Skip to main content


But why does Web3 matter?

The technology underpinning Web3 is ripe for innovation. The underlying blockchain technology centers around guaranteeing trust for transactions and events without needing an intermediary. The removal of traditional banks, servers, administrators, and even governments that slow down technological progress excites people. And this technology is only around 15 years old – there are so many improvements to be made.

This is backed by the data. Bitcoin alone has hosted over 1 billion unique internet addresses. Speculation on the potential of different Web3 sectors has seen their value skyrocket, such as decentralized finance which has gone from almost zero to over €100 billion in two years. Web3 has been one of the fastest growing markets of the last decade, with almost €10 billion in venture capital funding invested in the sector in the first three months of this year alone. 

Besides the monetary value and opportunity in Web3, the main excitement stems from being able to rebuild the base level of the internet. Some of the most successful companies of the past two decades such as Google, Microsoft, and Facebook have earned this position through their monopoly on internet infrastructure and the data flowing through it. The ability to change this narrative, to build something of your own, and to have monetary and actual ownership of your data and digital creations is the cornerstone for the next generation of Web3 builders.

Here are our 45 most essential Web 3.0 terms you need to know to get started.


AMM stands for Automated Market Maker.

In traditional finance, normal market makers determine the price of a stock in a given transaction. Typically, when a party states the price you are willing to sell an asset, a broker will connect you to a buyer willing to buy your asset. This broker can then set the actual price of the exchange, typically the midpoint price, and can add any fees they want to this service.

On the other hand, an AMM automates this process in cryptocurrency transactions by creating connected liquidity pools made up of the two currencies being exchanged at that moment. The price set for exchange between these two pools is dictated by the ratio of these paired tokens between the two pools – no broker is needed to determine the price. This is fully automated through the use of algorithms such as smart contracts to isolate the exact amount wanted if somebody is buying or selling through an AMM — referred to as AMM protocols. Examples include Uniswap and Sushiswap, which raise the tokens for their pools by offering a cut of transaction fees to people who stake and lock up their tokens in these AMM pools.



Airdropping is the placing of tokens directly into interested parties’ wallets. This can be done as a marketing tool as an incentive scheme It is also can be used to correct fraudulent changes in tokens.

Famous airdrops include the crypto wallet BRD’s bread token that maxed out signups after two hours or uniswap giving 15% of its governance tokens to early adopters as thanks and to give them a greater say in its future direction.



Bitcoin (BTC) started in 2009 as a “peer-to-peer electronic cash system” based on the Satoshi Nakamoto white paper and is built using blockchain technology. It is the most popular cryptocurrency with a current total market cap of €380B at the time of publishing.

Bitcoin has two main features:

  • Each bitcoin is ‘mined.’ To mine a bitcoin, a user provides their computer (or data center) to verify other people’s Bitcoin transactions. Mining thus means that the miner is being rewarded in Bitcoin in exchange for verifying transactions — the proof of work(PoW) verification method.
  • Bitcoin is coded in a way that there can only be 21M bitcoin mined. The more Bitcoin mined, the smaller these verification rewards become. Over 90% of the total Bitcoin supply has been mined at the time of publishing. At the current pace, the last bitcoin is predicted to be mined in 2140.

The process of verification is expensive in terms of the energy required. However, this makes Bitcoin transactions more secure compared to many other cryptocurrencies.

The vision outlined in the white paper is for Bitcoin to become a currency used for everyday transactions. However, it has not gained widespread popularity as a means of payment in everyday life relative to the popularity of fiat currencies. Thus, Bitcoin’s value mainly reflects investors’ speculative feelings about its future worth.



A block is the digital storage of transactions on a blockchain, which is connected to a history of every previous transaction before it, forming a chain of blocksOnce these blocks are added to the chain they are considered immutable: they cannot be changed by an outside party. Blocks vary by size (amount of transactions stored) and speed (how fast the transactions take to be validated).

