Search...
⌘K
Glossary
Authra — A decentralized trust layer that verifies real-world network conditions and entities using the Three-Trust Fabric and an Orbit L3 chain.
BLE Corroboration — Cross-checking nearby Bluetooth Low Energy beacons/devices as an extra presence signal.
BoLD — Arbitrum’s permissionless dispute protocol (fraud proofs) enabling open validation with bounded challenge/liveness periods.
Burn Mechanism — A token sink that destroys a portion of fees or penalties to counter emissions and align incentives.
Chain-Health Oracle — A score and API that expose real-time chain and network health signals to automate safeguards and throttles.
CTB / TCS — Chain-time baseline and clock-sync services used to standardize time across devices and anchors for consistent ordering.
DAC Policy — The rules for committee rotation, quorum thresholds, and transparency logs for AnyTrust data availability.
Delayed Inbox / Force-Inclusion — A censorship-resistance path that guarantees transactions can be included even if a sequencer misbehaves.
Dynamic Staking — Adjusting stake requirements by role, region, or risk so security scales where threats are higher.
Emergency Pause — A narrowly scoped control to halt specific flows during confirmed abuse, with auditability and strict limits.
Emission Schedule — Programmed token release over time (e.g., to fund rewards) with guardrails to avoid runaway inflation.
Fee-to-Burn Band — A policy range where fees are partially converted to burns to stabilize token dynamics.
Governance (Multisig + Timelock) — Controlled parameter changes with delay windows and shared custody to reduce unilateral risk.
Orbit L3 — An application-specific Arbitrum Orbit chain (Layer 3) that executes Authra logic and batches state to an upstream L2/L1.
Passpoint / OpenRoaming — Wi-Fi federation standards enabling secure, seamless roaming that can act as additional presence/identity signals.
Performance (QoE) — Telemetry that captures quality-of-experience (e.g., throughput, latency, loss, jitter) to verify how a network behaved.
PQC (Post-Quantum Cryptography) — Cryptographic schemes designed to remain secure against quantum-capable adversaries.
Precision Modes — Tunable proof settings (e.g., coarse vs high-precision signals) balancing accuracy, privacy, cost, and battery.
Presence (PoP) — Evidence that a device, user, or asset was really at a place/time, established via multi-signal corroboration.
Provenance — Cryptographic lineage of data and actions to prevent tampering or misattribution.
Resilient Transport (Layer 3) — Authra’s continuity layer for moving proofs and control messages across unreliable networks.
Rollup Mode (fallback) — A stricter DA option that posts full data on-chain for maximum assurance when policy or risk requires it.
RTK — Real-Time Kinematic positioning that uses carrier-phase corrections to achieve centimeter-level location accuracy.
Scanner / Indexer / Bridge (Non-Consensus Roles) — Off-chain roles that fetch, enrich, or relay data without producing blocks.
Sequencer — The service that orders L3 transactions; may apply policies like fairness windows or Timeboost.
SLA / SLO — Service Level Agreement (external contract) and Service Level Objective (internal target) that Authra can measure and enforce.
Staking / Bonds — Economic collateral that participants lock to back their assertions or roles, slashable on abuse or invalid proofs.
Sybil Attack — An adversary creating many fake identities to game rewards or distort network measurements.
Temporal Anchoring — Periodic commitment of proof digests to the chain so evidence gets an immutable, verifiable timestamp.
Terrascient — The enterprise analytics product that consumes Authra proofs for dashboards, SLA verification, and enforcement workflows.
Timeboost — A sequencing policy that improves fairness by giving recent arrivals a protected window before fee-based reordering.
TinyML — Lightweight machine-learning models running on devices to score signals locally without heavy compute or bandwidth.
TruePing — The edge app/SDK that collects Presence/Performance signals and formats them into Authra-ready proofs.
TrustMesh (AI Layer) — Authra’s analytics layer that fuses signals (on-device + cloud) to detect anomalies, spoofing, and Sybil patterns.
Yeggina Proofs — The paper’s dual-core proof family that fuses Presence and Performance into verifiable, on-chain attestations.
ZK (Zero-Knowledge) — Cryptography that proves a statement true without revealing the underlying data, used for privacy-preserving verification.