Glossary

Authra — A decentralized trust layer that verifies real-world network conditions and entities using the Three-Trust Fabric and an Orbit L3 chain.

  • BLE Corroboration — Cross-checking nearby Bluetooth Low Energy beacons/devices as an extra presence signal.

  • BoLD — Arbitrum’s permissionless dispute protocol (fraud proofs) enabling open validation with bounded challenge/liveness periods.

  • Burn Mechanism — A token sink that destroys a portion of fees or penalties to counter emissions and align incentives.

  • Chain-Health Oracle — A score and API that expose real-time chain and network health signals to automate safeguards and throttles.

  • CTB / TCS — Chain-time baseline and clock-sync services used to standardize time across devices and anchors for consistent ordering.

  • DAC Policy — The rules for committee rotation, quorum thresholds, and transparency logs for AnyTrust data availability.

  • Delayed Inbox / Force-Inclusion — A censorship-resistance path that guarantees transactions can be included even if a sequencer misbehaves.

  • Dynamic Staking — Adjusting stake requirements by role, region, or risk so security scales where threats are higher.

  • Emergency Pause — A narrowly scoped control to halt specific flows during confirmed abuse, with auditability and strict limits.

  • Emission Schedule — Programmed token release over time (e.g., to fund rewards) with guardrails to avoid runaway inflation.

  • Fee-to-Burn Band — A policy range where fees are partially converted to burns to stabilize token dynamics.

  • Governance (Multisig + Timelock) — Controlled parameter changes with delay windows and shared custody to reduce unilateral risk.

  • Orbit L3 — An application-specific Arbitrum Orbit chain (Layer 3) that executes Authra logic and batches state to an upstream L2/L1.

  • Passpoint / OpenRoaming — Wi-Fi federation standards enabling secure, seamless roaming that can act as additional presence/identity signals.

  • Performance (QoE) — Telemetry that captures quality-of-experience (e.g., throughput, latency, loss, jitter) to verify how a network behaved.

  • PQC (Post-Quantum Cryptography) — Cryptographic schemes designed to remain secure against quantum-capable adversaries.

  • Precision Modes — Tunable proof settings (e.g., coarse vs high-precision signals) balancing accuracy, privacy, cost, and battery.

  • Presence (PoP) — Evidence that a device, user, or asset was really at a place/time, established via multi-signal corroboration.

  • Provenance — Cryptographic lineage of data and actions to prevent tampering or misattribution.

  • Resilient Transport (Layer 3) — Authra’s continuity layer for moving proofs and control messages across unreliable networks.

  • Rollup Mode (fallback) — A stricter DA option that posts full data on-chain for maximum assurance when policy or risk requires it.

  • RTK — Real-Time Kinematic positioning that uses carrier-phase corrections to achieve centimeter-level location accuracy.

  • Scanner / Indexer / Bridge (Non-Consensus Roles) — Off-chain roles that fetch, enrich, or relay data without producing blocks.

  • Sequencer — The service that orders L3 transactions; may apply policies like fairness windows or Timeboost.

  • SLA / SLO — Service Level Agreement (external contract) and Service Level Objective (internal target) that Authra can measure and enforce.

  • Staking / Bonds — Economic collateral that participants lock to back their assertions or roles, slashable on abuse or invalid proofs.

  • Sybil Attack — An adversary creating many fake identities to game rewards or distort network measurements.

  • Temporal Anchoring — Periodic commitment of proof digests to the chain so evidence gets an immutable, verifiable timestamp.

  • Terrascient — The enterprise analytics product that consumes Authra proofs for dashboards, SLA verification, and enforcement workflows.

  • Timeboost — A sequencing policy that improves fairness by giving recent arrivals a protected window before fee-based reordering.

  • TinyML — Lightweight machine-learning models running on devices to score signals locally without heavy compute or bandwidth.

  • TruePing — The edge app/SDK that collects Presence/Performance signals and formats them into Authra-ready proofs.

  • TrustMesh (AI Layer) — Authra’s analytics layer that fuses signals (on-device + cloud) to detect anomalies, spoofing, and Sybil patterns.

  • Yeggina Proofs — The paper’s dual-core proof family that fuses Presence and Performance into verifiable, on-chain attestations.

  • ZK (Zero-Knowledge) — Cryptography that proves a statement true without revealing the underlying data, used for privacy-preserving verification.

Sign in to newsletter and never miss any update.

Navigation

Home

Home

Protocol

Protocol

Ecosystem

Ecosystem

Blog

Blog

About

About

Legal

Privacy Policy

Privacy Policy

Terms of Service

Terms of Service

Disclosures

Disclosures

Security

Security

Whitepaper

Whitepaper

Support Wallet

Support Wallet

Grants & Parterships

Grants & Parterships

© 2025 Authra. All rights reserved.

Sign in to newsletter and never miss any update.

Navigation

Home

Home

Protocol

Protocol

Ecosystem

Ecosystem

Blog

Blog

About

About

Legal

Privacy Policy

Privacy Policy

Terms of Service

Terms of Service

© 2025 Authra. All rights reserved.

Sign in to newsletter and never miss any update.

Navigation

Home

Home

Protocol

Protocol

Ecosystem

Ecosystem

Blog

Blog

About

About

Legal

Privacy Policy

Privacy Policy

Terms of Service

Terms of Service

© 2025 Authra. All rights reserved.