To add a new block to a blockchain, a computer states the information to be put onto a block. Once this block is ‘filled’ with data, a validation method will occur to ensure the transactions are valid for the whole network, such as ‘finding’ one through mining in PoW algorithms. The transaction is not considered valid until each computer shows the same information as every other computer on the blockchain network. This is called reaching consensus.



Blockchain technology is a method to guarantee an event on the internet without requiring verification from a third party like an internet server, bank, or the government. The blockchain itself is a digital record of transactions documented on blocks. This record is copied across a decentralized network of computers where each computer is connected to one another instead of going through an internet server.

The blocks are connected and immutable: once recorded on the blockchain, they cannot be changed by an outside party. They are kept immutable due to decentralization, as each block must be identical on every single computer to be part of the blockchain. Having an identical copy of the blockchain on each verifying computer validates the transaction and is referred to as achieving consensus.

Recording a transaction or event on a blockchain is significantly more secure and more transparent (the transaction history is forever on the blockchain) without requiring any third-party oversight. Blockchains vary by purpose, validation method, and transaction fees (gas fees).

Blockchain technology is the underlying basis for the majority of Web3, as ownership of a project is attached to every contributor through connecting their computer to the blockchain. Blockchain’s secure and strong verification features without a third party have seen the rise of smart contracts and DeFi. Outside of the Web3 infrastructure, blockchain has for example been used in verifying the authenticity of diamonds and in speeding up supply chains for retail giants such as Walmart.



A bridge is an application designed to allow the transaction of assets between two or more separate blockchains, also referred to as “cross-chain” swapping.

Consumers with Bitcoin for instance would use a bridge to access Ethereum’s smart contracts and services without selling their BTC for its ETH equivalent. This is a valuable feature, as selling and buying tokens can generate significant transaction costs (gas fees).

Bridges compromise on security in exchange for cross-chain interoperability. Bridges tend to have small numbers of validators, making them vulnerable to attack, as seen with Axie Infinity’s Ronin network hack in March 2022. Bugs in the source code can also be exploited by hackers (see smart contract).



Consensus is how a decentralized network such as a blockchain maintains security. The blockchain is copied across the whole network of computers that have formed the blockchain through contributing individual blocks. Consensus is the security requirement for these computers, named nodes, to hold the identical version of the blockchain at the same time. Should a hacker want to tamper with a block on a blockchain, they would have to do so on every node for it to be successful.

The two most common methods for a network to achieve consensus and validate data held on each node are the proof of work or proof of stake method.



Cryptocurrency is a digital currency secured on a blockchainBitcoin is the most common example of this. The blockchain uses cryptographic proof to secure the currency. This prevents the double spending issue for digital currencies where a currency unit is used for multiple payments without being used up. This is where the cryptocurrency name derives from. Anyone can make a cryptocurrency and they are regulated only by their underlying protocol or DAO.



Decentralized Autonomous Organizations (DAOs) are an organizational structure used to run and oversee projects in Web3 in a decentralized manner. Although some projects are run in a more traditional company structure, the importance of decentralization for many Web3 contributors has caused DAOs to become a more common structure.

DAOs are constructed around the ideal of “bottom-up governance”:

  • Tokens or separately shared governance tokens give you voting rights like shares in a company.
  • All voting procedures and mechanisms have been decided at the inception of the blockchain and are executed by smart contracts.
  • Ideally, there is no true leadership group. Anybody can submit a proposal – although there may be prominent community members or guilds, people with large token shares, or even active developers.
  • All DAO features are typically available on Discord or a website. This commonly includes a list of tasks DAO members can do to aid or contribute to a DAO. Such actions are rewarded with tokens.

DAOs can typically set themselves up with a treasury of locked blockchain tokens people have sold to purchase the DAO’s governance token.

