized access or tampering.

Settlement Layer

A settlement layer is the main blockchain where transactions are finalized & securely recorded, ensuring their integrity & immutability.

Sybil Attack

A type of security threat where a single entity creates multiple fake identities to manipulate, disrupt, or gain control over a network, such as in voting systems or decentralized networks.

TEE Committee

A TEE Committee is a group of secure computing environments from different vendors ensuring trusted & tamper-proof computations.

TEE Prover

A TEE Prover uses secure hardware to verify blockchain transactions, ensuring they are tamper-proof and trustworthy. Learn more here.

Trusted Execution Environment

A Trusted Execution Environment (TEE) is a secure processor area protecting code and data integrity. Learn more here.

USDC

A stablecoin pegged to the United States dollar that is issued and managed by Circle.

Verax

An on-chain attestation registry that lets developers verify Proof of Machinehood attestations, ensuring trusted device authenticity.

Verifiable Computing

A cryptographic method that allows users to confirm the accuracy and integrity of computations performed by third parties.

Wallet

A tool that stores digital assets and secures private keys, enabling users to send, receive, and manage cryptocurrencies.

Web3

A decentralized internet model where users control their data, access services directly, and interact via blockchain technologies.

X.509 Certificate

A digital document that verifies the identity of entities, enabling secure communication through encryption and authentication.

Zero Knowledge Proofs

A cryptographic tool that enables one party to prove a statement is true to another without revealing any extra details.

Zero Knowledge Rollup

A Layer 2 blockchain solution that uses cryptographic proofs to securely verify and bundle transactions off-chain.

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

View All

Actively Validated Service

Any protocol that leverages EigenLayer to bootstrap decentralized security from Ethereum.

AI Privacy

AI privacy concerns involve exposing or misusing sensitive data during collection, storage & processing by AI systems. Learn more.

Application-Specific Rollups

Application-Specific Rollups process & batch transactions off-chain for specific apps, enhancing speed & reducing costs. Learn more.

Block

A block is a batch of verified transactions recorded on the blockchain, creating a permanent, time-stamped record linked to the previous block.

Decentralized Finance

A blockchain-based financial system offering open, peer-to-peer services like lending, trading, and savings without intermediaries.

EigenLayer

A protocol that lets users restake their Ethereum assets to expand security and utility for new decentralized systems.

Ethereum

A decentralized blockchain platform enabling smart contracts and decentralized applications (dApps) with its programmable, trustless environment.

Faucet

A faucet provides developers with free testnet tokens to simulate transactions and test decentralized apps in a risk-free environment.

Fraud Proof

A fraud proof is evidence used to show that a transaction or computation was executed incorrectly, ensuring network security & trust.

Fully Homomorphic Encryption

An encryption method that lets data be processed and analyzed while encrypted, ensuring secure computation without exposing sensitive information.

Gwei

A small unit of Ether used to measure gas fees on Ethereum, making it easier to calculate transaction costs precisely.

Hardware Root Of Trust

A hardware root of trust is a secure hardware foundation that ensures a device starts & runs securely by validating critical operations.

Hashing

A process converting data into a fixed-size string using a cryptographic algorithm, ensuring data integrity and secure verification.

Intersubjective Faults

A broad agreement among observers about discrepancies in system data or operator actions, requiring consensus-based resolution.

Key Pair

A key pair consists of a public and private key, used together to encrypt, decrypt, and authenticate data securely.

L2 Faucet

A faucet backed by Proof of Machinehood that allows users to receive tokens simply by attesting their device.

Liveness

A feature ensuring that the network continuously processes transactions, guaranteeing uninterrupted updates to the ledger.

Modular Blockchain

An architecture that separates key functions of a blockchain such as execution, consensus, and data availability to optimize scalability, security, and flexibility.

Multi-Prover

A system that enhances blockchain resilience by distributing trust across multiple proof methods, including Intel SGX's secure enclave.

Node Operator

A node operator manages and maintains blockchain nodes, ensuring network integrity by processing and verifying transactions. Learn more.

Onchain

Actions and data processed directly on a blockchain, ensuring transparency, security, and immutable record-keeping.

Optimistic Rollup

A Layer 2 scaling solution that assumes transactions are valid, verifying only when fraud proofs challenge them.

Privacy

A concept that safeguards personal data, ensuring that individuals control how their information is collected, shared, and used.

Proof of Machinehood

A mechanism that posts verifiable machine attestations onchain to establish machine authenticity.

RPC Endpoint

An RPC endpoint is a network point that facilitates communication between a client and a server in a blockchain network. Learn more here!

RPC Node

An RPC node is a key server for Web3 app interactions. Learn its workings & find ways to boost privacy and efficiency in blockchain here.

Secure Enclave

A secure enclave is a protected processor area that isolates & secures data & code, preventing unauthorized access or tampering.

Settlement Layer

A settlement layer is the main blockchain where transactions are finalized & securely recorded, ensuring their integrity & immutability.

Sybil Attack

A type of security threat where a single entity creates multiple fake identities to manipulate, disrupt, or gain control over a network, such as in voting systems or decentralized networks.

TEE Committee

A TEE Committee is a group of secure computing environments from different vendors ensuring trusted & tamper-proof computations.

TEE Prover

A TEE Prover uses secure hardware to verify blockchain transactions, ensuring they are tamper-proof and trustworthy. Learn more here.

Trusted Execution Environment

A Trusted Execution Environment (TEE) is a secure processor area protecting code and data integrity. Learn more here.

USDC

A stablecoin pegged to the United States dollar that is issued and managed by Circle.

Verax

An on-chain attestation registry that lets developers verify Proof of Machinehood attestations, ensuring trusted device authenticity.

Verifiable Computing

A cryptographic method that allows users to confirm the accuracy and integrity of computations performed by third parties.

Wallet

A tool that stores digital assets and secures private keys, enabling users to send, receive, and manage cryptocurrencies.

Web3

A decentralized internet model where users control their data, access services directly, and interact via blockchain technologies.

X.509 Certificate

A digital document that verifies the identity of entities, enabling secure communication through encryption and authentication.

Zero Knowledge Proofs

A cryptographic tool that enables one party to prove a statement is true to another without revealing any extra details.

Zero Knowledge Rollup

A Layer 2 blockchain solution that uses cryptographic proofs to securely verify and bundle transactions off-chain.

© 2023 Goodspeed. All rights reserved.

© 2023 Goodspeed. All rights reserved.