📓Dictionary

In this page you will find common words used by our protocol

CID (Content Identifier)

  • Definition: A label used in IPFS to uniquely address and securely verify content within the network. It is derived from the cryptographic hashing of the content.

  • Usage: CID is fundamental for retrieving and verifying the integrity of files in an IPFS network.

Client-Side

  • Definition: Refers to actions, processes, or computations occurring on the user's local computer or device rather than on a remote server.

  • Usage: Client-side encryption ensures that data is encrypted locally before being transmitted or uploaded to remote servers or networks.

Content Addressing

  • Definition: A method where content is accessed using a unique identifier derived from the content itself, often using cryptographic hashing.

  • Usage: Content addressing enhances the integrity and cache-ability of content in decentralized networks like IPFS.

Decentralization

Definition: Decentralization refers to the distribution and diversification of functions, powers, people, or things away from a central location or authority. In the context of technology and digital networks, decentralization often involves the distribution of resources, data, and functionality across multiple nodes or participants in a network, reducing the reliance on a single central point of control or failure.

Usage: Decentralization is a key concept in various fields such as blockchain technology, cryptocurrency, and distributed computing. In blockchain and cryptocurrency, for instance, decentralization ensures that no single entity can control the network, promoting security, resistance to censorship, and democratic participation. In broader technological contexts, it contributes to the resilience, reliability, and robustness of systems and networks, minimizing single points of failure and potential bottlenecks, thus making systems more resistant to faults and attacks.

Encryption

  • Definition: The process of converting information into a code to prevent unauthorized access.

  • Usage: Encryption is used to secure data, ensuring that it remains confidential and tamper-proof during storage and transmission.

Georedundancy

  • Definition: The practice of storing copies of data in multiple geographic locations to ensure continued service and data integrity in case of failure.

  • Usage: Georedundancy increases the reliability and availability of data in distributed networks.

Hash

  • Definition: The output produced by a cryptographic hashing algorithm, such as SHA-256, representing a unique fingerprint of input data.

  • Usage: Hashes are used in content identifiers and data integrity verification in IPFS and related technologies.

IPFS (InterPlanetary File System)

  • Definition: A peer-to-peer distributed file system that seeks to connect all computing devices with the same system of files.

  • Usage: IPFS allows for the decentralized storage and sharing of data, making the web faster, safer, and more open.

Redundancy

  • Definition: The duplication of data across multiple locations or devices to prevent data loss and enhance data availability and reliability.

  • Usage: Redundancy is a common practice in distributed networks to ensure data durability and availability.

SHA-256 (Secure Hash Algorithm 256-bit)

  • Definition: A cryptographic hash function that produces a fixed-size (256-bit) hash value, widely used for data integrity verification.

  • Usage: SHA-256 is commonly used in blockchain and cryptographic applications, including content addressing in IPFS.

Zero-Knowledge Proofs

  • Definition: Cryptographic methods allowing one party to prove to another that a statement is true, without revealing any specific information beyond the validity of the statement.

  • Usage: Zero-knowledge proofs can be used in decentralized networks for authentication and verification purposes without compromising user privacy.

Blockchain

  • Definition: A decentralized digital ledger that records transactions across many computers in a way that the registered transactions cannot be altered retroactively.

  • Usage: Blockchains serve as the foundational technology for cryptocurrencies and decentralized applications (DApps).

Client-Side Encryption

  • Definition: A process where data is encrypted on the client’s side (user’s device) before being transferred to a remote server for storage.

  • Usage: This ensures that the data remains secure during transmission and while stored remotely.

Smart Contracts

  • Definition: Self-executing contracts with the terms of the agreement directly written into code, which automatically execute actions when predefined conditions are met.

  • Usage: They are used in blockchain networks to automate and secure transactions, often without the need for intermediaries.

Web2 (Web 2.0)

  • Definition: Refers to the second stage in the evolution of the World Wide Web, characterized by the shift from static web pages to dynamic and shareable content and social networking.

  • Usage: Web2 has facilitated increased user interaction, data sharing, and collaboration online.

Web3 (Web 3.0)

  • Definition: The next evolution of the web, often associated with the decentralized, semantic, and intelligent web, enabling direct peer-to-peer interactions, often powered by blockchain technologies.

  • Usage: Web3 aims to create a more decentralized, secure, and intelligent internet, often incorporating blockchain and cryptographic technologies.

DApps (Decentralized Applications)

  • Definition: Applications that run on a decentralized network (often a blockchain), promoting secure, open, and resilient application structures.

  • Usage: DApps are commonly used in various decentralized networks, promoting trustless and secure application interactions.

Peer-to-Peer Network (P2P)

  • Definition: A network in which each computer can act as a client or server for the others, allowing shared access to files and peripherals without the need for a central server.

  • Usage: P2P networks form the backbone of decentralized systems like IPFS and blockchain technologies, promoting redundancy and resiliency.

Public/Private Keys

  • Definition: A pair of cryptographic keys used in asymmetric encryption algorithms. The public key is openly shared, while the private key remains confidential.

  • Usage: Public and private keys are fundamental in cryptographic operations, enabling secure communication, data integrity, and digital signatures.

Consensus Algorithm

  • Definition: A technique used to achieve agreement on a single data value among distributed processes or systems, used extensively in blockchain networks.

  • Usage: Consensus algorithms, like Proof of Work (PoW) and Proof of Stake (PoS), are crucial for ensuring data integrity and consistency in decentralized networks.

Cryptographic Hashing

  • Definition: A process used to convert input data of any size into a fixed-size value (hash), typically used for data integrity verification.

  • Usage: Hashing is central to various aspects of blockchain and cryptographic implementations, such as generating content identifiers and securing data.

Arweave

At its core, Arweave aims to solve the problem of long-term data preservation on the internet. By leveraging its blockweave technology, it ensures that data is not only stored securely and immutably but also remains accessible and retrievable over the long term. This is achieved through a mechanism that incentivizes network participants (miners) to store data permanently.

Key Features of Arweave include:

  • Permanence: Once data is uploaded to Arweave, it is stored forever without the need for ongoing fees or maintenance, making it an attractive option for archiving, historical records, and any application requiring long-term data availability.

  • Decentralization: Arweave operates on a distributed network, reducing reliance on any single point of failure and enhancing data security and availability.

  • Data Immutability: Similar to blockchain, data stored on Arweave cannot be altered or deleted, ensuring the integrity of the data over time.

  • Sustainability: The economic model of Arweave ensures that the initial endowment used to store data covers the cost of storage in perpetuity, leveraging advancements in storage efficiency.

  • Smart Contracts: Arweave supports smart contracts, enabling decentralized applications (dApps) to be built on top of its platform, further extending its functionality.

This structured glossary could be a helpful addition to the documentation in your understanding of our technology stack, aiding users in understanding crucial concepts related to decentralization and associated technologies.

Last updated