Home Blog Glossary

Glossary

The most important terms related to blockchain and cryptocurrencies

AJAX progress indicator
  • a

  • An account or profile that is a set of data and information about a user, business or entity that allows interaction with a system, service or platform. An account can be created for a variety of purposes, including access to websites, applications, social networks, email, financial services(...)

  • The only user with the highest privileges and authority in the BitHide system. It has unlimited access to all system resources and functions and can perform any task, including managing users, installing software updates, changing security settings, and much more. The superuser plays a key(...)

  • A set of methods, functions and rules that enable interaction between different software components. An application programming interface defines how developers can use the functionality or data provided by other programs or services. This allows you to effectively integrate and interact with(...)

  • Software designed to perform specific tasks or provide specific functionality on computers, mobile devices, or other platforms. Applications provide the user with an interface through which they can interact with the program and use its capabilities. Applications can range from simple ones(...)

  • Resources possessed by an organization, person or legal entity that have economic value. These resources can be used to generate income in the future. Assets include anything that has value and can be controlled. This can include financial assets such as cash in accounts, investments and(...)

  • The process of verifying the authenticity or identification of a user, device, or system to ensure that the credentials or identification provided are correct and as expected. This process ensures security and protection of access to systems, data or resources, preventing unauthorized access.(...)

  • Includes granting certain access rights after successful authentication. This allows the system to determine what actions, operations, and resources are available to a particular user. The combination of authentication and authorization provides secure access control in information systems(...)

  • A feature that allows users to automate the process of transferring funds from one wallet or account to other wallets or accounts. This feature can be configured according to specified parameters such as amount, frequency and recipient addresses. Automatic withdrawals provide convenience and(...)

  • b

  • Information or comments transmitted from one participant or system to another in response to actions, statements, or results. It plays an important role in information exchange and communication in various situations, enabling interaction, correction and shared understanding. Feedback can be(...)

  • A copy of data, files, software or other information created to ensure the safety and recovery of data in the event of loss, damage or untoward events. Backups are used to ensure data security and minimize losses in the event of failures, accidents or other unforeseen situations. Creating(...)

  • One of the most famous and popular cryptocurrencies in the world. Thanks to its innovative blockchain technology and decentralized nature, Bitcoin offers users the ability to conduct anonymous and secure financial transactions. The virtual currency Bitcoin allows network participants to make(...)

  • A specialized service that provides businesses with the opportunity to accept payments in cryptocurrency for their goods or services. This gateway acts as an intermediary, facilitating secure and efficient transactions between the buyer, seller and the blockchain network. The payment gateway(...)

  • A decentralized system that uses blockchain technology to record and store transactions or other data. A blockchain system consists of participants, called nodes, who collaborate to maintain and update the distributed ledger. Each transaction or record on the blockchain is cryptographically(...)

  • Decentralized and distributed technology, which is a chain (chain) of blocks in which data is recorded and stored with a high degree of reliability and without the possibility of changing it. Blockchain was originally created to support cryptocurrencies such as Bitcoin, where each block(...)

  • The date and time that a specific transaction was completed and recorded on the blockchain. This timing information is recorded in the block in which the transaction is included, and it indicates the exact time that the transaction event occurred. Such a mark is important for tracking the(...)

  • c

  • Temporary storage of data or information that can be quickly accessed for later use. Caching is used to improve system performance by reducing data access time. This is achieved by preloading the most frequently used or likely data into the cache. When the system needs to access data, it(...)

  • A mechanism in programming and software development that allows a function or handler to be passed as an argument to another function. This mechanism is used for feedback and asynchronous event processing. Callbacks allow you to define what should happen after a certain operation or event is(...)

  • An integral part of the mechanism for receiving notifications about transactions on the wallet. This important tool allows online services to automatically receive information about changes in the wallet balance in real time. When a payment is received on the wallet or another event occurs,(...)

  • A control in a user interface that allows the user to select or deselect a specific option or option. It is usually presented in the form of a square or rectangle with a marker inside. When a checkbox is checked, it means the option is activated, and when it is not selected, the option is not(...)