A good DAO example is MakerDAO, governing the use and control of the DAI cryptocurrency. Holders of the governance token MKR give rights to vote on improvements to the DAI blockchain, modifying the output of smart contracts that help the DAI function, or even an emergency shutdown of the whole protocol. The DAO has fractured into several decentralized core units performing services such as bug bounties and growth specialization, with their actions visible from the publicly accessible MakerDAO discord.



Decentralized applications or dApps are applications that are secured on a blockchain. Most users will see the dApp portion of blockchain projects, with blockchain being the unseen, underlying technology. Connecting the blockchain to a dApp interface typically requires the use of smart contracts. Popular dApps include games like Axie infinityDeFi exchanges like pancakeswap or uniswap, or marketplaces like Opensea for NFTs.



Decentralized finance or DeFi is the umbrella term for the use of blockchain technology in finance. Blockchain technology’s value for finance comes from the automatization of financial transactions. This means that the verification of transactions originally done by banks can now be secured by the built-in trust of a blockchain system.


DeFi has huge growth potential should it gain mainstream adoption. For example, if all DeFi locked assets were to be considered a bank right now, they would already be the 5th largest in Europe.



Ethereum (ETH) is the second most popular blockchain with a current total market cap of €178B. Ethereum’s main purpose is to be a place to create decentralized applications (dApps). Paying for these applications validation on the blockchain, the gas fee,  is through the Ethereum token (Ether) that functions as its own cryptocurrency.

Ethereum is ‘programmable money’ – you can code Ethereum blocks to execute automatic algorithms and smart contracts. This means you can, for instance, program the digital receipt to, only give ether to a party on a specific future date, which is not possible with more rigid blockchains such as Bitcoin. An estimated 44 million smart contracts have already been deployed. This programmable aspect of Ethereum has seen the construction of dApps that have become the bedrock of significant Web3 structures such as DeFiExchanges, and NFTs.

Ethereum uses the proof of work model for validation but has officially moved to the proof of stake validation method as of 15th September 2022, dubbed “the merge.” Ethereum’s flexibility for smart contracts makes it less secure than Bitcoin, but it processes transactions more efficiently and is more scalable.


Exchange (DEX and CEX)

An exchange is an application that allows the exchange of cryptocurrencies into other currencies. These take two main forms: Centralized Exchanges (CEX) where the tokens go from one user to another through one main body (CoinbaseBinance), or decentralized Exchanges (DEX) where the transactions are peer-to-peer through the pooling of tokens into an AMM (UniswapCurve).



Fiat is any Central Bank-issued currency, such as the euro, dollar, or yen.

A fiat currency is a currency that is not backed by any commodity, such as gold or silver. All major global currencies have been fiat since around the 1970s following the removal of the peg of the US dollar to gold. Thus now these currencies are not backed by gold stored in a central bank vault, but by the prestige of said central bank and the dynamism of the economy of the country in question.

Many actors in Web3 believe that the value of fiat currencies is too vulnerable to global politics. This issue is supposedly not faced by cryptocurrencies as the value of the currency is not reliant on a centralized agency or bank.



A fork is a radical change to a blockchain’s underlying protocol by a new block, usually resulting in the formation of two different blockchains. The blockchain continues on whichever chain the majority adopts.

Forks are mainly done in two ways. Soft forks are when the protocol is updated and augmented but major underpinning rules are not changed. This is typically done by main chain developers in order to optimize the blockchain for future users. Hard forks are radical changes in the protocol structure, such as changing the validation system or rewinding significant fraudulent transactions. These typically result in making previous or future blocks valid or invalid and can significantly affect token values and functions. These decisions are usually made after significant discussion and approval from the community surrounding or maintaining the blockchain.

