%51 Attack
Majority attack that occurs when more than half of the computing power in a network is operated by a single person or a single group of people. The organization has full control over the network and can negatively impact a cryptocurrency by stopping mining, stopping or modifying transactions, and reusing coins.
AML, which stands for Anti Money Laundering, is a platform and database independent solution designed to detect, analyze and report remarkable financial movements.
Application Specific Integrated Circuit.In short, it means application-specific integrated circuit. A collection of devices consisting of some type of integrated circuit created specifically for a particular application or task.
ASIC mining means mining cryptocurrencies like Bitcoin through ASIC platforms. ASIC miner is just a piece of equipment designed for mining. Unlike other mining devices, ASICs can only be used to mine crypto.
It stands for “All-Time High”. It is the highest price a cryptocurrency has reached.
It stands for “All Time Low”. It is the lowest price a cryptocurrency has reached.
Admin Key
Admin Keys are a form of centralized control in a crypto or DeFi project that allows developers or founders to change the rules of their smart contract or blockchain.
The air gap, which is a security measure created between a computer system or network and other systems that are completely isolated in the physical world, helps prevent data leaks and ensure cybersecurity. In this way, systems are protected from external threats and become more secure against cyber attacks.
An event where a blockchain project or layer 2 solution distributes tokens or cryptocurrencies to the community in exchange for free or on-platform transactions.
The term “alpha” is used to refer to the initial stages of a software or product, while in crypto and NFT terminology it is used to refer to the initial stages of collections.
Any cryptocurrency other than Bitcoin is called.
The act of buying on one exchange and then selling to another if the margin between the two is profitable. More than one exchange trades in the same cryptocurrency and they can do so at different rates. It is a trading transaction to another exchange by evaluating the price difference between exchanges.
It is Binance’s protocol that sets its own rules for programming, issuing and managing new cryptocurrencies. Just like the ERC-20 standard of the Ethereum blockchain.
BEP-20 tokens represent various crypto assets that do not have their own blockchain but reside on the Binance Smart Chain (BSC). BEP-20 is the accepted technical standard for all smart contracts used to execute tokens on Binance Smart Chain.
The BEP-95 protocol is a mechanism created to speed up the BNB(Binance Coin) burning process and make BNB Chain more decentralized. In this protocol, it is aimed to make the BNB token economy more dynamic.
Bear Market
It refers to the market where the prices of cryptocurrencies generally tend to decrease.
Bear Trap
It is made by people who aim to manipulate the price of any cryptocurrency. They are all bluffing by selling the cryptocurrency at the same time, suggesting that the market is bearish.
The bearish trend, in short, is the period of the bear market.
Blockchain can be expressed as a kind of digital ledger or list where digital data is stored in an encrypted form. In this structure, which is called “blockchain” in English, data is stored in a chain-like structure in the form of blocks connected to each other in chronological order.
Blockchain Transaction
Blockchain is a distributed database used for storing and transferring data and assets. In its most common applications, such as cryptocurrencies, the blockchain acts as a chain of information blocks related to cryptocurrency transactions. Blockchain transaction, also called blockchain transaction, refers to crypto money transfers.
Bull Market
A market in which the prices of cryptocurrencies generally move upwards for a certain period of time.
Token burning, in short, is the process of continuous destruction of cryptocurrencies. Tokens with token burning are removed from circulation in the market and become unusable again. In token burning, tokens are sent to an address associated with an invalid “private key” and cannot be recovered.
Burner Wallet
Burner Wallet for short, unused wallet, separate (temporary) from your main wallet (Vault), mostly used for printing NFTs or interacting with an unsupervised dApp.

You create a disposable wallet just like any other wallet, but for a specific purpose, such as printing NFTs or interacting with an unaudited project. By audit, we’re talking about code for that project that hasn’t been verified yet by a security firm. A Burner wallet can be a hot or cold wallet that you hold only a minimum amount to pay gas fees to transact or interact with any smart contract.
Buy the dip
It refers to the idea of buying cryptocurrencies when prices drop to reap their benefits when they rise again.
In summary, CBDC is a government-backed currency unlike cryptocurrencies. We can also call it the digital currency printed by the states.
In short, centralized exchanges are called CEX.
Centralized Finance, offers new crypto-focused loans/savings products, but within a traditional centralized framework where users create accounts and provide credentials/KYC as well as access customer service.
Circulating Supply
Let’s think of it as an asset or crypto asset; It is the amount circulating in the market, held in the stock market or by the investors.
