Privacy Technology — Web3 Glossary
124 terms • Part of the Cointegrity Web3 Glossary
- Abacus Market — Abacus Market was a darknet marketplace that dominated Western darknet commerce through 2024 and...
- Anonymity Enhanced Coins (AECs) — Anonymity Enhanced Coins represent a class of cryptocurrencies specifically engineered to obscure...
- Anonymous Credentials — Anonymous Credentials are cryptographic systems that allow individuals to prove possession of...
- Anonymous Voting — Anonymous voting on blockchain refers to voting systems that preserve voter privacy while ensuring...
- AudiA6 — AudiA6 is a cryptocurrency mixing service that operates exclusively on the Tor network, accessible...
- Auto-Shop (Darknet) — An auto-shop is a type of darknet marketplace that operates as a fully automated digital goods...
- Aztec Network — Aztec Network is a privacy-focused Layer-2 solution built on Ethereum that enables private smart...
- Biometric Authentication — The use of physiological or behavioral characteristics to verify that a user is who they claim to...
- Biometric Verification — The use of unique biological characteristics to confirm a person's identity, replacing or...
- Blender.io / Sinbad.io — Blender.io, also known as Sinbad.io, was a prominent cryptocurrency mixing service that became one...
- Blind Signatures — Blind Signatures are digital signature schemes where a signer creates a cryptographic signature on...
- Boneh-Lynn-Shacham (BLS) Signature — BLS signatures are a cryptographic signature scheme based on elliptic curve pairings that enable...
- Bulletproof Hosting — Bulletproof hosting refers to web hosting services that are specifically marketed and operated to...
- Bulletproofs — Bulletproofs are a zero-knowledge proof protocol designed to efficiently prove that a committed...
- catbit.io/ — catbit.io is a specialized cryptocurrency mixing service embedded within the Russian-language...
- Chaffing — Chaffing is a cryptographic technique that enhances communication security by embedding authentic...
- Change Address — A change address is a new cryptocurrency address automatically generated by a wallet when sending...
- Cipher — A cipher is a mathematical algorithm that transforms plaintext data into ciphertext through a...
- Coin Mixing Protocols — Coin mixing protocols are decentralized mechanisms that combine cryptocurrency transactions from...
- CoinJoin — CoinJoin is a privacy-enhancing technique that consolidates multiple transactions from different...
- CoinMixer — A CoinMixer is a privacy-enhancing service that combines a user's cryptocurrency with funds from...
- comcash.io/ru — comcash.io/ru is an obscure cryptocurrency mixer that deliberately maintains low visibility,...
- Commit-Reveal Schemes — Commit-reveal schemes are two-phase cryptographic protocols in smart contracts that separate...
- Commitment Schemes — Commitment schemes are cryptographic protocols enabling one party to commit to a value while...
- Confidential Computing — Confidential computing protects sensitive data even while it's being processed, using...
- Confidential Transactions — Confidential transactions are a cryptographic method that hides the amounts being transferred in a...
- Crypto Mixer — A crypto mixer, also called a tumbler or mixing service, is a tool or service designed to obscure...
- Crypto-Crime Typologies — Crypto-crime typologies are the various methods and patterns used by criminals to launder money or...
- Cryptographic Hash Function — A cryptographic hash function is a mathematical algorithm that transforms input data of any size...
- Cryptography — The mathematical science of securing information through encoding and decryption techniques,...
- Dash (DASH) — Dash is a cryptocurrency offering privacy through PrivateSend, an optional mixing feature that uses...
- Data Re-encryption for NFTs — Data Re-encryption for NFTs is a cryptographic process introduced in ERC-7857 that automatically...
- Data Sovereignty Tokens — Data Sovereignty Tokens are cryptocurrencies that enable individuals to maintain ownership and...
- Dead Drop (Darknet) — A dead drop in the context of darknet markets refers to a physical delivery method where a vendor...
- Decentralized Identity (DID) — Decentralized Identity refers to blockchain-based identity systems that enable individuals to...
- Decentralized VPN Networks — Decentralized VPN networks are blockchain-based systems where users share their internet...
- Decentralized VPN Protocols — Decentralized VPN protocols are blockchain-based systems that provide internet privacy and...
- Decoy Transactions — Decoy transactions are dummy or fake transactions intentionally broadcast alongside genuine...
- Decryption — Decryption is the computational process of converting encrypted ciphertext back into plaintext...
- Differential Privacy — Differential privacy is a mathematical framework that quantifies and limits privacy loss when...
- Digest Access Authentication — Digest Access Authentication is an HTTP authentication protocol that enhances security by...
