Any commercially available cryptocurrency that is not Bitcoin (BTC).
Which stands for "alternative finance". ALTFI confines various funding models, including crowdfunding, peer-to-peer lending, ICOs, STOs, and DeFi. It is based on blockchain technology, which enables transactions to occur without an intermediary.
Decentralized Applications (dApps)
Digital applications that run on a peer-to-peer blockchain network, rather than centralized servers. They are built for various reasons, such as finance, gaming, medicine, education, file storage or even social media.
The smallest denomination of Bitcoin, named after Bitcoin’s creator – Satoshi Nakamoto.
Direct exchange of assets (for example, cryptocurrencies) between two individual parties without any central authority, such as a bank, involved.
Know Your Customer (KYC)
A protective measure to verify a customer's identity. KYC forms part of compliance and risk management programs, helps mitigate financial risks, and ensures compliance with relevant anti-money laundering regulations.
DCA is a type of investment strategy that involves investing a fixed amount of money regularly, regardless of the current price.
Decentralized Autonomous Initial Coin Offering is an innovative model for raising funds from investors for blockchain projects. It represents a type of Ethereum-based smart contract that incorporates characteristics of both DAOs and ICOs while creating a more transparent and secure space for investors.
An investment practice often used by traders who wish to earn profit from the difference between an asset's buy and sell price in a brief period - specifically within a few hours or even minutes.
Private blockchain-based platform developed by the R3 consortium, designed for the finance and business sectors, which require secure transmission and storage of transaction information.
An open-source protocol, allowing real-world assets to be represented as tokens that can be further stored or exchanged using the blockchain.
Function used to encrypt specific data via cipher algorithms. Ciphers use data conversion methods to protect data from unauthorized access, and their structure, based on complex mathematical calculations, ensures resistance to cracking.