Cold Wallet
A cold wallet is an offline storage method that stores private keys of individuals. Private keys are isolated and protect your cryptocurrencies against digital dangers from the internet, as there is no connection to the internet. It usually appears as a USB device. Ex: Ledger
The consensus mechanism is a computer network at the core of every cryptocurrency. This system contributes to the protection of software from attackers and helps regulate the supply of new units.
Cryptocurrency Exchange
A website or app that allows users to buy and sell crypto assets.
It is a computer science method of keeping information private and secure by embedding it into undecryptable information. The information can only be decrypted and read with the required key.
Decentralized autonomous organization. DAO refers to independent individuals who work together towards a common goal and follow rules written in the project’s self-executing computer code.
Decentralized Exchange,a type of cryptocurrency exchange that does not have a centralized trading ledger, but instead facilitates access to liquidity through smart contracts.
“Do Your Own Research.” This is often used by cryptocurrency influencers as a warning to other investors, reminding us that due diligence has no better alternative than our own research.
The process of simultaneous dumping of large amounts of cryptocurrencies into exchanges that pushes prices down because there is more supply than demand for a given cryptocurrency.
Day Trading
In summary, it can be translated as daily transactions on futures. It is a risky but highly preferred method as it offers a high profit opportunity in the short term.
Decentralized Finance, refers to the growing ecosystem of applications and services that leverage blockchain technology and cryptocurrencies to provide decentralized financial services to users.
Dead Coin
This term, which means dead crypto money, refers to crypto money projects that have been abandoned, canceled, fraudulent, or have low liquidity and insufficient funding for various reasons.
Death Cross
 A death cross is when a short-term moving average (for example, 75-days) crosses a long-term moving average (for example, 250-days) to the downside.
Deflation refers to the situation in which prices in the market decrease continuously over a period of time. This is the opposite of inflation.
Diamond Hand
It is used for investors who do not sell their crypto assets/tokens when they decline and believe that the token will go out after falling for a while. They are generally long-term investors.
Digital Signature
Digital signature, as a cryptographic method, was created to ensure the accuracy and integrity of digital data. It is the name given to digital traces that verify the address sources in transfer transactions.
Distrubuted Ledger/Book
In traditional finance, an organization such as a bank maintains a ledger of all its customers’ transactions. Defi notebook is shared and synchronized between users around the world. A blockchain is an example of a distributed ledger.
Dust Transaction
It refers to very low cost transactions that take place in the blockchain. These types of transactions are the ones that Bitcoin developers want to eliminate, as they take up unnecessary space on the blockchains and increase the data size. Studies on this subject are still ongoing.
A decentralized application (dApp) is an application that is not controlled by a central authority. Twitter is an example of a centralized application that users rely on as an intermediary to send and receive messages.
ERC-20, used on the Ethereum network, is the most used crypto token standard. It allows developers to easily create cryptocurrencies that are immediately compatible with existing infrastructure.
This is the Ethereum network’s standard for NFTs. It allows the creation of unique, irresistible tokens. It can be used to create digital collectible and game items, or to indicate unique real-world items
Exchange Traded Fund. A fund that provides an investor with exposure to a basket of securities or assets without actually owning it. ETFs can be traded at any time during market trading hours. The approval of a Bitcoin ETF is seen as a milestone that brings in more retail investors.
The “Ethereum Virtual Machine” is essentially a global blockchain-based computer. It provides a runtime environment for developers to build trusted, decentralized applications on the Ethereum network.
Commodity is the general name for goods that have value and are traded in the world of commerce. Products such as gold, silver, oil, natural gas, copper, cotton, corn, wheat, sugar and coffee are included in this category. The markets where such goods are bought and sold are called Commodity Exchanges.
Escrow systems operate in the crypto money world, just as they do in online shopping platforms. The Escrow approach is for investors to keep their assets on exchanges rather than cold wallets. Investors can keep their assets partially safe in the systems of reliable and high-volume exchanges.
Fear of missing out” FOMO is an expression that comes from the meaning of fear of losing.
 It stands for Field Programmable Gate Array, in Turkish it means Field Programmable Gate Arrays. Reprogrammable integrated circuits are called integrated circuits.
“Fear, Uncertainty and Doubt” “ It is an abbreviation used to mean “fear, uncertainty and doubt”. We see often this term to bu used to make bad publicity on projects exchanges etc..
Refers to traditional, government-backed currencies such as the pound, euro, and US dollar.
A fork describes the situation where a blockchain experiences a change in the protocol that generates two parallel chains. Forks typically occur when crypto developers or communities decide that the protocol needs to be modified or updated in some way.
