Compliance — Web3 Glossary
163 terms • Part of the Cointegrity Web3 Glossary
- 20th Package (EU Sanctions) — The 20th sanctions package, adopted by the European Union in April 2026, represents a fundamental...
- 21 Analytics — 21 Analytics is a compliance and regulatory technology platform designed specifically for...
- A7A5 (Stablecoin) — A7A5 is a centralised, Russian ruble-backed stablecoin issued by the Kyrgyzstani company Old Vector...
- Abacus Market — Abacus Market was a darknet marketplace that dominated Western darknet commerce through 2024 and...
- ADGM (Abu Dhabi Global Market) — The Abu Dhabi Global Market is an international financial free zone located in Abu Dhabi and...
- Adverse Media Screening — Adverse media screening is a compliance process that automatically checks customers, beneficial...
- Akira Group — Akira is a Ransomware-as-a-Service (RaaS) operation that emerged in March 2023 and had become one...
- Amazon Bedrock Agents — Amazon Bedrock Agents (architecturally known as the AgentCore runtime) is AWS's enterprise standard...
- AML (Anti-Money Laundering) — Anti-Money Laundering refers to the comprehensive regulatory framework and internal controls that...
- Andariel — Andariel (also tracked as Silent Chollima) is a sub-group of the Lazarus Group operating under the...
- Anti-Money Laundering Act — The Anti-Money Laundering Act (AML Act) is foundational legislation that mandates financial...
- Archetyp Market — Archetyp Market was one of the largest darknet marketplaces before its takedown by Europol in June...
- Arkham Intelligence — Arkham Intelligence is an on-chain investigation platform that de-anonymizes blockchain activity by...
- Asset Forfeiture — The legal process by which a government seizes assets connected to criminal activity, either...
- AudiA6 — AudiA6 is a cryptocurrency mixing service that operates exclusively on the Tor network, accessible...
- Audit (Blockchain or Smart Contract) — A blockchain or smart contract audit is a comprehensive security assessment conducted by...
- Auto-Shop (Darknet) — An auto-shop is a type of darknet marketplace that operates as a fully automated digital goods...
- Automatic Exchange of Information (AEOI) — Automatic Exchange of Information is a standardized international system where tax authorities...
- Bitzlato — Bitzlato was a cryptocurrency exchange platform that operated primarily in Russia and served as a...
- BlackSprut — BlackSprut is a major darknet marketplace that emerged as a successor to the notorious Hydra market...
- Blender.io / Sinbad.io — Blender.io, also known as Sinbad.io, was a prominent cryptocurrency mixing service that became one...
- Blockchain Analytics — Blockchain analytics refers to the specialized practice of examining and interpreting data stored...
- Blockchain Forensics — The discipline of investigating illicit or suspicious activity on public blockchains by tracing the...
- Blockpit — Blockpit is a European cryptocurrency tax and compliance software platform offering automated...
- BlueNoroff — BlueNoroff (also tracked as Stardust Chollima) is a specialised sub-group within the Lazarus Group...
- Bulletproof Hosting — Bulletproof hosting refers to web hosting services that are specifically marketed and operated to...
- catbit.io/ — catbit.io is a specialized cryptocurrency mixing service embedded within the Russian-language...
- CDD (Customer Due Diligence) — CDD is the foundational KYC process through which regulated financial institutions establish and...
- CFT (Countering Financing of Terrorism) — CFT encompasses specialized regulatory and operational measures designed to prevent terrorist...
- Chainalysis — Chainalysis is the leading blockchain analytics and compliance software platform providing...
- Chainalysis AI Agents — Chainalysis AI Agents are autonomous AI-powered investigative systems deployed by Chainalysis and...
- CipherTrace — CipherTrace is a cryptocurrency intelligence and blockchain analytics company that provides...
- Cl0p — Cl0p is a highly sophisticated and financially motivated ransomware group that has been active...
- ClickFix — ClickFix is a social engineering technique that saw mass adoption by threat groups including...
- Code to Custody (Human Layer Exploitation) — 'Code to Custody' describes the end-to-end attack chain developed and perfected by North Korea's...
- Cointegrity — Cointegrity is a specialized Web3 consultancy that bridges traditional business expertise with...
- CoinTracker — CoinTracker is a comprehensive cryptocurrency tax and portfolio tracking platform that aggregates...
- comcash.io/ru — comcash.io/ru is an obscure cryptocurrency mixer that deliberately maintains low visibility,...
- Common Reporting Standard (CRS) — The Common Reporting Standard is an OECD-developed international information exchange protocol that...
- Compliance Management System — A Compliance Management System is the formal set of internal policies, procedures, controls, and...
- Compliance Officer — A Compliance Officer is a certified professional, typically holding credentials such as CAMS...
