The ability to write to the ledger by issuing blocks. In other contexts, it means who has permission to a particular digital asset.
The ease of use and availability of a system or technology for users.
In IOTA 2.0, users can feelessly mint their own blocks, meaning that almost anyone can be a block producer. This requires a high block creation not typically possible with blockchains.
A component of the system used for economic activity in the protocol, including staking for validation, claiming Mana rewards, and holding credits to issue blocks.
UTXOs that map unique identifier to a mutable state. These outputs can be used by a user to hold funds, issue blocks, stake, and delegate.
Checksum validation is a method to ensure an address is valid and free of typographical errors.
Address Unlock Condition
A type of output unlock performed via a Signature Unlock in a transaction by signing the hash of the transaction data.
Validators whose actions deviate from the protocol.
Application Programming Interfaces; These interfaces facilitate interactions between applications and the Tangle.
Handles block contents and payloads, especially significant for consensus and ledger state maintenance. All applications use the communication layer to transmit and store data.
Measure of approval of each conflicting transaction using the voting power of the validation blocks "issuer".
In IOTA 2.0, parents are approved by their referencing messages, known as approvers. It's essentially a reverse mapping of parents. An approver might be either strong or weak, as in the parents definition.
Instead of the bundle construct, IOTA and Shimmer use simpler Atomic Transactions. These transactions encapsulate all related information within a single message, reducing network overhead, improving spam protection and rate control, and simplifying Merkle proofs. This simplification also lowers implementation overhead and enhances the maintainability of the core node software.
The use of technology or systems to perform tasks or processes without human intervention.
A mechanism enabling nodes to select their neighbors automatically, without the node operator's manual intervention.
The funds on the addresses (account). These are always available and cannot be deleted or forgotten.
A validation check within the VM to ensure that generated outputs match the consumed inputs.
(Deprecated) Node software developed by the IOTA foundation, written in the Rust programming language.
Block Issuance Credit; BIC are a form of Mana stored in Accounts that are burnt as spam protection.
Data objects processed by nodes: they contain single transactions. A block is composed of 1) block header (auxiliary information to identify the block); 2) transaction/data; 3) signature.
Creates new blocks based on payloads by selecting tips for approval, generating slot commitments, registering timestamps and signing the information.
The block header is all of the fields in the block wrapper except for the block and signature
The initial destination for incoming blocks that need to be parsed and processed.
Entities responsible for creating and issuing new blocks into the network.
Additional information locally (i.e., in the node) associated with a block
The process of receiving blocks, either created locally by a node or received from a neighbor.
Digital signatures attached to blocks to ensure their authenticity.
The block wrapper is additional data around the typical blocks giving important metadata, including the version, time, and block issuer. This metadata allows nodes to follow the right version of the Tangle, to verify the timestamp of blocks, and to identify the creator of each block.
As more transactions are issued, the block rate and size become bottlenecks in the system. It becomes increasingly difficult to promptly process all incoming transactions. Attempts to speed up block rates result in more orphaned blocks (blocks left behind), reducing the security of the blockchain.
Responsible for Tangle and ledger order, managing received blocks, and identifying conflicts. Creates conflicts in the ledger.
An attack where a node downloads malicious snapshot files, including invalid transactions and balances.
The initial phase of the IOTA 2.0 network where rewards and delegation mechanisms are designed to encourage early contributions to the network"s security.
The order of events in the Tangle that reflects the causal relationships between transactions.
The Chain-Switching Rule is an algorithm that allows nodes to switch their Slot Commitment Chain to the heaviest one, resolving divergent network conditions and discrepancies in the commitments.
A permanode solution from the IOTA Foundation. It enables storing all transactions reaching a node in a secure and scalable distributed database. Chronicle allows the Tangle's unlimited data flow to be stored indefinitely and makes it easily accessible.
The name of the IOTA 1.5 network upgrade.
Assets or tokens locked up as a security deposit when participating in validation or consensus.
A field in a block that contains a hash of information from older slots and is used for creating Slot Commitment Chains.
The procedures and mechanisms involved in the periodic change or reshuffling of validator committees. Normally committee rotation happens every epoch.
Manages how blocks connect with each other to form the Tangle, regulated by the Rate Control and Congestion Control.