Ethereum has several examples of hard forks. In 2016, a technical bug in code used for DAOs on Ethereum was exploited, allowing hackers to siphon 5% (3.6 million tokens) of total ETH then in existence from the biggest DAO on the blockchain. The Ethereum developers decided on a hard fork to ‘rewind’ that transaction and return the state of the Ethereum ether tokens to where it was before. The ‘original’ chain with the token state post-hack is still accessible and used as Ethereum Classic (ETC). This has all the same capabilities but fewer users as a part of the community remained on the new chain. This fork is rightfully considered controversial as it breaks the key promise built into blockchains of transactions being irreversible that people rely on to trust the technology.


Gas Fees

A gas fee or transaction fee is the colloquialized term for the price of completing a transaction on any blockchain, originating from the term used on the Ethereum blockchain. A gas fee is effectively payment for the electricity and validation work done to have a transaction recorded on the blockchain. This is because creating a block on a blockchain requires computational power and energy from the computers that have to validate each transaction. These are always paid by the user who wants to add transactions or programs to the blockchain.

Gas fees typically vary between blockchains depending on the number of transactions each block can hold, how fast it can validate a single transaction, and transaction demand. Most gas fees are considered a minimum payment, so paying a higher gas fee to validators as a “tip” is sometimes used to make sure your transaction is done the fastest.

As an example of gas fee variance, for Bitcoin (five transactions per second [TPS], more than 10,000 nodes) the transaction cost averages at €1.10 per transaction at the time of publishing but has been as high as €80.1 at peak demand. In contrast, the average fee for Solana (65,000 TPS; 1,469 nodes) is €0.00025.


Hash/Hash rate

To validate a transaction and get cryptocurrency in return, a computer needs to perform a complex mathematical calculation.

A hash is a single guess the validating computer has at the cryptographic problem it needs to solve for a transaction to be validated. Many such guesses, or hashes, are generated per second when a miner attempts to solve the cryptographic problem at hand.

Hash rate is the number of attempts per second for the entirety of a blockchain. A high hash rate is considered to be good as it shows a large pool of miners available to verify transactions.



An Initial Coin Offering (ICO) is where developers of a cryptocurrency will release a set amount of tokens to crowdfund a project. This is similar to a company raising capital through an Initial Public Offering (IPO).

Famous ICOs include the original release of Ethereum for €0.30 each (now €1,530 at the time of publishing), and the controversial Telegram Open Network by the creators of the messaging app Telegram, raising €1.7B for a blockchain project that was subsequently canceled following a decision by the US Securities and Exchange Commission.



Keys are long strings of numbers used to access the Web3 products stored in your wallet. There are two forms of keys:

  • Your public key is the string you share with others to request transactions and identify yourself in the ecosystem.
  • Your private key is the string that gives you access to your personal crypto assets and to confirm any transactions – a digital signature. This should never be shared with anyone.

A public key functions like your bank account number, with the private key being your PIN code. These keys are randomly generated and so can be hard to memorize. Therefore most wallets employ a string of words known as a “seed phrase” to act as a passcode to your keys.



Layer 1 is a foundational blockchain such as Bitcoin or Ethereum, also referred to as the mainnet or parent blockchain. With the growth in users, these popular blockchains have run into scalability issues with high transaction costs.

Layer 2 is an umbrella term for applications built to improve the scalability and efficiency of foundational blockchains. The connection between a foundational blockchain (L1) and an L2 application is that the latter ‘inherits the security guarantees’ of the blockchain on which it is based. Examples of L2 applications include rollupssidechains, and bridges.


Locking & Staking

Locking or vesting periods prevent the personal transfer, withdrawal, or burning of a set amount of tokens for a designated period.

For cryptocurrencies to maintain some value when first released they need to ensure that there are tokens available in their ecosystem. Lock-up periods typically follow big events such as Initial Coin Offerings or purchases of a large number of tokens, the sale of which could easily collapse the currency’s value. Locking up tokens also prevents developers from immediately liquidating the cash invested into a token and leaving everyone else who purchased a token with nothing, commonly referred to as a rugpull. This is similar to vesting periods for stocks and shares in traditional finance post-IPO.

