THE CODEX
Decoding the language of the machine economy.
New to Industrial Web3?
Launch the interactive wizard to understand the machine economy in 60 seconds.
Neuromimetic Architecture
A system design philosophy that mimics biological neural networks, allowing decentralized nodes to self-organize and optimize without central direction.
DePIN
Decentralized Physical Infrastructure Networks—protocols that incentivize the rollout of real-world hardware (sensors, solar panels, wifi) using cryptographic tokens.
RWA Tokenization
The process of creating a digital twin of a Real-World Asset (like real estate, gold, or debt) on a blockchain, allowing it to be traded globally 24/7.
Industrial Automation as a Service
A business model where the complex machinery of production is abstracted away via APIs, allowing users to order "manufacturing" or "logistics" as easily as cloud computing.
Zero-Knowledge Proof
A cryptographic method by which one party can prove to another that a statement is true without revealing any information apart from the fact that the statement is true.
Smart Legal Contract
A legally binding agreement where natural language clauses are paired with executable code that automatically enforces the terms.
Sovereign Identity
A model of digital identity where the user retains full control over their data, sharing only what is necessary via cryptographic attestations.
Token Engineering
The rigorous design of economic systems and incentives using optimization, control theory, and simulation.
Moloch Trap
A game-theory concept where individual incentives lead to a collective negative outcome.
Zero-Knowledge Rollup
A Layer 2 scaling solution that bundles hundreds of transactions off-chain and generates a cryptographic proof of validity.
Multi-Party Computation
A cryptographic protocol where multiple parties jointly compute a function over their inputs while keeping those inputs private.
Homomorphic Encryption
A form of encryption that permits users to perform computations on its encrypted data without first decrypting it.
Account Abstraction
ERC-4337 standard that upgrades simple wallets into smart contract wallets with programmable logic.
Miner Extractable Value
The maximum value that can be extracted from block production in excess of the standard block reward and gas fees.
Data Availability Layer
A specialized blockchain layer dedicated solely to storing transaction data to ensure it is retrievable.
Optimistic Oracle
An oracle system that accepts data as true by default, unless challenged within a specific dispute window.
Verifiable Delay Function
A function that requires a specified amount of sequential time to evaluate, but whose output can be quickly verified.
Trusted Execution Environment
A secure area of a main processor (like Intel SGX) that compromises confidentiality and integrity protection.
State Channels
A technique for performing transactions off-chain, with the blockchain used only for settlement.
Proto-Danksharding
EIP-4844 update that introduces "blobs" of data that are attached to blocks but not accessible to the EVM.
Modular Blockchain
A blockchain architecture that separates execution, settlement, consensus, and data availability into different layers.
Sovereign Rollup
A rollup that publishes its transaction data to a blockchain but handles its own settlement and fork choice rules.
Liquid Staking
A mechanism allowing users to stake assets and receive a token representing their stake, keeping liquidity.
Restaking
The concept of using staked security (like ETH) to secure other protocols or services simultaneously.
Flash Loans
Unsecured loans that must be borrowed and repaid within the same transaction block.
Atomic Swaps
A smart contract technology that enables the exchange of one cryptocurrency for another without using centralized intermediaries.
Directed Acyclic Graph
A data structure used in some distributed ledgers where transactions are linked to previous transactions rather than blocks.
Byzantine Fault Tolerance
The ability of a system to continue operating even if some of its components fail or act maliciously.
Sybil Resistance
Mechanisms to prevent a single adversary from controlling multiple fake identities to manipulate a network.