The past cone is all the elements referenced by an element of a DAG. The future cone: all the elements that reference an element of a DAG.
The stages for a block (transaction) to be secured are Pre-Acceptance, Acceptance, Pre-Confirmation, Confirmation, and Slot Finalization. Pre-acceptance (pre-confirmation) requires approval by an online (total) supermajority of the validator committee. Acceptance (confirmation) requires approval by an online (total) supermajority of pre-accepted (pre-confirmed) blocks. Slot Finalization requires Confirmation of a block that includes the corresponding slot commitment.
The procedure through which blocks and transaction are approved by the validator committee.
Transactions are considered confirmed in the Tangle only when they are directly or indirectly referenced by a milestone validated by the Coordinator node. Nodes can recognize milestones because they're all configured with the Merkle root address of a Coordinator they trust to confirm messages. Using this address, nodes can validate the signatures in milestones to verify whether the trusted Coordinator signed them. To ensure that new messages always have a chance of being confirmed, the Coordinator regularly sends indexed milestones. This allows nodes to compare the indexes of their milestones and check whether they are synchronized with the rest of the network.
A collection of conflicting transactions that require resolution and are tracked during the booking process.
Transactions that consume the same UTXO.
Congestion Control Mechanism
An algorithm to regulate the influx of blocks in the network to maximize throughput and minimize delays.
Agreement between nodes on the inclusion of blocks in the Tangle and validation of transactions.
Consensus flags for a block represent confidence levels about whether the block is successfully gossiped and included in the Tangle by the network. They include Pre-Acceptance, Acceptance, Pre-Confirmation, Confirmation, and Finalization
An algorithm for achieving agreement among nodes in a network about a subject (e.g., the state of the network or the validity of transactions)
Hardware components or devices that are affordable for individual consumers.
(only up to iota 2.0) A trusted entity used as protection against malicious transactions. The Tangle is still in its beta phase and relies on the coordinator. This is open-source and runs on a Hornet node. The COO acts as a centralized, voluntary, and temporary alternative consensus mechanism for the Tangle by regularly sending honest transactions to the full nodes. These transactions contain a signed message with no value, called a milestone. Full nodes consider a transaction as confirmed only if it is approved by a milestone. The coordinator can confirm transactions but can't bypass consensus rules. Hence, creating, freezing, or stealing tokens is impossible for it. The coordinator's influence on the tangle is limited as the tangle is continuously monitored by all other full nodes. The COO will be switched off with the IOTA 2.0 upgrade.
A digital or virtual form of currency maintained by a distributed ledger.
Confirmed transactions per second.
A system for valuing transactions. The cumulative weight of a transaction increases with each additional transaction that references it. A path through transactions with a higher cumulative weight is preferred when selecting tips.
This is one of the currently used hash functions. It's based on the "sponge" construction invented by the creators of Keccak (SHA-3).
Directed Acyclic Graph; A data structure consisting of nodes (blocks) connected by edges (references) without cycles, used to represent transactions and their dependencies in The Tangle.
The Tangle proves the integrity of data (verifiability of completeness and origin) in a reliable manner. Current cryptographic methods for this have repeated security vulnerabilities, making data prone to manipulation. This is especially problematic in cloud computing where sometimes third-party audit tools are even used (for a fee) to ensure this data integrity. IOTA and Shimmer offer a relatively straightforward and fee-free solution to this with their protocol.
The process of how data, specifically blocks, moves through the protocol, from reception or creation to acceptance in The Tangle.
Contrary to the internet, neither the IOTA nor Shimmer protocols serve as data storage. The Tangle is not designed as a data repository. If one wishes to maintain a decentralized transaction history, they can either design a second-layer solution themselves or commission third parties for this task. At its core, IOTA and Shimmer prioritize performance, throughput, and security over acting as a global database.
A data structure is a way of organizing data so that it can be efficiently and effectively used. The Tangle uses a variety of data structures, including blocks, payloads, transactions, and commitments, to store and process data.
These are confirmed directly and are notarized. With the help of "notarization", it can be proven that an electronic document existed in a certain form at a certain time and has not been changed since its creation. When a notarization is created, a unique hash (fingerprint) of a document is calculated and stored together with a timestamp in the ledger (Tangle) in an immutable manner.