  • Method of abbreviated recording of IP addresses and address space management in IPv4 networks. Instead of using traditional classful addressing such as Class A, B, C, and so on, CIDR provides a more flexible ability to split and distribute IP addresses. This method makes more efficient use of(...)

  • A unique code, number, or character sequence that is used to uniquely identify a specific customer in a system, database, or other context. This identifier allows the system to differentiate between different clients and enables the management and tracking of information associated with each(...)

  • The amount of money that is held or used as payment for a particular transaction. Fees may vary depending on the type of transaction, platform or system, and terms of the transaction. These may include factors such as processing fees, network transfers, infrastructure usage, or additional(...)

  • The process of converting a program's source code, written in a programming language, into machine code or other low-level code that a computer can understand and execute. Compilation is one of the key steps in software development. Compilation results in an executable file that can be run on(...)

  • A custom description or label that a user can assign to their crypto address in order to more easily identify it or remember its purpose. This is a kind of “tag” or “name” that a user can attach to their address in a cryptocurrency wallet. The label helps make it easier to manage your(...)

  • A unique string of characters used to identify the destination for cryptocurrency transactions. A unique string of characters used to identify the destination for cryptocurrency transactions. A crypto address allows the sender and recipient to interact on the blockchain network and securely(...)

  • A software or hardware solution designed to store, send and receive cryptocurrencies. A crypto wallet allows users to manage their cryptocurrency assets, similar to how a bank wallet allows them to manage fiat money. This tool provides access to cryptocurrency funds by providing unique(...)

  • A term used to refer to digital assets that function as decentralized digital currencies on blockchain technology. Cryptocoins are a digital form of money that can be used to make payments, transfers and other financial transactions over the Internet. They are a key part of the cryptocurrency(...)

  • A digital or virtual form of money based on blockchain technology and cryptography. It is a type of decentralized digital currency that uses cryptography to secure transactions and control the creation of new units. Cryptocurrencies operate on decentralized networks, such as blockchain, and(...)

  • A software system or service designed to process electronic payments using cryptocurrencies. It provides connections between online stores, online platforms or other businesses and blockchain networks, allowing customers to pay for goods and services using various cryptocurrencies. Crypto(...)

  • The science and art of ensuring the confidentiality, integrity and authentication of information through the use of various encryption and decryption methods and techniques. It plays an important role in ensuring the security of data and communications in the digital world. Cryptography(...)

  • d

  • The combined encryption system is a combination of two methods of ensuring privacy and security on the network - TOR (The Onion Router) and VPN (Virtual Private Network). This combination allows you to combine the advantages of both technologies, in order to reduce their disadvantages and(...)

  • The process of reconciling and updating information between different devices, systems, or applications to ensure data is current and consistent. This process ensures that all participants have access to the latest versions of the data and are working with the same set of information. Data(...)

  • An organized collection of data that is stored and managed using specialized software. Databases are designed to store, organize, manage and retrieve data to enable efficient access and processing of information. They provide a structured and centralized way to store data, allowing users to(...)

  • A unique set of characteristics and parameters of a device that can be used to identify and track it. A device fingerprint is created based on various characteristics of the device and its environment, such as operating system, browser, screen resolution, time zone, language settings and(...)

  • Popular cloud service for data storage and file synchronization. It provides users with the ability to download, store and share files over the Internet. Dropbox allows you to access these files from different devices such as computers, smartphones, and tablets. Users can create public and(...)

  • e

  • A set of mathematical and algorithmic techniques used to protect information by converting it into an unreadable format called a cipher to prevent unauthorized access or reading of the data. Encryption plays an important role in ensuring data privacy and security, especially in areas where(...)

  • f

  • The smooth and continuous flow of data, information, or processes between different components, systems, or applications. It involves efficient and seamless interaction between various elements within complex systems. Flow integration ensures the synchronous movement of data or operations,(...)

  • g

  • A fee charged for transferring USDT cryptocurrency (Tronix token) between network participants. Since USDT is based on the Tron blockchain, each USDT transaction requires the execution of a smart contract. Smart contracts are programs that run on the blockchain and describe the logic of a(...)