- Compliance Theatre — Compliance theatre is the practice of performing the visible indicators of security and regulatory...
- ComplyAdvantage — ComplyAdvantage is an AI-powered compliance platform delivering real-time sanctions screening,...
- Conti — Conti was a prolific Russian-linked ransomware gang that operated as a dominant RaaS platform from...
- Cross-Chain Obfuscation — Cross-chain obfuscation (also called chain hopping) is an advanced money-laundering technique that...
- Crypto Mixer — A crypto mixer, also called a tumbler or mixing service, is a tool or service designed to obscure...
- Crypto-Asset Reporting Framework (CARF) — The Crypto-Asset Reporting Framework is an internationally coordinated tax transparency standard...
- Crypto-Asset Service Provider (CASP) — A Crypto-Asset Service Provider is any entity offering services related to cryptocurrencies or...
- Crypto-Crime Typologies — Crypto-crime typologies are the various methods and patterns used by criminals to launder money or...
- Cryptojacking — Cryptojacking is the unauthorized use of someone else's computing resources to mine cryptocurrency...
- Crystal Blockchain — Crystal Blockchain is an advanced cryptocurrency analytics platform that specializes in transaction...
- DAC8 (Directive on Administrative Cooperation 8) — DAC8, the eighth amendment to the EU's Directive on Administrative Cooperation, incorporates the...
- Dark Liquidity — In traditional financial markets, dark liquidity refers to institutional order flow that executes...
- Darknet Market (DNM) — A darknet market is an online marketplace accessible only through specialized anonymity networks...
- De-risking — De-risking refers to the practice of financial institutions or crypto businesses terminating...
- Dead Drop (Darknet) — A dead drop in the context of darknet markets refers to a physical delivery method where a vendor...
- DeFi Compliance — DeFi Compliance refers to the emerging framework of regulatory requirements and best practices...
- DEXs as Dark Nodes — Decentralised exchanges (DEXs) use automated smart contracts rather than a central corporate entity...
- Digital Asset Anti-Money Laundering Act 2025 — The Digital Asset Anti-Money Laundering Act 2025 is U.S. legislation that extends Bank Secrecy Act...
- Digital Ruble (CBDC Preemptive Ban) — The Digital Ruble is the Central Bank Digital Currency (CBDC) under development by the Central Bank...
- Divly — Divly is a Scandinavian-focused cryptocurrency tax and compliance platform specifically designed to...
- Dow Jones Risk & Compliance — Dow Jones Risk & Compliance is a comprehensive risk intelligence platform that provides...
- Drop Account — A drop account is a compromised, stolen, or fraudulently created cryptocurrency wallet or bank...
- EDD (Enhanced Due Diligence) — EDD represents an elevated tier of customer scrutiny applied when standard CDD identifies elevated...
- Elliptic — Elliptic is a comprehensive blockchain analytics and compliance solutions provider delivering...
- Enterprise Agent Studios — Enterprise Agent Studios refers to the certified agent-template marketplaces offered by major B2B...
- Enterprise Blokchain — This appears to be a typo for Enterprise Blockchain. Enterprise blockchain refers to the...
- EU Anti-Circumvention Tool — The EU Anti-Circumvention Tool is a diplomatic and financial enforcement mechanism first activated...
- Extortion-as-a-Service (EaaS) — Extortion-as-a-Service (EaaS) is a major structural evolution in the ransomware threat landscape in...
- FATF Recommendations — The FATF Recommendations are a set of 40 international standards that form the global framework for...
- Finalize Early (FE) — Finalize Early, abbreviated FE, is a darknet market transaction option that allows a buyer to...
- Financial Action Task Force (FATF) — The Financial Action Task Force is an intergovernmental organization established in 1989 by the G7...
- Garantex — Garantex was a Moscow-based cryptocurrency exchange and one of the world's most prolific high-risk...
- Gary Gensler — Gary Gensler served as Chairman of the U.S. Securities and Exchange Commission from 2021 to 2025,...
- Global Crypto Regulation Divergence — Global crypto regulation divergence refers to the wide variation in how different countries and...
- Hester Peirce — Hester Peirce is an SEC Commissioner known as "Crypto Mom" for her consistent pro-cryptocurrency...
- Hydra Market — Hydra Market was the largest darknet marketplace by transaction volume, operating on the Tor...
- Identity Verification — The process of confirming that a person or entity is who they claim to be, using a combination of...
- Initial Access Broker (IAB) — An Initial Access Broker is a cybercriminal specialist who infiltrates target networks, establishes...
- Institutional Custody — Institutional custody refers to enterprise-grade storage and management solutions designed to...
- Institutional DeFi — Institutional DeFi encompasses decentralized finance solutions specifically architected for...