Staking is the incentivized voluntary locking of a certain amount of cryptocurrency. This helps keep the currency more stable, with rewards offered for locking tokens for a designated time period. Staking is used across Web3:

  • The PoS validation method for blockchains requires each validator to stake
  • Securing DAO voting rights for those who stake to incentivize their participation
  • AMM and exchanges use staking to secure pools of tokens, creating liquidity pools so that they can function



Non-fungible Tokens or NFTs are blockchain tokens, digital proof of ownership over a blockchain-secured digital asset. A fungible token is identical to one or more other tokens — each Bitcoin is identical and interchangeable with every other bitcoin. A non-fungible token is a unique token that will be different to any other token produced on that chain.

Typical applications of NFT technologies include:

  • digital generated collectibles — the Bored Ape Yacht Club profile pictures
  • proof of digital art — Pak’s Merge NFT is the most expensive digital art piece ever, having sold for almost €92 million
  • unique items or characters in video games
  • music artists selling minted first copies of songs or access to concerts

Besides being a proof of authenticity, NFTs typically provide other perks of ownership through exclusive access to digital or physical areas, airdrops of related content, or even a sense of community.



Nodes are the computers used to secure a blockchain network. These are the engine of the blockchain, supplying the computing power to maintain it, validating transactions, and maintaining the consensus of the blockchain that keeps it secure.

The more nodes a blockchain has, the safer it is. However, this increases the computational complexity, amount of energy used, and thus the price for making each transaction.

How nodes perform their functions for each blockchain is determined by the relevant protocol. Rules on becoming a node, how it will validate, how much power it will require, and compensation for performing a node role vary by blockchain.



A mempool or memory pool is a database of transactions that are waiting for validation or being currently validated on a blockchain. These pre-chain transactions are removed from the mempool once they appear on a block.



The metaverse is the dream of a new, interactive, digital reality. The Metaverse would differ from virtual worlds in three ways: universality, interoperability, and community.

  • Universality — The metaverse would be equivalent and accessible to all users
  • Interoperability — Different virtual features would cooperate seamlessly between applications
  • Community — It has the space and opportunity for individuals or groups to build something together

The Metaverse differs to web3 in that ownership of created content is not necessary for most metaverse projects as it is for applications being built in Web3. Equally, while the aforementioned Metaverse features would naturally be enabled by blockchain technology, it is not essential for it to function.

As only one virtual reality will become the base layer for the metaverse, companies investing in the metaverse are betting that their virtual reality will be the one to realize this goal.



Mining is the process of validating a transaction in a proof of work blockchain. In mining, a large pool of users compete for tokens to see who can solve a cryptographic puzzle the quickest using computing power. The difficulty of the puzzle scales with the total hash power of the entire network, the hash rate.

The costs of mining are well documented, both in the exponential increase in computing power to continue mining and the detrimental environmental impact.

Miner Extractable Value

Mining has become a lucrative trade, as controlling which blocks get placed on a blockchain first is a valuable asset. Because gas fees are in essence tips to a miner, some users will pay extra to get their transaction to the front of the queue, trusting the value change of other potential transactions to still gain them profit. As miners will likely accept only the highest bid, the amount a user can additionally pay whilst still making a profit from their transaction is referred to as the miner extractable value.



Minting is the process of creating a new token, typically by placing a block on a blockchain. The opposite of this is the destruction of tokens, referred to as burning.

Minting also specifically refers to the transformation of a digital asset into one that can be stored on a blockchain. It thus becomes unique and considered an NFT.



An oracle is any application that provides data from outside the blockchain or vice-versa. Blockchains can only access data available on their own chains, and so need oracles to add outside or off-chain data. A typical use case is smart contracts that need to incorporate real-world data or bridges that require information from another blockchain to perform an exchange.

For example, if a stablecoin needs to keep its value constantly connected to the amount of collateral available to that coin, it would need an oracle to identify how much of that collateral is available. This is because knowledge of the collateral amount is off-chain data that has to be translated to data usable by the blockchain.