The gradual reduction of Mana over time to prevent a monopoly and encourage continuous contribution of work. Both Mana and pending Mana decay in proportion to their value, ensuring that Mana does not perpetually accumulate over time.
Ensuring fair opportunities and accessibility to network resources and functionalities for all participants.
Networks where control and decision-making authority are distributed among multiple nodes rather than being centralized.
Decentralized Finance; A financial system built on decentralized technology that provides financial services without intermediaries.
The process of token holders entrusting their delegated stake to a validator to act on their behalf and get rewarded with Mana.
Also known as “provable” or “absolute”, finality. An absolute level of certainty that once a transaction is added to the ledger, it cannot be changed or reverted. Deterministic Finality can be faster than other types of finality but halts when there is a network split or the activity of the network is low.
DevNet, or developer network, is a dedicated test network to experiment with and test a Tangle that operates without a Coordinator.
Digital possessions or resources, such as cryptocurrencies or tokens.
The ability for individuals and entities to have control and sovereignty over their digital lives, including their data, assets, and identity.
The online representations or personas of individuals that are associated with their personal information and activities. Typically, these are implemented in a system where identities can certify other entities through a credential wallet.
A type of digital asset typically built on a blockchain or distributed ledger technology.
Distributed Ledger Technologyl; A type of technology that enables the secure and decentralized storage and sharing of information across a network and allows unaligned parties to maintain a common state. A DLT is a database system that enables the peer-to-peer transfer and recording of digital assets. Each transaction within a DLT is recorded in a distributed ledger, which is maintained across all network nodes.
Two transactions that attempt to consume the same UTXO. Double-spending represents a major threat to digital currency systems. It involves spending the same digital token more than once. Digital tokens, unlike physical currency, comprise digital files that can be easily duplicated or counterfeited.
Deficit Round Robin; An algorithm used in the IOTA2.0 node"s scheduler to dequeue and prioritize blocks for gossiping.
(iota 1.5) To prevent IOTA from being exploited, one might continually send 1i to newly generated addresses for years, causing the ledger’s memory requirements to surge until only large servers could operate a full node. With Chrysalis, microtransactions (<1Mi) require the recipient address to enable dust. This permits a limited amount of dust transactions. Additionally, addresses with Colored Coins must be tokenized. Post-Coordicide, IOTA 2.0 will introduce a different solution.
The ability of the system to continue to accept or confirm transactions despite arbitrary number of validators crashing.
(In development for IOTA 1.5 and Shimmer): This feature enables the coordinator to issue a milestone while simultaneously setting the future PoW score. If the network is underutilized, the PoW will decrease to a level manageable by micro-devices. Conversely, the coordinator can increase the PoW difficulty during high utilization, making attacks prohibitively expensive.
An eclipse attack seeks to isolate a specific node rather than targeting the entire network.
A specific time period during which a dedicated committee is responsible for driving consensus. Epoch consists of multiple slots.
ETH Virtual Machine
A virtual machine (VM) executes Smart Contract code to ensure deterministic outcomes. The programming language used to run the code provides hooks to the VM's sandbox. In Shimmer's context, this is the ISC sandbox, limited to Shimmer tokens, thereby ensuring consensus revolves around these tokens. The VM handles the execution of the smart contract code, unrelated to the token type, be it ETH VM or Cartesi VM.
A type of Output Unlock Condition that makes outputs controlled by a receiver expire after a deadline, meaning that the original sender regains full control of the tokens in the output (also known as "bounce back").
Malicious actions or vulnerabilities that can be used to manipulate or compromise a system or network.
A property that ensures accessibility to network resources and functionalities for all participants, based in some Sybil protection algorithm.
A faucet is a reservoir of tokens. Users can easily request a limited quantity of tokens for testing purposes, which proves particularly useful for app developers.
Amount in Mana consumed by users for the creation of blocks.
For deterministic finality (like in IOTA 2.0), the state of a block or a transaction being irreversible and secure under any network conditions. For probabilistic finality, the state of a block or a transaction being irreversible and secure with certain set probability.