- IT Worker Infiltration (Laptop Farms) — IT Worker Infiltration is a North Korean state-sponsored operation in which operatives use stolen...
- Joint Crypto Enforcement Task Force — The Joint Crypto Enforcement Task Force is a coordinated U.S. federal enforcement mechanism...
- Koinly — Koinly is a popular consumer-focused cryptocurrency tax software platform that automates the...
- Kryptosekken — Kryptosekken is a Norwegian-based cryptocurrency portfolio management and tax compliance platform...
- KYC (Know Your Customer) — Know Your Customer is a mandatory compliance process where financial institutions and...
- Lazarus Group (APT38) — The Lazarus Group (also designated APT38, Sapphire Sleet) is the overarching umbrella term for...
- License Passporting — License passporting is a regulatory mechanism that allows a company authorized as a Crypto-Asset...
- Markets in Crypto-Assets Regulation (MiCA) — MiCA is the European Union's first comprehensive regulatory framework specifically designed to...
- Mega Darknet Market — Mega is a major Russian-language darknet marketplace that rapidly expanded following Hydra Market's...
- Membership Service Provider (MSP) — A Membership Service Provider (MSP) is a component in permissioned blockchain frameworks,...
- Mule — An individual who knowingly or unknowingly facilitates money laundering by transferring illicit...
- Mule Account — A mule account is a cryptocurrency wallet or bank account created, controlled, or exploited by a...
- Multi-Extortion — Multi-extortion refers to the escalating hierarchy of coercive pressure tactics that ransomware and...
- National Competent Authorities (NCAs) — National Competent Authorities are designated regulatory bodies established by individual EU member...
- National Competent Authorities for AI — National Competent Authorities for AI are regulatory bodies designated by each European Union...
- Non-Compliant Transaction — A non-compliant transaction is one that violates the pre-defined rules or authorization protocols...
- Notabene — Notabene is a leading travel rule compliance platform enabling virtual asset service providers...
- Notarization on Blockchain — Notarization on blockchain leverages distributed ledger technology to create immutable, publicly...
- Obliged Entities — Obliged entities are businesses and organizations legally required to comply with anti-money...
- On-chain Forensics — On-chain forensics is the detailed technical and analytical examination of blockchain transaction...
- Operation Choke Point 2.0 — Operation Choke Point 2.0 is a term coined by crypto advocates to describe alleged coordinated...
- Paul Atkins — Paul Atkins is a former U.S. Securities and Exchange Commission (SEC) commissioner and prominent...
- Peel Chains — A peel chain is a money-laundering technique used by organised ransomware syndicates,...
- PEP (Politically Exposed Person) — A PEP is an individual holding or having recently held a prominent public office or high-ranking...
- PhantomCore — PhantomCore (also tracked as Head Mare and Fairy Trickster) is a politically motivated,...
- Proof of Personhood — Proof of Personhood (PoP) is a category of cryptographic and identity-verification systems designed...
- Proof-of-Developer (PoD) — Proof-of-Developer is a verification process designed to confirm the identity, credentials, and...
- Provenance — Provenance in blockchain refers to the complete, verifiable history and origin of a digital asset...
- Quantifind — Quantifind is an artificial intelligence-driven risk intelligence platform that leverages machine...
- RansomHub — RansomHub was the dominant ransomware operation in early 2025, operating as a...
- Reconnaissance General Bureau (RGB) — The Reconnaissance General Bureau is North Korea's primary intelligence and covert-operations...
- REDBIKE Ransomware — REDBIKE is a highly organised Ransomware-as-a-Service operation that emerged as the most frequently...
- Refinitiv — Refinitiv is a comprehensive financial data and analytics platform that has expanded into...
- Regulatory Compliance — Regulatory compliance in CeFi encompasses the operational processes, technology systems, and...
- Regulatory Compliance in Trading — Regulatory compliance in trading refers to cryptocurrency exchanges' and traders' adherence to...
- Regulatory Gray Areas — Regulatory gray areas encompass the ambiguous legal status of meme coin launch platforms and the...
- Regulatory Reporting — Regulatory Reporting refers to the mandatory submission of specified data and disclosures by...
- Regulatory Sandbox — A regulatory sandbox is a controlled testing environment created by financial authorities that...
- Regulatory Transition Period — A regulatory transition period is a defined grace window that permits existing cryptocurrency...
- Reporting Crypto-Asset Service Provider (RCASP) — A Reporting Crypto-Asset Service Provider is any entity that handles customer crypto assets or...
- Restricted Token — A restricted token is a digital asset subject to transfer limitations, vesting schedules, or...
- REvil (Sodinokibi) — REvil, also known as Sodinokibi, was an infamous Russian-linked ransomware operation notorious for...