Oracles are considered controversial since they introduce third-party data through a system that is not as decentralized or secure as the original blockchain, creating a security risk.



A peg is a tie to another value that a token aims to stay at. For instance, many stablecoins attempt to maintain a 1:1 ratio to a certain fiat currency. Stablecoins will deploy measures to stay at a certain price, such as modifying token supply by creating or destroying available tokens. This is different from cryptocurrencies like Bitcoin, which is not pegged and therefore has a fluctuating value.


PoS/Proof of Stake

Proof of stake (PoS) is an alternative to the current Proof of Work model for validating blockchain transactions. To approve a new block on a chain, miners (referred to in this case as minters/forgers) will stake a certain amount of the blockchain’s token to indicate their willingness to do the computational work to validate a transaction. Participation in staking requires high amounts of the native cryptocurrency to ensure that validators are personally invested in the success of the system. As an example, Ethereum validators will be required to stake at least 32 ETH (equivalent to €49,000 at the time of publishing) to participate.

The randomly chosen validator will validate all the transactions contained in the new blockchain and is compensated by users with the transaction fees associated with each transaction. Failure or fraudulent validation results in loss of stake, or slashing. The specific mechanics will vary by protocol. As only one computer spends the computational energy on validating a transaction, the PoS model is much more efficient than the energy-draining competition of the PoW model. This has seen the model grow in popularity with Ethereum, one of the most popular blockchains, undergoing “the merge” and shifting to PoS on 15th September 2022.

While the model has many advantages, concerns arise from the inequality and centralization that this model can generate. PoS validation incentivizes validators who already own significant amounts of tokens to grow their share, resulting in few users with many tokens and decision-making power.


PoW/Proof of Work

Proof of work (PoW) is the most common method for validating blockchain transactions. To approve a new block, miners on different nodes will complete a logic puzzle through computing power. The first miner to solve the puzzle is rewarded with the blockchain’s token for completion.

The PoW model is the most common model for validation. However, the drawbacks have been well documented, with the high energy and computational power required to solve puzzles increasing with every block (energy consumed in bitcoin mining this year could have heated more than 4.5 million homes in the USA).



A protocol is a base set of rules that an algorithm will follow – the foundational code. Protocols have existed across the internet since its inception, for example in emails which are built from a set of protocols that all networked computers agree on. These are essential in Web3 to nominate the fundamental rules of different blockchains and how they function. Protocols are usually drawn up on public white papers before being coded.

For instance, the Bitcoin white paper is seen as the original protocol for Bitcoin, outlining it as a peer-to-peer currency that uses miners to secure its blockchain. The Ethereum protocol sketches out its fundamental purpose of allowing the creation of decentralized applications (dApps) through smart contracts and execution through an underlying cryptocurrency.

New rules and systems are added to protocols as a blockchain matures but significant changes or forks to blockchain protocols are considered controversial.


Pump and dump

The pump and dump is a common cryptocurrency scam where artificially inflated tokens are marketed to investors or users. The scammer then sells at the highest price before purchasers realize that the token’s actual market value is lower than expected. Cryptocurrencies are more vulnerable to such manipulation than traditional stocks as a heavy proportion of their value comes from speculation.



A Rollup is a Layer 2 solution that verifies a large number of transactions in bulk, thus reducing transaction costs/gas fees significantly.

Rollups are called scaling solutions since they cut transaction costs and accelerate transaction pace on Layer 1 blockchains, also referred to as mainnet or parent chains.

For rollups to work they have to verify bundled transactions, and do so in two ways:

1) Cheaper and computationally lighter optimistic rollups use cryptography to verify transactions but do not achieve mathematical certainty. These transactions are assumed to be valid but are contestable by anyone for a short period. Any user successfully contesting a transaction is rewarded with that system tokens.