Finality Gadget Application
Manages flags used for consensus among nodes about transactions and block validity.
The irreversible operation where blocks receive sufficient approval and consensus, ensuring their permanence.
Firefly is a wallet designed to cater to the present and future needs of the IOTA and Shimmer ecosystems.
In IT, a fork represents a new development direction taken after branching out from an original project. The source code, or portions of it, is then developed independently from the parent project.
An algorithm for choosing between several chains; IOTA 2.0"s solution is the Chain-Switching Rule.
An output type, Foundry Outputs enables you to mint your own tokens on the ledger.
Full Nodes (Hornet)
Full nodes constitute the network's backbone. For a full node to be part of the peer-to-peer network, it must always be online and connected to other full nodes. Moreover, it has to synchronize its transaction database with every other full node in the network. Full nodes process transactions from clients (like wallets and DApps), append them to the ledger, and share them with all other network nodes.
The future cone refers to all messages that directly or indirectly reference a particular message.
Every slot commitment chain starts with the genesis commitment (commitment of slot 0) in order to be considered valid.
The initial slot in the protocol"s timeline from which all subsequent slots are linked.
The Genesis transaction is the inaugural transaction that spawned all IOTA and Shimmer tokens, distributing them to the purchasers' addresses.
A protocol for relaying information among nodes in a network.
Checksums generated from the encryption of variable-length messages. Hash values act like unique fingerprints for a long data set, with each message assigned a specific hash value.
History refers to the compilation of transactions that were directly or indirectly authorized by a specific transaction.
Holding IOTA Tokens
Owning and keeping IOTA tokens in one"s possession.
Interfaces that allow external program code to be integrated into an existing application to extend its functionality, modify its flow, or intercept certain events.
A community-developed IOTA Node written in the Go programming language. Additionally, the coordinator runs as a plugin via Hornet.
Hornet Node (Shimmer)
A Shimmer Node, also written in the Go programming language. Similarly to the IOTA Node, the coordinator runs as a plugin via Hornet.
The act of providing rewards or incentives to encourage specific behaviors or actions.
The process of adding blocks in the Tangle. It is based on Acceptance.
Determines whether a transaction has been accepted and confirmed by the network. For any given transaction and a list of tips, the inclusion state is true if the tip refers to that transaction.
The process of increasing the total supply of a cryptocurrency by minting or creating new tokens.
Input Validity Check
Verification within the VM to confirm that consumed inputs are valid and not conflicting.
Assurance that the data stored in the ledger has not been tampered with or altered in any unauthorized way.
The ability of different systems or technologies to work together seamlessly.
The latest version of the IOTA protocol, built upon years of research and solutions to create a functional and aligned network.
The economic system and activities surrounding the IOTA network.
The digital tokens specific to the IOTA network, granting voting power in the consensus mechanism and governance decisions.
A small amount of IOTA tokens required to be locked by an account to deal with storage consumption and to enforce dust protection.
Similarly to the Sender Feature, it enables a verified issuer to be defined directly inside an output. However, the Issuer Feature is only available for NFT Outputs.
Information contained in a block, the Issuer ID denotes the account that created the block.
A field in the block header that denotes the time at which the block was issued.
In DLT, a 2nd-layer refers to a secondary framework or protocol built on top of an existing distributed ledger. These secondary layers allow for additional applications to be executed without putting excessive strain on the base layer. Smart Contracts, for example, are executed on these second layers.
For a linear blockchain, this is the node that is supposed to add a new block to the blockchain (e.g in the context of Proof-of-Work, this is the first node that solves the cryptographic puzzle). For some DAG-based DLTs, this is the node which block is used to establish a total order on the set of blocks.
A decentralized record or database that stores and verifies transactions or information. It is the state maintained in a DLT.
The timely updating of the ledger with transactions issued by participants.
The collective state of the network"s unspent outputs, maintained by the Application Layer and used for consensus.
A process where voting power is delegated to a validator without locking up tokens, and the delegator is still rewarded with a share of the Mana reward.
The ability of a distributed network to make a continuous progress of the ledger.
User-defined conditions that nodes can consider during tip selection. In IOTA and Shimmer, nodes may not necessarily have the same view of the tangle. They can use various types of locally available information to enhance security.