Gas Fee
In short, it determines the fee we pay to perform a cryptocurrency transaction. The definition of gas fee was first defined to process transactions on the Ethereum network. These are; sending transactions, distributing and interacting with smart contracts, etc. It is usually priced in Gwei, a small fraction of Ether. Today, the transaction fee on every blockchain is called a gas fee.
Genesis Block
Genesis Block (Initial Block) is a term that Satoshi Nakamoto coined on January 3, 2009 by creating the first block of Bitcoin. Genesis Block is a name given not only to the first block of Bitcoin, but also to the starting blocks of other cryptocurrencies.
Gigahash is a unit used to measure processing power in the mining field. This unit refers to the processing capacity of the hardware. Mathematical problems need to be solved through certain algorithms during the process. The processing power capacity of the hardware indicates how fast these mathematical problems will be solved. For example: hash rate etc.
Golden Cross
A Gold Cross is the name given to a situation where a short-term moving average (for example, 75-days) crosses a long-term moving average (for example, 250-days). It is also called the “golden cross” because of its upward cut.
Wei is the smallest, indivisible part of Ethereum’s native currency, ETH. 1 Ether is equivalent to 1,000,000,000,000,000,000 wei (1018). Gwei is short for Giga-wei.
It refers to a kind of passive investment strategy in which you hold an investment for a long time regardless of any changes in price or markets. The term first became famous when the word “Hold” was misspelled on a Bitcoin forum.
Hard Fork
It is a fork in the blockchain that validates transactions previously labeled as invalid and vice versa. All nodes in the network must be upgraded to the latest protocol for this fork to work.
Hash refers to the amount of computing power spent to keep crypto networks such as Bitcoin running constantly. The time it takes to decode a block is measured in hashes per second (H/S). The unit of measurement is hash/second, and on larger scales terms such as mega, giga or tera are used.
Initial Coin Offering. The first proposal for the public purchase and sale of tokens or digital assets for a nascent blockchain project.
The first decentralized offering that looks like an ICO but allows users to interact with the project before it is released.
Initial Exchange Offer. This is the first time a cryptocurrency has been sold via a digital currency exchange.
It is the address that shows where a money/token transfer comes from in crypto usage.
It’s an abbreviation for “Know Your Customer”. It is the first stage that cryptocurrency exchanges and trading platforms must complete in order to verify the identity of their customers.
The term used for Lamborghini is often an indication of how quickly one expects to get rich, given current market conditions. It is also often used, ironically, to mean the opposite: that someone loses a lot of money during downturns.
Layer 1
Layer-1 is another name for underlying blockchains. Blockchains such as Ethereum (ETH), Bitcoin (BTC), and Solana (SOL) are considered Layer-1 protocols. These blockchains and cryptocurrencies are called Layer-1 because they are the main chain in their ecosystem. In other words, a protocol is defined as Layer-1 if it performs and completes transactions on its own blockchain.
Layer 2
Layer-2 protocols were developed to increase the transaction speed and scalability of the Layer-1 blockchain. The tokens in the Layer-2 Cryptocurrency list are cryptocurrencies of projects developed to address the scalability issue.
The system, called leverage, allows investors in financial markets to use less capital while allowing them to carry out larger volumes of transactions.
In leveraged transactions, resetting the money entered in the transaction means that it is completely lost.
It is the ability of businesses to turn things that have assets into cash in the most practical and fastest way. We can show money as the most liquid asset. Fixed assets represent the lowest liquidity.
Liquidity Pool
Liquidity pools are pools of cryptocurrencies and/or tokens linked to one or more smart contracts, created to facilitate asset exchange transactions on decentralized finance platforms (DEX), to which individual and institutional investors contribute by investing their financial funds.
Market Order
A market order is an order to buy or sell a token at the best available price. Market orders are a fairly common type of order and are usually executed almost immediately. When you place a market order, you instruct the exchange to trade to buy or sell that token at the best available price. Your order will be fulfilled at the next available trading opportunity, which will usually take place within seconds.
Meme Coin
They are altcoins based on a meme, which is a kind of inside joke in the form of images that are repeatedly modified and shared online. Ex:Dogecoin is a memecoin.
It is the type of transaction that allows very small payments to be made.
Mining, is the process of solving mathematical verification processes in blocks in blockchain technology by various methods. This process is called cryptocurrency mining or mining system. Users who obtain virtual money with mining are called miners.
Mixer (Bitcoin Mixing)
Cryptocurrency mixer is a tool used to hide traces of cryptocurrencies and increase the confidentiality of transactions. This service provides anonymity by mixing cryptocurrencies of multiple users, hiding connections between transactions.