2) Zero-knowledge rollups are computationally heavier and can mathematically guarantee the validity of transactions. These rollups are harder to program and computationally more expensive compared to optimistic rollups.

Rollups enable better scalability but compromise on decentralization as the rollup is administered by a centralized entity, such as Optimism. Such an entity is also more vulnerable to attacks than the Layer 1 blockchain.



A rugpull is a common scam where a developer deliberately backs out of an invested cryptocurrency project, taking the token value with them. These are more common in Web3 than in traditional financial systems as anybody can start a blockchain and raise via an ICO without regulatory oversight.



Sharding is used to increase the speed of transactions and scalability of main blockchains on Layer 1. Sharding works by partitioning the blockchain into sections for groups of validating computers. This both decreases the amount of blockchain history each validator has to check to approve transactions and allows more transactions to be processed. Partitioning the blockchain for each node also reduces the computational load to validate transactions, meaning that a user would need less powerful equipment to be a validator.

Sharding comes at the cost of security since a hacker will have to deceive fewer validators to process a fraudulent transaction.



A sidechain is a blockchain with similar functionalities to a foundational blockchain such as Ethereum or Bitcoin, which are often labeled the parent or mainnet blockchain. Sidechains allow separate validation systems and protocols to run that could benefit a popular blockchain without fundamentally changing or overstressing said chain with requests. Sidechains are the main building block for Layer 2 solutions.

Rootstock is an example of a Bitcoin sidechain. It is a blockchain designed to create smart contracts and to be compatible with Ethereum and Bitcoin blockchains. Users with Bitcoin can convert BTC to Rootstack’s token RBTC at a 1:1 ratio. They can then perform Ethereum-exclusive functions such as debt financing, contract payments, salaries, or even proof of registry without having to convert Bitcoin to Ethereum.



Slippage is the change in the price of an asset between the time an order is placed and when the actual transaction is executed. Cryptocurrencies, like stocks, can have volatile values. The value offered at an exchange or in an AMM may very well change before the transaction is completed on a blockchain.


Smart contracts

Smart contracts are self-executing contracts formed using a blockchain. A smart contract is a program that can automatically execute agreements on the blockchain without external oversight, as long as the originally set parameters of the contract are fulfilled. The blockchain ensures that the contract has been considered trustworthy – the validation method and the transparent ledger of previous transactions create the necessary trust.

Smart contracts are the key building block to many Web3 features:

  • They allow the automatic and anonymous execution of financial transactions and agreements without a middleman for decentralized finance.
  • Two smart contracts on different blockchains can activate at the same time, allowing bridges and exchanges to operate.
  • With the help of outside data from applications like oracles, smart contracts can perform more advanced tasks such as staking tokens, true one-step verification and guaranteeing the authenticity of documents.

Smart contracts are more vulnerable to exploitation than traditional programs because they are difficult to edit once they are on the blockchain. For instance, a bug in the smart contract that helped run the Nomad bridge didn’t fully verify transactions, allowing thousands of users to withdraw over €190 million from the dapp.



A stablecoin is a cryptocurrency designed to maintain a fixed value. These are split into three main types:

  • Fiat backed — The most common stablecoins have their value pegged to a fiat currency and are backed by fiat funds equivalent to that amount. A stablecoin’s value pegged at €1 will always be €1 and backed by €1 in a bank account.
  • Crypto-backed — These are backed by an equivalent value in other cryptocurrencies or funds
  • Algorithmically pegged — These maintain their value by altering supply and demand. For instance, the Luna token was kept more stable by being connected to the USDT token in the same Terra blockchain system. This example also demonstrates the dangers of relying on stablecoins as the Luna token infamously crashed under alleged market manipulation.

Stablecoins have become a popular money transfer mechanism as it is almost always faster with lower transaction fees than through physical banks.



A token is an electronic proof of asset ownership. These are typically split into two types. Fungible tokens like Bitcoin are identical, exchangeable tokens; non-fungible tokens (NFTs) are unique and cannot be reproduced.