- Digital Signature Algorithm (DSA) — The Digital Signature Algorithm is a federally standardized cryptographic method for creating and...
- Dox — Doxing refers to the malicious practice of researching and publicly revealing someone's real...
- Dread Forum — Dread is a Tor-based online forum and discussion platform that functions as the primary community...
- Encrypted Mempools — Encrypted mempools are transaction pools where pending transactions remain encrypted until they is...
- Entropy — In cryptography, entropy measures the degree of randomness and unpredictability present in data...
- Federated Learning — Federated learning is a machine learning approach that trains algorithms across multiple...
- Federated Learning on Blockchain — Federated learning on blockchain is a machine learning approach that trains AI models across...
- Fully Homomorphic Encryption — Fully homomorphic encryption (FHE) is a cryptographic technique that enables computations to be...
- Hash — The fixed-length output produced by applying a cryptographic hash function to data of any size—a...
- Homomorphic Encryption — Homomorphic encryption is an advanced cryptographic technique that allows mathematical operations...
- I2P (Invisible Internet Project) — The Invisible Internet Project, commonly known as I2P, is an anonymous overlay network and...
- Keccak-256 — Keccak-256 is the cryptographic hash function used throughout the Ethereum protocol for generating...
- Key Derivation Function — A Key Derivation Function (KDF) is a cryptographic algorithm that transforms a master secret,...
- Leaf Node — A leaf node is a terminal node in a Merkle Tree that sits at the lowest level and directly contains...
- Linea — Linea is a zero-knowledge Ethereum Virtual Machine (zkEVM) Layer-2 scaling solution developed by...
- Merkle proof — A Merkle proof is a cryptographic technique that allows someone to efficiently prove that a...
- Metadata Privacy — Metadata privacy refers to the protection of transaction-associated information including...
- Mimblewimble — Mimblewimble is a blockchain protocol designed to enhance privacy and scalability by implementing...
- MimbleWimble — MimbleWimble is an alternative blockchain protocol design that fundamentally reimagines transaction...
- Mina Protocol — Mina Protocol is a lightweight blockchain designed to maintain a constant size of approximately 22...
- Mixers and Tumblers — Mixers and tumblers are services that enhance cryptocurrency privacy by combining funds from...
- Monero (XMR) — Monero is a privacy-focused cryptocurrency that prioritizes financial anonymity through three core...
- Oblivious Transfer — Oblivious Transfer is a foundational cryptographic protocol where a sender possesses multiple...
- On-chain Attestations — Cryptographically signed, verifiable claims stored on a blockchain that assert some fact about an...
- Open Transactions Project — The Open Transactions Project is a collaborative, open-source software framework designed to create...
- Portable Identity — A digital identity model in which a user's profile, social graph, content history, and reputation...
- Privacy Coins — Privacy coins are cryptocurrencies specifically designed to obscure transaction details such as...
- Privacy Regulation Compliance — Privacy regulation compliance frameworks enable blockchain and Web3 systems to operate within legal...
- Privacy-enhancing Technologies — Privacy-enhancing technologies (PETs) are advanced cryptographic and computational techniques that...
- Privacy-Preserving Analytics — Privacy-preserving analytics encompasses techniques that allow organizations to perform data...
- Privacy-Preserving Oracles — Privacy-preserving oracles are external data providers that supply information to smart contracts...
- Private Cross-Chain Bridges — Private cross-chain bridges are protocols that enable the transfer of digital assets between...
- Private DAOs — Private DAOs are decentralized autonomous organizations that implement privacy-preserving...
- Private Information Retrieval (PIR) — Private Information Retrieval is a cryptographic protocol that enables users to query a database...
- Private Key Recovery — Private key recovery refers to cryptographic methods that enable users to regain access to their...
- Private Membership Proofs — Private membership proofs are cryptographic techniques that enable users to prove they belong to a...
- Private Smart Contracts — Private smart contracts are self-executing agreements deployed on blockchain networks where the...
- Proof of Personhood — Proof of Personhood (PoP) is a category of cryptographic and identity-verification systems designed...
- Proof-of-Immutability (PoIM) — Proof-of-Immutability is a blockchain system architecture designed to guarantee data permanence and...
- Pseudo-Anonimity — A state of partial anonymity where a user's identity is masked by a pseudonym, such as a wallet...
- Public Key Cryptography — Public key cryptography is a fundamental cryptographic system that uses mathematically linked pairs...
- Public-Key Cryptography — Public-key cryptography is an asymmetric encryption system using mathematically linked key pairs: a...
- Quantum-Proof — Quantum-proof cryptography refers to cryptographic algorithms designed to resist attacks from both...