Local snapshots help limit the memory requirements of nodes by allowing them to independently delete old, confirmed transactions from their databases, leaving behind a small file with the balances of respective addresses. This feature facilitates faster synchronization, reduces system resource requirements, and eliminates the need to wait for global snapshots for database cleanup.
The publicly accessible IOTA network where tradeable IOTA tokens on cryptocurrency exchanges are used.
A reward resource generated by holding IOTA tokens. It is utilized for block issuance, access to network throughput, and protecting against Sybil attacks.
The process of consuming a specific amount of Mana to create a block. The amount of Mana burned depends on recent congestion level.
Where transactions are kept in waiting before being processed and where all details of a transaction can be seen by anyone.
A Merkle tree is a data structure employed in computer science. In cryptocurrencies, Merkle trees are utilized for efficient and secure data encoding.
A message is a core data type that represents a vertex in the communication layer's DAG. It contains properties like references to other messages, the sender's public key, the issuing time of the message, the payload (interpretable by higher layers), the nonce for PoW requirement, and a signature. A message is not forwarded until it becomes "solid," i.e., its history is known to the node. Messages must meet a PoW requirement, which currently involves finding a nonce so that the hash of the message's fields (excluding the signature) has a certain number of leading zeros.
The extra information (metadata) that must be sent along with the actual data. This may include signatures, polls, and any other data transmitted over the network that is not the transaction itself.
Enables outputs to carry additional data.
Maximal or Miner Extractable Value; The potential profit that miners or validators can extract from information they glean from your transaction while it waits in the mempool.
(IOTA 1.5) Milestones are messages signed and issued by the coordinator. They are instrumental in ensuring healthy growth of the Tangle and guaranteeing finality. When milestones directly or indirectly approve a transaction in the Tangle, nodes mark the status of that transaction and its entire history as confirmed.
Messages Per Second; Represents the number of messages dispatched to the network every second.
Named after Bitcoin's creator, Satoshi Nakamoto, this consensus describes the use of a cryptographic puzzle (Proof-of-Work) to replace coordination/communication between known agents. Solving the puzzle determines the subsequent agent's action.
Directly connected network nodes that can exchange messages without intermediary nodes.
The level of traffic or demand on a network, affecting the speed and efficiency of transactions.
An identifier enabling user-specific subtangles. Nodes can only recognize messages from the network ID stipulated in their configuration file.
A field in the block header that identifies the network.
The layer of the IOTA protocol responsible for managing the P2P overlay network, including peer discovery, neighbor selection, and gossip.
The usefulness and functionality provided by the network to its participants.
Non-Fungible Token; A type of digital token that represents ownership or proof of authenticity of a unique item or asset.
A type of output that enables you to mint and define metadata for NFTs.
A device or computer that participates in the operation of a network, including processing blocks and transactions and maintaining its integrity through validation.
A node is any computer that communicates with other nodes in the network using specific software. Essentially, nodes act as connection points for data transfers. The Tangle employs various node types, including full nodes (Hornet, Bee), permanodes (Chronicle), and smart contract nodes (Wasp).
Nodes in the network that are not validators.
Oracles establish a secure, decentralized bridge between digital and physical realms. They introduce off-chain data to decentralized applications and smart contracts within the network.
A transaction (or block) lacking references from any subsequent transaction (or block). Orphans are unconfirmed and remain excluded from consensus.
A block that is not accepted becomes orphaned.
A buffer where soon-to-be-scheduled blocks are enqueued before they are gossiped to the network.
Outputs (“unspent transaction outputs” - UTXOs) make up the ledger state. Transactions update the ledger state by taking as input a set of outputs and producing a new set of outputs.
P2P Overlay Network
A network where all nodes have equal roles and perform the same actions, running on top of another network like the internet.
The parallel validation of transactions without requiring total ordering. Processing can be done on multiple cores at the same time.
Parallel Write Access
The ability for multiple participants to simultaneously write to the Tangle in the IOTA 2.0 protocol.
Parasite Chain Attacks
A double-spending attack targeting the Tangle. Attackers attempt to reverse a transaction by creating an alternate Tangle where the funds remain unspent, seeking to convince the network majority to accept this version as legitimate.
