The most comprehensive crypto glossary for Intermediate level

The most comprehensive crypto glossary out there.

Glossary Hero Image
R

RegTech

The management of regulatory processes within the financial industry. The main functions of regtech include regulatory monitoring, reporting, and compliance.

Category:

Level: Intermediate

Reentrancy attack

The ability to simultaneously perform the function of a smart contract several times. If an attacker can control an untrusted contract, they can recursively call the original function, repeating transactions.

Category:

Level: Intermediate

Redundancy

In terms of data storage, redundancy refers to either the deliberate or accidental practice of storing multiple copies of a given piece of data, often in several different locations. Data redundancy is considered best practice to ensure that data is stored securely and will not be irrevocably lost in the event of a single host or single copy of data disappearing.

Category:

Level: Intermediate

Recovery seed

The recovery seed phrase is a cryptographic security code made up of a list of 12-14 random words. It stores information for recovering your wallet and coins. Users should keep it in a safe place, because anyone who can access your recovery phrase can obtain your funds or steal them outright.

Category:

Level: Intermediate

H

Hard cap

A hard cap is the maximum possible coin supply enforced by a cryptocurrency’s source code when it is first released. Due to this source code, it is not possible to ever create more coins than the hard cap limit.

Category:

Level: Intermediate

R

Rebase

The circulating supply of rebase (or price-elastic) tokens is automatically adjusted (increased or decreased) in accordance with fluctuations in the price of the token. The amount of tokens in each wallet will increase or decrease accordingly. Yet, the total value of each wallet does not change.

Category:

Level: Intermediate

Realized capitalization

A market capitalization option in which each unspent transaction output (UTXO) is valued based on the price at the time of the last move, rather than its current value. Thus, it represents the realized value of all coins on the network, not their market value.

Category:

Level: Intermediate

Rarity (NFT)

This term refers to how rare an NFT is. Some NFTs are available for purchase in the thousands, so they are considered a low rarity. However, if only one NFT is minted on the blockchain, it is very rare and therefore more valuable.

Category:

Level: Intermediate

RaptorQ

A form of erasure coding used in computer science to split data into encoded chunks (blocks of data) so that they can be safely sent elsewhere. Sometimes it is used in blockchains.

Category:

Level: Intermediate

Ransomware

Ransomware is a type of malware that encrypts files on the victim’s computer. The attacker then demands a ransom to restore access to the data after payment. The best way to protect yourself from ransomware is to prepare beforehand. Install security software to all your devices and regularly back up your important data.

Category:

Level: Intermediate

G

Gwei

The ETH denomination in which gas is paid. 0.000000001 ETH is one Gwei.

Category:

Level: Intermediate

R

Range-bound

A pattern in technical analysis (TA) where an asset’s price remains in a specific range. Assets that are range-bound typically bounce between a high resistance price that they cannot break above and a low support price that they won't drop below.

Category:

Level: Intermediate

Range (technical formation)

A technical tool that measures the difference between the high and low prices for a given trading period. The range is marked on the charts for one trading period as high and low points on a candlestick or bar.

Category:

Level: Intermediate

G

Group Mining

The process of combining the computational resources of several individuals or entities to mine together. This can allow miners with less resources to maximize profits, share rewards, and mitigate security risks.

Category:

Level: Intermediate

R

Race attack

Race attack is simply an artificial "race" between two transactions created at almost the same time. The idea is to replace the first transaction with another and return funds to the wallet before the transaction is confirmed.

Category:

Level: Intermediate

Don’t miss the new CEX.IO University content.

Subscribe to CEX.IO University updates, and receive our newsletter packed with useful guides and tips every week.