- Quantum-resistant Encryption — Quantum-resistant encryption encompasses cryptographic algorithms designed to remain secure against...
- Randomness — Randomness is a critical component in proof-of-stake blockchains that ensures fair validator...
- Right to Be Forgotten (RTbF) Risk — Right to Be Forgotten (RTbF) risk describes the fundamental conflict between the immutable nature...
- Ring CT (Confidential Transactions) — Ring Confidential Transactions (Ring CT) is a privacy feature that combines ring signatures with...
- Ring Signature — A cryptographic signature technique that allows a sender to digitally sign a transaction on behalf...
- Ring Signatures — Ring signatures are a cryptographic technique that allows any member of a group to create a digital...
- Schnorr Signatures — Schnorr signatures are a cryptographic digital signature scheme celebrated for their mathematical...
- Scroll — Scroll is a native zkEVM Layer-2 blockchain engineered specifically for maximum compatibility with...
- Scrypt — Scrypt is a memory-hard, password-based key derivation function designed to resist brute-force...
- Secure Multi-Party Computation (SMPC) — Secure multi-party computation is a cryptographic protocol that allows multiple independent parties...
- Selective Disclosure — Selective disclosure is a privacy technique that enables users to prove specific claims or reveal...
- Self-Sovereign Identity (SSI) — Self-sovereign identity is a digital identity model where individuals own, control, and manage...
- SHA-256 — SHA-256 (Secure Hash Algorithm 256-bit) is a cryptographic hash function that produces a fixed...
- Shamir's Secret Sharing — Shamir's Secret Sharing is an advanced cryptographic technique that divides a sensitive...
- Shielded Transaction — A shielded transaction is a privacy-preserving transaction method that encrypts sensitive...
- SPL Token-2022 — SPL Token-2022 is an enhanced version of Solana's SPL token standard that introduces advanced...
- STARK — A STARK (Scalable Transparent Argument of Knowledge) is a type of zero-knowledge proof that allows...
- Stealth Addresses — Stealth addresses are a privacy mechanism that generates unique, unlinkable addresses for each...
- Sybil Resistance — A system property describing its ability to prevent or detect Sybil attacks, in which a single...
- Taproot — Taproot is a major Bitcoin protocol upgrade that was activated on November 16, 2021, substantially...
- Threshold Signatures — Threshold signatures are cryptographic signing schemes where no single party possesses a complete...
- Tor Integration — Tor Integration refers to incorporating the Tor network—The Onion Router—with blockchain...
- Tor Network (The Onion Router) — The Tor Network is a decentralized communication infrastructure that enables anonymous internet...
- TorZon Market — TorZon Market is a darknet marketplace operating on the Tor network that emerged in 2022 and rose...
- Transaction Privacy — The degree to which the details of blockchain transactions—sender identity, recipient identity,...
- Validity Proofs — Validity proofs are cryptographic constructions that mathematically verify the correctness of...
- Verifiable Credentials — A W3C open standard for digitally signed attestations about a subject, structured so that the...
- Verifiable Random Function — A Verifiable Random Function (VRF) is a cryptographic primitive that generates random-looking...
- WeTheNorth Market — WeTheNorth (WTN) is a Canadian-focused darknet marketplace that operates on the Tor network and has...
- Worldcoin / World ID — Worldcoin is a cryptocurrency and proof-of-personhood project co-founded by Sam Altman that uses...
- Zcash (ZEC) — Zcash is a privacy-focused cryptocurrency that employs zero-knowledge proofs, specifically...
- Zero-Knowledge Bridges — Zero-knowledge bridges use cryptographic proofs called zero-knowledge proofs (ZK proofs) to verify...
- Zero-Knowledge Identity — Zero-knowledge identity systems enable users to prove specific attributes or credentials about...
- Zero-Knowledge Proofs — Zero-knowledge proofs are cryptographic protocols that enable one party to mathematically prove the...
- Zero-Knowledge Proofs (ZKPs) — Zero-knowledge proofs are cryptographic techniques that enable one party to mathematically prove to...
- Zero-Knowledge Rollups (ZK-Rollups) — Zero-knowledge rollups are Layer 2 solutions that generate cryptographic proofs demonstrating the...
- zk-SNARKs — Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge are cryptographic proofs that allow...
- zk-STARKs — Zero-Knowledge Scalable Transparent Arguments of Knowledge are zero-knowledge proofs that provide...
- zkEVM — A zero-knowledge Ethereum Virtual Machine is a computational system that executes Ethereum smart...
- zkSync — zkSync is a Layer-2 scaling solution for Ethereum employing zero-knowledge rollup technology, which...
Browse all 2,000+ Web3 terms or speak to a consultant for expert guidance.