Blocks that a particular block in the Tangle references as its predecessors.
A message can directly reference up to 8 preceding messages, known as its parents. In IOTA 2.0, a parent might be either strong or weak (see approval switch).
Initial step of the Data Flow, translates bytes into usable information, filtering out redundant or invalid data.
The ability of a system to continue working despite a communications break (partition) in the connection between nodes.
A segment of the Tangle can operate offline, disconnected from the main tangle for a duration, and later reconnect once an Internet connection resumes.
The set of messages that are directly or indirectly referenced by a given message is termed its past cone.
The data carried by a block, which is interpreted by the upper layers of the IOTA 2.0 protocol and used by applications within the IOTA network.
Module in the Network Layer that looks for nodes that participate in the network.
Peer to Peer Network
A decentralized network comprising distinct nodes interconnected and engaged in data exchange.
The procedure of detecting and establishing connections with other network nodes.
A transaction that has been propagated through the network but not yet confirmed.
This node type permanently retains the entire transaction history, potentially with external storage aids, or selectively stores specific transactions (selective permanode).
A system that allows anyone to participate and interact without requiring authorization or approval.
Proof of Inclusion; PoI enables proving that a transaction was indirectly referenced by another without needing to present the entire chain of transactions linking them. Instead, a sequence of hashes replaces actual transaction data to validate the inclusion of a transaction in the referenced subtangle.
Proof of Work; A computationally intensive mathematical operation that prevents spam attacks by requiring a costly cryptographic puzzle solution that is, nonetheless, easy to validate.
A block is given the “Pre-Acceptance” flag when an online supermajority of the committee references it (directly or indirectly).
With probabilistic finality, finality is reinforced with each block added to the blockchain. The more blocks added after block A, the greater the probability that block A will not be reverted.
A field in a block header that denotes which protocol version apply to the block.
Process of removing or discarding unnecessary data (such as blocks and transactions) from the node database.The primary purpose of pruning is to reduce the storage requirements of a blockchain system while retaining essential information for its operation. Normally the removed data is already finalized.
Public and Private Keys
These are essential components of cryptographic systems utilizing key pairs, consisting of public keys, which can be shared, and private keys known only to the owner. The generation of these keys depends on cryptographic algorithms based on mathematical problems yielding one-way functions. Security depends on the private key remaining private. Public keys derived from the private key can be shared and used to verify ownership of the private key without revealing it. In IOTA and Shimmer, public keys function as addresses.
A module that determines the fair rate at which an issuer can issue new blocks.
The process of resending a transaction through the reselection of a tip, referencing newer tips, and performing PoW again.
Rebroadcasting involves retransmitting a transaction. If a node goes offline while a transaction is being sent, it may not relay the transactions to its neighbors, making these transactions invisible to the network. Consequently, these transactions will never be referenced by the coordinator and hence never confirmed. Resending a bundle refers to transmitting the same bundle to a node, providing another opportunity for your transactions to be relayed to the network.
Connections established by blocks with other blocks, regardless of witness or approval weight.
Following the IOTA 1.5 Chrysalis upgrade and the introduction of the Ed25519 signature scheme, reusable addresses are now possible.
In cryptography, a salt is a random string appended to plaintext before further processing, thereby enhancing input entropy (disorder). It's commonly used in password storage and transmission to bolster information security.
A controlled environment where programs can be tested safely.
A component that manages the scheduling of blocks for gossiping, ensuring fairness and preventing spam.
Used to specify the validated sender of an output.
Sharding is a type of database partitioning that divides a large database into smaller, more manageable segments, or shards. Each shard contains a unique set of account balances, and nodes are assigned to individual shards to validate transactions. The goal is to increase transaction throughput and thus address scalability issues.
Signatures prove ownership of an address. Nodes require this proof to validate a transaction. To prove ownership, input transactions must be signed with the private key used to create the address.
Time interval of fixed duration. The protocol divides time into non-overlapping slots. For each slot, nodes generate a slot commitment which encapsulates all accepted blocks and transactions issued within this time interval.
Slot commitments are checkmarks of all blocks (and their contents) that occur within slots. A slot commitment always refers to the previous slot commitment, creating a chain.