- Right to Be Forgotten (RTbF) Risk — Right to Be Forgotten (RTbF) risk describes the fundamental conflict between the immutable nature...
- Risk Assessment — Risk assessment in the cryptocurrency compliance context is a structured, mandatory evaluation...
- Risk-based Approach — A risk-based approach is a compliance strategy where businesses systematically assess the money...
- Ross Ulbricht Pardon — The Ross Ulbricht pardon refers to the commutation of sentence issued by US President Donald Trump...
- Royal / BlackSuit — Royal, later rebranded as BlackSuit, is a ransomware operation believed to be operated by...
- RUBx — RUBx is a Russia-linked cryptographic asset designed to represent Russian fiat value on-chain and...
- SAB 121 Repeal — The SAB 121 Repeal refers to the rescission of SEC Staff Accounting Bulletin 121, which had...
- Salesforce Agentforce — Agentforce is Salesforce's enterprise platform for deploying a digital workforce of AI agents...
- Sanctions Screening — Sanctions screening is the practice of checking customers, transactions, and wallet addresses...
- SAR (Suspicious Activity Report) — A Suspicious Activity Report (SAR) is a formal document filed by financial institutions,...
- SEC — The Securities and Exchange Commission (SEC) is the primary federal regulatory agency responsible...
- Shyft Network — Shyft Network is a blockchain-native compliance infrastructure platform that embeds identity...
- Silk Road Seizure — The shutdown of the Silk Road, an infamous darknet marketplace, by the FBI in 2013. The platform...
- Source of Funds (SoF) — Source of Funds (SoF) is a verification process that documents and validates the origins of...
- Source of Wealth (SoW) — Source of Wealth (SoW) represents an enhanced due diligence process that extends beyond immediate...
- Stablecoin Freezing & Chain Hopping — Stablecoin freezing and chain hopping describes the cat-and-mouse laundering mechanic between...
- STYX Market — STYX Market is a dark web marketplace that emerged prominently in 2023 and remained active through...
- Supply Chain Attack (DeFi) — A DeFi supply chain attack targets the software development infrastructure surrounding a protocol —...
- Sybil Attack — A Sybil attack occurs when a single malicious entity creates and controls multiple fake identities...
- Sygna Bridge — Sygna Bridge is a global travel rule compliance network connecting virtual asset service providers...
- TaxBit — TaxBit is an enterprise-grade cryptocurrency tax and accounting software platform that automates...
- Threat Actor — A threat actor is any individual, group, state-sponsored organization, or automated system with the...
- TokenSpot (and Meer) — TokenSpot and Meer are cryptocurrency exchanges registered in Kyrgyzstan that function as offshore...
- TorZon Market — TorZon Market is a darknet marketplace operating on the Tor network that emerged in 2022 and rose...
- Traceability of Transfers Regulation (TFR) — The Traceability of Transfers Regulation (TFR), formally EU Regulation 2023/1113, is European...
- Transaction Monitoring — Transaction monitoring is the continuous, real-time or near-real-time analysis of cryptocurrency...
- Travel Rule — The Travel Rule is a global anti-money laundering regulation recommended by the Financial Action...
- TRM Labs — TRM Labs is a real-time blockchain intelligence platform specializing in advanced risk assessment,...
- Trusting Stamping Authority — A decentralized, blockchain-based authority that provides cryptographic timestamping services to...
- UAE Capital Markets Authority — The UAE Capital Markets Authority is a federal public authority established by Federal Decree-Law...
- UBO (Ultimate Beneficial Owner) — The Ultimate Beneficial Owner is the natural person or persons who ultimately own, control, or...
- VARA (Virtual Assets Regulatory Authority) — The Virtual Assets Regulatory Authority is Dubai's independent regulator for virtual assets,...
- VASP (Virtual Asset Service Provider) — A VASP is any legal entity or natural person engaged in the transfer, exchange, custody, or...
- Vendor Bond — A vendor bond is a refundable or non-refundable deposit of cryptocurrency that darknet market...
- Verifiable Credentials — A W3C open standard for digitally signed attestations about a subject, structured so that the...
- Vulnerability Chaining — Vulnerability chaining is the practice of combining multiple individual security flaws — each of...
- Wallet Labels — Human-readable tags or annotations attached to blockchain wallet addresses in analytics platforms,...
- Wallet Screening — Wallet screening is the process of checking cryptocurrency wallet addresses against databases of...
- WeTheNorth Market — WeTheNorth (WTN) is a Canadian-focused darknet marketplace that operates on the Tor network and has...
- Wrench Attack — A wrench attack is a form of physical coercion in which attackers use threats, violence,...
Browse all 2,062+ Web3 terms or speak to a consultant for expert guidance.