‘’Not Gonna Make It’’
A computer or device connected to other computers or devices, all of which hold a copy of a blockchain. Each node supports the node network by sharing information and verifying transactions.
Order Book/List
An order book is a list of current buy and sell requests for an asset, sorted by price. In this list, there are usually two colors: green and red. Buy orders are shown in green, sell orders in red and with price levels.
Orphan Block
Orphan Block, is the name given to blocks that do not have an upper block or are not included in the blockchain network. Such blocks are defined as blocks whose main block does not exist or is unknown.
Peer to peer. It refers to a transaction between two persons without the involvement of an intermediary or central authority.
Paper Wallet
Paper Wallet is used as a method of storing cryptocurrencies offline and for this purpose, it is defined as a printed version of the barcode or QR codes required for crypto transactions. This method, which is not preferred much, was seen in the early days of crypto markets.
In crypto phishing attacks, attackers send an e-mail to the victims by impersonating authorized institutions and individuals. Users who open this e-mail, click on the links in the e-mail or share their personal information via e-mail leave their information at risk as a result of this attack.
Proof of Burn. It is a kind of consensus algorithm that requires users to “burn” or exchange some token by sending it to a non-spendable address, thereby proving that they are real and active participants in the network.
Proof of Stake. Another alternative to proof of work involves rewarding these miners for providing their computing power to the network for that miner’s investment in cryptocurrency. So if a miner holds three tokens, he can only earn three tokens.
Proof of Work. Proof that you did the computational work to estimate the 64-character hash needed to add a block to the blockchain. Publishing your solution allows other nodes to quickly verify that your hash is correct and that you must have done the work necessary to obtain it.
The pool system is a method where miners work more effectively by joining forces due to the increase in transaction difficulty. In this system, the discovered block reward is shared among the partners in the pool in proportion to the processing power of the participants.
Private Key
It is essentially the password for your crypto assets. An impossibly long number that is almost impossible to guess. You authorize a transaction by signing it with the hash of your private key that only you know. Your corresponding public key can be used by others to verify the authenticity of a transaction.
Public Key
A public key is an address, similar to an IBAN issued by banks, consisting of numbers and numbers that users can use to receive payments.
Public Key
The public address of your crypto wallet. You need to share your public key to get funds to your account. If the private key is like a password, the public key is like an email address or account number.
Public-key Cryptography
It is an encryption system in which different keys are used for password and decryption operations. Each of the communicating parties has a pair of keys. One of the keys that make up these key pairs is the private key and the other is the public (non-secret) key.
It is a term often used to refer to an upward price movement driven by investors who have invested large sums of money in a cryptocurrency.
Pump and Dump
It refers to the act of buying many cryptocurrencies and then selling them at a high price to increase its price and encourage others to invest. It is an unethical practice.
It refers to large losses in the cryptocurrency markets, it is also used for users who have lost all their assets.
Relative Strenght Index (RSI)
This definition, which stands for Relative Strength Index, is actually a technical analysis indicator. It measures the performance of assets in fiat units over certain time periods.
Rug Pull
A fake cryptocurrency strategy where crypto developers abandon a project and run away with investors’ money.
It stands for Security Hash Algorithm. It is a cryptographic hash process created by the NSA. It works with mathematical variables by compressing and encrypting data to a certain size. Information encrypted with this algorithm can then be decrypted and returned to its original state. In this way, you can securely transmit a large number of data to the other party.
It is a one-way cryptographic hash algorithm that takes an input of any size and converts it to a fixed-length random string. Many blockchain projects today use SHA-256 to enable proof-of-work mining to verify transactions.
Satoshi Nakamoto
He is the creator of Bitcoin. His identity is still not fully determined. There are estimates that he is a cryptography expert of Japanese origin or American origin.
Scalability (on Blockchain)
Blockchain scalability can be briefly expressed as the ability to increase the capacity of a blockchain network. Scalability refers to the ability of a system to grow to meet increasing demand, while also reducing the growing problems and frustrations on this blockchain.
Scam Coin
Scam tokens are cryptocurrencies that are actually fake or fraudulently created but appear to be digital currency. Such currencies, which have no basis, aim to attract people’s attention by being marketed with promises of high returns.
Scrypt, which is a kind of cryptographic encryption algorithm, is generally used in mining studies. (Ex: Litecoin) It is faster because it requires less transactions than SHA256.
It is a way to shred the entire blockchain history, with this way not every full node will need an exact copy.