  • A special address in TRX from which a commission is taken to pay for gas and activate USDT addresses. On a blockchain, transactions require certain computing resources to execute, and gas acts as a measure of these resources. The user initiating the transaction can specify the amount of gas(...)

  • i

  • The main structure and organization that ensures the functioning and development of any system, organization, city or region. Infrastructure includes a variety of physical and technical components, as well as services, necessary to support normal operations and provide services. This may(...)

  • A program or utility designed to simplify the process of installing and configuring software on a computer or other device. Installers usually provide a user-friendly interface that allows users to select installation options, specify installation paths, enter settings, etc. This allows users(...)

  • The process of combining different components, systems, or technologies into a single work together to achieve specific goals or functionality. Integration can be applied in different areas such as information technology, business processes, social systems and much more. It allows you to(...)

  • A numeric identifier assigned to each device connected to the Internet or local TCP/IP network. An IP address is used to locate and address a device on a network, allowing devices to communicate. An IP address allows you to identify a specific device on a network, as well as route data to and(...)

  • l

  • A file in which systems, applications, operating systems, and other programs record information about events, actions, and operating status. These files are intended for monitoring, debugging, analyzing and solving problems related to the operation of the software and the system as a whole.

  • m

  • A business organization or person that provides goods or services and accepts payments from customers. The merchant uses a variety of payment methods such as credit and debit cards, electronic payments and others to process payments from its customers. They can integrate payment gateways and(...)

  • Blockchain network participants who perform the mining process. Mining involves validating and confirming transactions, adding them to blocks, and securing the network. Miners use the computing power of their devices to solve complex cryptographic problems, allowing them to create new blocks(...)

  • A set of 24 random words that are used to restore access to a cryptocurrency wallet in case of loss, damage to the device, or forgetting the password. This phrase is a convenient and secure way to regain access to a wallet, as it can be used to recreate all private keys and addresses(...)

  • Functionality that allows you to add multiple users and regulate their access to the crypto payment gateway and merchants. In this system, each user is assigned a unique login and password, as well as certain access rights to functions and merchants.

  • A mechanism that greatly simplifies the process of managing your finances and allows you to distribute your funds more efficiently. The multimerchant system allows you to create separate wallets for different purposes, providing convenience and flexibility in managing your funds.

  • n

  • Additional information or comment that the user can attach to his crypto address for the purpose of conveniently managing his transactions and funds. This text may contain a description of the address's purpose or any other information that helps identify the address or its use. A crypto(...)

  • o

  • A service or service provided through the Internet or online environment. Online services allow users to access certain features, resources, or capabilities without the need for a physical presence. This may include websites, applications and other digital platforms that enable communication,(...)

  • p

  • A method of organizing content or data on web pages or applications that breaks large amounts of information into smaller pieces (pages) for ease of navigation and viewing. This method allows users to navigate through different parts of the content without downloading all the data at once.(...)

  • A virtual space on a website or application intended for individual users. Here users can manage their data, settings, activities and access to various features or services. The Personal Account provides the user with a personalized experience on the platform, allowing them to manage their(...)

  • A numeric password that is used to authenticate and confirm a user's identity across various systems and devices. A PIN typically consists of four or more digits and is used to protect access to personal data and resources. This password is used to verify user identification and secure access(...)

  • A framework or basic set of infrastructure components that provides an environment for development, interaction, provision of services, creation of applications, or other activities. A platform can be software, hardware, or a combination of both, and it provides a set of tools and services to(...)

  • An intermediate server that acts as an intermediary between the client device and the target server. Used for a variety of purposes, including enhancing security, providing anonymity, data caching, and access control. Proxy servers are a key element of the network infrastructure, allowing you(...)

  • Part of a cryptographic key pair used in asymmetric cryptographic systems such as cryptocurrencies. It is used for security, authentication and data encryption. The public key is distributed openly and is available to all users. In a key pair, the public key matches the private key, and data(...)

  • q

  • A two-dimensional matrix barcode, which is a square matrix of black and white modules (cells) that encode information. QR codes were developed by Denso Wave in Japan in 1994 and have become popular due to their fast reading speed and ability to store large amounts of information. They are(...)