Slot Commitment Chain
A chain created by a sequence of slot commitments. It is used to determine eligible blocks and finality.
Slot Commitment ID
A field in a block header that identifies the slot the block commits to.
Smart contracts are programs that execute contracts automatically.
Smart Contract Chain
Smart contracts operate through a contract chain, which represents the contract state. Every request to a smart contract adds a new block to this chain. These updates are confirmed in one block, also containing all past states. The chain can contain multiple Smart Contracts all working on the same global state. Essentially, the Contract chain is a blockchain anchored on the Tangle. IOTA Smart Contracts are similar to "classic" Smart Contracts but feature multiple parallel chains that use the same native IOTA and Shimmer tokens, enabling trusted interoperability between different applications.
Contracts with predefined rules encoded on a distributed ledger with conditions that are automatically enforced and executed by the nodes
A snapshot is a special feature of the Tangle that removes all transactions, keeping only those with a balance > 0. Metadata like tags and messages are also deleted, leaving a list of addresses and balances. After a snapshot, nodes use this list as the new "genesis" or starting point for the Tangle. This reduces the size of the Tangle, allowing nodes to use less memory. Full nodes can perform "Local Snapshots" independently and at their own discretion.
The replication of real-world social dynamics in a digital system, including account-based digital identities and the ability to manage assets and digital identity easily.
Blocks consistently linked to past blocks, ensuring no missing information when reviewing past blocks.
The process of ensuring that a block has all its dependencies and can be considered solid within the Tangle.
Solidification time is when a node has received the entire history of a transaction.
Ensures blocks are consistently linked to past blocks, creating solidity and preventing missing information when tracing back in time.
Non-transferable tokens representing traits/features/achievements of a person/entity.
An attack in which a malicious node tries to split the Tangle into two branches. Splitting attacks aim to slow down the consensus process or enable double spending.
Tokens that are locked up as collateral to stabilize voting power distribution and protect the protocol.
The process of holding and locking cryptocurrency in a wallet to support the operations and security of a blockchain network.
The name of the first Shimmer network upgrade.
State machines are used in DLTs to model and implement the behavior of the system. For example, a DLT might use a state machine to model the state of the ledger, the state of the participants in the network, and the state of the consensus algorithm.
Storage Deposit Mechanism
The Storage Deposit Mechanism prevents the ledger from bloating by requiring a small deposit for transactions that store additional data (like NFT metadata). This is implemented through a type of Output Unlock Condition known as the Storage Deposit Return. This unlock condition allows a return amount to be specified that has to be refunded to the original transaction sender"s account. The deposited tokens are refunded when the data is no longer needed, i.e., when the output is consumed by removing the additional data.
A technique that enables the processing of blocks immediately on arrival.
IOTA Streams is a second layer data transfer protocol used for various types of data transfer, including streaming data. It allows devices to encrypt entire data streams and anchor them in the IOTA Tangle. IOTA's consensus protocol ensures the integrity and authenticity of these message streams. This makes IOTA Streams particularly useful in industries where integrity, privacy, and immutability are crucial.
A consistent section of the Tangle (i.e., a subset of messages / value objects) such that each contained message/value object also contains its referenced messages/value objects.
A threshold for achieving consensus flags. A supermajority is a subset of the committee that has more than two-thirds of the total voting power.
Attacks where a malicious entity creates multiple identities or nodes in a network to gain control or disrupt its operation.
Sybil Protection Mechanism
A mechanism that prevents malicious users from overwhelming the network by creating multiple fake identities (Sybil attacks).
A network is synchronous if the duration between the transmission of a data block by one node and its receipt by another node is both predictable and consistently limited. For instance, it may always remain under 0.5 seconds.
A process when a node downloads and verifies the entire history of the Tangle corresponding to a slot commitment chain. This allows to ensure that it has an up-to-date and accurate copy of the ledger.
Enables outputs to be tagged with a small amount of data intended to be used as an index.
A data structure based on a DAG used to store blocks and their relations. The Tangle is the core underlying data structure of IOTA.
The entire record of blocks and transactions in The Tangle, up to the last available snapshot.