A person who promotes a project or token for money. Project or token shilling is called promoting these projects without any basis or infrastructure. Creating volume through interaction on social media for tokens with or without volume is also called token shilling.
Shit Coin
Worthless token that is unlikely to be reach higher levels in the markets
An illegal platform that operated in the early years of crypto. It is known as the dark web of crypto. It was shut down in 2013.
Smart Contract
A smart contract is a type of contract in which the agreement between the buyer and the seller is directly expressed and executed with codes. These codes and contracts are distributed on a decentralized blockchain network. While the code controls the execution of the application, actions can be traced and cannot be undone.
Solidity is an object-oriented and high-level programming language used for the creation of Ethereum-based smart contracts. Smart contracts are codes that run automatically, allowing to perform complex automated transactions.
A stablecoin is a type of cryptocurrency that seeks to maintain price stability and is backed by a reserve asset such as the US dollar or gold.
Staking is the act of providing support to a cryptocurrency network by locking your coins for a specified period of time and without spending or transferring them. During this time, you will receive a certain amount of reward cryptocurrencies thanks to the lock process. In order to lock your cryptocurrencies, a special mobile or desktop wallet is needed.
Stale Block, in short, means a blog that has been found twice. It is called when the block whose solution has already been found by a miner is found once again. In this transaction, the miner cannot get paid.
Fundamental(Temel in Turkish) Analysis is a method of estimating the future performance of a particular asset as well as valuing it. It is used as a TA in the cryptocurrency industry.
The Onion Router, or TOR network for short, is a security technology that prevents external monitoring of your activities in the digital world and access by third parties. The Onion Router network allows you to keep your identity private and browse anonymously by erasing the traces you leave in the digital world.
TVL, which stands for Total Value Locked, refers to the total value locked in decentralized finance projects through smart contracts.
TX stands for blockchain transaction.
Taint refers to the investigation of the relationship between two addresses by examining transfer transactions. Taint (Trace Analysis) is used to determine the source of problems on digital platforms. Especially in cyber attacks, it serves to track the addresses and identities of attackers. System and code sources are examined in detail, unusual movements are detected and crime is detected. This method is mostly used for the purpose of investigating stolen accounts.
It is the value that expresses the highest production power in the crypto mining system. (hash unit of measure)
Testnet is an alternative chain in blockchain technology that developers use for testing and development. These chains operate independently of the main blockchain network and work with test tokens that have no real value. Thanks to the testnet, developers can test their applications and fix bugs while not having any impact on the main blockchain. Hence, transactions on the testnet are not transferred to the real blockchain and tokens in the testnet cannot be considered real currency.
To the Moon
Investors use that term or send a rocket emoji when they think the cryptocurrency will see a surge.
Transaction Block
It is the block on the system where transaction happens.
Its abbreviation is Unspent Transaction Output. Each transfer is a collection of inputs and outputs. UTXO also serves to detect the start and end point of transactions on the blockchain.
Volatility is a concept that expresses the price fluctuations that occur when the prices of cryptocurrencies increase or decrease rapidly in a short time. The term is used interchangeably in both financial and cryptocurrency markets.
’We are Gonna Make It’’
Web 1.0
Web 1.0 is considered the first and most primitive era of the internet and represents an era when users could only observe the internet but not create their own content. This period was called the “read-only web” by experts, and the internet functioned as an online library full of fixed content and one-way information flow (1990-2000).
Web 2.0
Web 2.0 is the second popular era of the internet, with its user-oriented and collaborative environment. This period revealed a dynamic and two-way communication platform where users participate in content production and sharing takes place. This period is also called the “social web” as users can not only read websites but also connect with other users through social interaction (2000-2010).
Web 3.0
Web 3.0 is defined as the process of making sense of the contents transferred to the virtual world with Web 2.0, and in this period, the control of the internet is taken away from people and the data is structured and labeled in a way that can be read directly by computers. Thanks to software solutions supported by artificial intelligence methods and techniques, the internet becomes “intelligent”. For this reason, this period is also referred to as the “semantic web” era or the era of machine learning development (2010-2020).
Web 4.0
Web 4.0 represents a web technology where internet-based computing (cloud computing) applications come to the fore in the storage of personal files, data and content, everything from operating systems to all applications is separated from physical disks and built entirely on virtual networks, and real and virtual are intertwined. It is also called the “smart web” era.(2020-2030)
A term used to describe extremely wealthy investors or traders who have enough funds to manipulate the market.
Typically academic, they are technical documents that propose a new technology and outline the full details of its application. Typically, new projects clearly state whitepapers to help potential users or investors understand the product or service, its use case, and its potential.