Trust boundary terms
Fraud and wallet security vocabulary explains where users delegate trust, where controls intervene, and where approval flows fail. This hub unifies payments authentication language with crypto wallet risk language.
Understand the vocabulary of trust and failure points in payment and wallet security flows.
Browse all topic termsFraud and wallet security vocabulary explains where users delegate trust, where controls intervene, and where approval flows fail. This hub unifies payments authentication language with crypto wallet risk language.
Some terms verify the user, others protect the credential, and others govern signing behavior. Without separating identity, possession, and authorization language, fintech security analysis becomes sloppy.
This hub is designed for teams that manage fraud rates, wallet UX, recovery flows, and approval risk. The point is not to define security in the abstract, but to connect terms to failure modes that affect real products.
EMVCo
EMVCo: EMV 3-D Secure
Primary source for 3DS protocol terminology.
Financial Action Task Force
FATF: The FATF Recommendations
Primary international AML/CFT framework for customer due diligence, sanctions screening, and financial crime controls.
Coinbase
Coinbase Learn: Crypto glossary
Reference source for crypto infrastructure terminology.
Private Key
Code allowing access to cryptocurrency funds.
Wallet (Digital)
Software or device to store crypto keys.
Cold Wallet
Offline storage for cryptocurrency.
Hot Wallet
Crypto wallet connected to the internet.
Multisig Wallet
Wallet requiring multiple signatures to send funds.
Blind Signing
Signing a transaction without fully decoding and reviewing the human-readable contents.
Seed Phrase
List of words to recover a crypto wallet.
Cryptojacking
Using others hardware to mine.
Consensus Mechanism
Method used to achieve agreement on the blockchain.
Consensus Algorithm
Mechanism to agree on data.
Long Position
Buying a security with the expectation it will rise in value.
Stock
Security representing ownership in a corporation.
PCI DSS
Payment Card Industry Data Security Standard.
STO
Security Token Offering.
SOX
Act protecting investors from fraud.
Biometric Auth
Identity proof via biology.
Air Gap
Offline security measure.
Keystore File
Encrypted version of a private key.
Smart Contract Audit
Security review of code.
Asymmetric Encryption
Encryption using public and private keys.
Howey Test
Test to determine if an asset is a security.
Cybersecurity
Practice of protecting systems from digital attacks.
Phishing
Fraudulent attempt to obtain sensitive information.
Firewall
Network security system monitoring incoming/outgoing traffic.