  • s

  • One of the most important elements that ensures the security of user funds. It is used to sign transactions and protect against unauthorized access to the wallet. The private key is part of a cryptographic key pair in asymmetric cryptography, where the key pair consists of a private key and a(...)

  • The name of the wallet to which the transaction belongs. This is a unique identifier of the wallet from which funds are sent as part of a specific transaction. The sender wallet identifies the source of funds involved in a transaction and can be used to track and audit financial transactions.

  • A unique identifier of the wallet from which the cryptocurrency is sent. This address can be your own wallet or another user's address if funds were sent to you. The originating crypto address identifies the source of the transaction and indicates where the crypto funds are coming from. This(...)

  • A computer or program that provides certain services, resources, or functionality to other computers, devices, or programs, called clients. Servers play an important role in distributed systems by providing access to data, processing requests, and performing various tasks. They can provide a(...)

  • A unique identifier or network address that is used to determine the location and access of a server on a network. This address allows you to identify the server in the context of the network infrastructure and determine where the server can be found and how to contact it. The server address(...)

  • The temporary period of user activity on a website, application, or system, starting when the user is authenticated and ending when the user ends the activity or logs out. During a session, the user can interact with various functions, resources and data, perform operations, view information,(...)

  • A computer protocol that is self-executing code that automatically executes and manages the execution of a contract between participants when certain conditions are met. The main idea of smart contracts is that they provide automatic and decentralized execution of agreements, without the need(...)

  • The user or administrator who initiated the data or resource synchronization process. Synchronization can include updating information, reconciling data between different devices or systems, and ensuring data is current and consistent. The synchronization initiator starts this process to(...)

  • t

  • A stable digital currency pegged to the US dollar. This ensures reliability and stability, making Tether USD (Tron) an ideal choice for users who are looking to conduct transactions with minimal risk and maintain the stability of their funds. This cryptocurrency is based on the Tron(...)

  • Software and network that provides anonymous and private access to the Internet. The basic principle of Tor is that it routes traffic through multiple nodes known as onion nodes. This creates a layered structure similar to an onion, hence the name Onion Router. Each node encrypts information(...)

  • The amount of currency that is actually transferred from the sender to the recipient as a result of a transaction, minus any fees or charges that may be charged for processing the transaction. This amount represents the principal amount of the transfer that will be available to the recipient(...)

  • The amount of currency, including fees, that is transferred from the sender to the recipient as a result of a transaction. This amount includes both the main transfer amount and additional fees that may be charged for processing the transaction on the platform or blockchain. Accounting for(...)

  • The user, administrator, or auto-withdrawal who made a specific transaction. In the case of the transaction type "Receipt", the initiator is always the user, and the user's email is used for identification. While for the transaction type "Withdrawal", the initiator can be the administrator(...)

  • A unique link that allows you to view details and information about a specific transaction on the cryptocurrency blockchain. This is often a URL or hash code that can be entered into a blockchain explorer (a tool for viewing blockchain transactions) to obtain transaction details. Such a link(...)

  • The currency of the Tron platform, which provides the ability to create and use decentralized applications. Tronix provides fast and reliable transactions, allowing users to interact with the Tron ecosystem. Tronix currency is used to pay for internal transactions, purchase goods and services(...)

  • A method of providing an additional level of security when logging into a system. It requires not only the provision of credentials (usually a username and password), but also an additional verification factor. This additional factor could be something the user knows (a password), something(...)

  • u

  • A physical or virtual person who interacts with a system, program, application, device, or service to obtain certain functionality, access information, or perform certain tasks. The user can be a person, or another program, system, or device. User interaction with technical systems may(...)

  • v

  • A technology that creates an encrypted and secure connection between your device and a remote server. This allows you to exchange data over the Internet while maintaining the privacy and security of your data. A virtual private network allows you to mask your IP address and encrypt your(...)

  • w

  • A collection of web pages and multimedia content available at a specific address on the Internet. Websites are used to present information, communicate, provide services, sell products and many other purposes. Depending on their functionality, websites can be static, presenting constant(...)

Got a question?

Ask them in the feedback form. A BitHide specialist will get back to you as soon as possible.