A trit (trinary digit) can have three states: -1, 0 and 1. Three trits result in one tryte, which can thus represent 27 combinations. In IOTA, the letters A-Z (26 in total) and the number 9 are used for this purpose.
The rate or capacity at which transactions or data can be processed or transmitted within a given timeframe by the network.
The principle of granting proportional access to network throughput based on a participant"s Mana holdings in IOTA 2.0.
A type of Output Unlock that sets a deadline after which an output can be consumed.
A block that is not referenced by any other block in the node"s local perception.
Adds scheduled blocks to tip pool, maintains tip pool by removing too old or newly approved blocks.
Collection of blocks selected by the node for potential selection as a parent.
The process of selecting previous transactions to reference in a new transaction. These references allow a transaction to tie into the existing data structure. IOTA and Shimmer only enforce that a transaction approves up to eight other transactions, the tip selection strategy is left to the user (with a suitable default provided by Shimmer).
A solid end transaction that has not yet become a parent.
The digital currency form (cryptocurrency) of IOTA. It is a powerful tool for transferring value between people and machines. The total number of IOTA tokens is 2,779,530,283,277,761. The base units are Pi, Ti, Gi, Mi, ki, i
The economics and principles governing the behavior, distribution, and value of tokens within a system or network.
Sequential order of transactions typically found in linear chain DLTs.
The record of transferring digital assets or data from one participant to other participant(s).
The confirmation of a transaction is defined when a transaction is accepted by the validator committee and one of its attachments (blocks containing this transaction) is confirmed.
The transaction payload is the essence of a transaction that allows to exchange tokens. It is the data that is included in a transaction that specifies the tokens to be exchanged, the parties involved, and the terms of the exchange.
The process of verifying the correctness of a transaction within the protocol.
Trinity (Iota 1.0)
The deprecated IOTA Wallet
Tip Selection Algorithm; An algorithm determining which tips should be referenced by a newly created block.
Blocks or transactions that have not yet been confirmed by the validator committee. See Confirmation.
Unlock conditions are special output unlocking logic that need to be satisfied whenever that output is consumed.
Unspent Transaction Output; An Unspent Transaction Output ledger state is one where balances aren"t directly associated with addresses but with the outputs of transactions. In this model, transactions specify the outputs of previous transactions as inputs, which are consumed in order to create new outputs. A transaction must consume the entirety of the specified inputs.
UTXO stands for "unspent transaction output". It is a type of addressing model that tracks not only the credits on an address but also their origins and destinations when spent. Each token on an address is uniquely identifiable, and each output names the exact token it wants to move. This model enables faster and more accurate conflict resolution, enhancing the protocol"s resilience and security.
The process of verifying that transactions conform to certain rules set by the protocol.
Validation Blocks is a special type of blocks that are issued by members of the Validator Committee. These block allows to reach consensus in the network.
A validator is a participant in a Proof of Stake (PoS) network that stake their tokens in order to validate transactions and blocks and maintain the security of the DLT/blockchain.
For an epoch, a committee selection procedure determines a subset of validators, who will carry out the consensus protocol during the epoch. This subset is called the validator committee and the validators included in the said subset are called the committee members for the epoch.
The process of registering as a validator by issuing a block with a special payload type. The registration is only considered successful when the registration block and the mutating transaction get accepted
The act of taking or deriving value from a system or network without contributing to its growth or sustainability.
Value transactions either withdraw tokens from an address or deposit them to an address. Nodes verify these transactions to ensure that the sender owns the Shimmer tokens and that additional tokens are not generated. To do this, the following checks are performed: All Shimmer tokens withdrawn from an address are also deposited into one or more other addresses; the value of each transaction does not exceed the total global supply; signatures are valid.
Virtual Machine; A component responsible for executing transactions within the ledger.
Volume and Velocity
The capacity to handle a large number of transactions quickly, with fast confirmation times.
The influence or weight a validator in the committee has in the consensus process.
Wasp is the node software that implements Smart Contracts on the Tangle.
(iota 1.5) A simplified, conflict-avoiding approach that improves the speed and efficiency of tip selection, eliminates certain attacks, and significantly reduces the need for reattachments.
Measure of approval of each block using the voting power of the validation blocks" issuer.
Writing to the Ledger
The act of creating blocks containing transactions.