While not every blockchain has a token, most deploy a form of token to take advantage of their utility value. Uses for tokens include:

  • Cryptocurrencies are the most common form of tokens that can be exchanged for goods and services
  • Payment or utility tokens can be used to pay for services but only on the blockchain that produces the token. These could for instance be the in-game currency for a blockchain-based video game
  • Governance tokens can be seen as shares in a blockchain, giving you voting rights on major decisions regarding the future direction of that relevant blockchain
  • NFTs that prove ownership over a unique digital asset such as art or a venue ticket.



The Trilemma refers to the problem every blockchain has in having to compromise on either security, decentralization, or scalabilityCoined by Vitalik Buterin, one of the Ethereum co-founders, the trilemma points to each of the issues being interconnected:

  • Increasing decentralization makes the blockchain more computationally complex, slowing down transaction speed (scalability), and requires more work to keep the network secure
  • Highly secure blockchains cannot handle many transactions efficiently and so compromise on scalability
  • Increasing transaction speed requires reducing the computational load in some way. This compromises decentralization and security.

All major blockchains are struggling to find a happy medium to this question. Most of them focus on emphasizing at least two of the three in accordance with what they want their blockchain to accomplish.



A wallet stores your public and private keys so that you can access all your tokens. There are two main types of wallets:

  • fully digital “hot” wallets such as Metamask that allow access from any device with just an internet connection.
  • physical hardware “cold” wallets that store the keys offline. The Ledger USB drive for instance acts as a cold hardware wallet for your keys that you access only when plugging it in. Even a piece of paper with both keys written on them could be considered a cold wallet.

Hot wallets are more convenient to use but more vulnerable than cold wallets due to being connected to the internet.



Web3 or Web 3.0 is an umbrella term for projects deploying or using blockchain technology. These are the products that are considered to be suitable for the next web-volution.

The term Web3 is a description for what many consider is the supposed next stage of the internet following Web1 and Web2. The line of thinking is as follows:

  • Web1: also known as the ‘read-only’ form of the internet. The first version of the web in the 1990s was consuming static HTML pages that technical people built onto the web. Users could only look and read what other people posted on web pages. Projects were a collaborative effort, open-source, and unrestricted.
  • Web2: also known as the ‘read and write’ form is the current, modern form of the internet. Interactivity, interconnectivity, and content creation were introduced which allowed non-technical individuals to create and share content online. Users on social media can be creators and consumers simultaneously. This was facilitated by large corporations such as Google, Facebook, and Amazon Web Services. They now extract value from both the creators of internet content and the users who consume this content. Additionally, they mandate and control what can be created and posted on their platforms or communicated through their servers.

Web3 is considered to be the ‘read, write, and own’ form of the internet. It aims to replace the larger centralized forces of Web2 such as Google and Facebook with DAOs and decentralized governance. When users create, interact with, or contribute to content, they can claim ownership over that content as individuals instead of only with a corporation’s permission. This ownership can now be technologically instead of legally or morally secured. The dream is a bottom-up construction of the internet and active participation from every contributor who wants to join the community.



Appendix: How to speak Web3


Alpha: valuable insider information

Alt: short for altcoin, any new, gimmicky, or not established coin in the ecosystem (e.g. Dogecoin)

Ape: someone bullish on Web3

Buidl: build

DYOR: do your own research

FUD: fear, uncertainty, doubt

Fren: friend

Gm: good morning, a common greeting and used to promote positivity and a sense of community within the Web3 sphere

GMI: going to make it

HFSP: have fun staying poor

Hodl: hold. To have faith in a cryptocurrency

LFG: let’s fucking go

NGMI: not going to make it

PFP: profile picture

Rekt: wrecked. To have made a significant loss

Ser: sir

Shill: to overmarket something to the detriment of your own status

Wen: when

WGMI: We are all going to make it