Global Organic Textile Standard (GOTS)

The Global Organic Textile Standard (GOTS) is a globally applied standard for the processing of textiles made from organically produced natural fibers and is therefore an important textile seal. It defines environmental requirements along the entire textile production chain as well as social criteria. Quality assurance is provided through independent certification of the entire textile supply chain.

Global Recycled Standard (GRS)

The Global Recycle Standard (GRS) was originally developed by Control Union Certifications in 2008. Responsibility passed to the Textile Exchange on January 1, 2011. The GRS is an international, voluntary, full-fledged product standard that sets out requirements for independent certification of recycled materials, chain of custody, social and environmental practices, and chemical restrictions. The GRS is designed to address the needs of companies wanting to verify the recycled content of their products as well as ensuring that social, environmental and chemical regulations are met in production. The aim of the GRS is to define requirements for the correct specification of the substances and materials used and for correct working conditions. Furthermore, ecological and chemical risks should be minimized. Addressed companies are active in the cotton processing, spinning, weaving, knitting, dyeing, printing and sewing industries.

OEKO-TEX® Standard 100

OEKO-TEX® Standard 100 is an independent testing and certification program whose criteria go well beyond the legal requirements. It is not only ensured that the tested substance does not contain any legally prohibited or regulated substances - the use of substances that are harmful to health, the use of which has not yet been regulated by law, is also strictly examined. A fabric that bears the OEKO-TEX® Standard 100 seal is therefore neither harmful to health nor to the environment. For example, the proportion of heavy metals, pesticides, solvent residues, the pH value and color fastness are checked.

Organic Content Standard (OCS)

The Organic Content Standard (OCS) applies to any non-food product containing 95-100 percent organic material. It verifies the presence and amount of organic material in a final product and tracks the flow of the raw material from its source to the final product.

PETA-Approved Vegan

The PETA-Approved Vegan label shows which products are animal-friendly. Because animal materials cause animal suffering. In addition, hidden animal ingredients in clothing and other textiles are not recognizable on the label.

The PETA-Approved Vegan logo helps consumers to recognize vegan fashion without animal cruelty at a glance.

Labeled are textiles that do not contain animal substances such as fur, leather, silk, wool or animal components such as e.g. B. contain color or adhesives.

Material and Design

1x1 Rib Knit

A type of fabric construction commonly used for sleeve and neckbands that is highly elastic and retains its shape. 1x1 rib knit construction is a pattern of one rib, one flat space, one rib, one flat space, etc. Both sides of this knit fabric look identical.

Brushed lining

Brushing is a finishing process used to raise the surface fibres of a fabric. The fabric undergoes a mechanical brushing process in which fine, metal brushes carefully rub the fabric to produce fine fibres from the woven yarns, creating extra softness on the surface of the fabric.

Double Jersey

Double jersey is knit either left-left or right-right. This type of meshing makes the fabric more robust and of higher quality.


Jersey is a knit fabric used predominantly for clothing manufacture. It was originally made of wool, but is now made of wool, cotton and synthetic fibers.

Neck tape

A piece of material used to cover and reinforce the neckline. Can be self fabric of the garment or more expensive items might use a different material. The tape can just be to the neck or can run into the shoulders too which gives extra strength.

Raglan sleeve

A raglan sleeve is a sleeve that extends in one piece fully to the collar, leaving a diagonal seam from underarm to collarbone.

Regular Fit

Loose cut for more freedom of movement.

The "Regular Fit" cut is sometimes also called "Comfort Fit" or "Loose Fit". This indicates what is behind this designation: a loose shape that allows a special comfort. Regular fit shirts and T-shirts have broad shoulders and backs and are straight. They do not follow the shape of the body and only fit snugly at the widest part of the body, mostly the shoulder area. This cut allows a high degree of freedom of movement and/or is suitable for people with a wide back or generally large circumference. Slim or very slim people should only wear regular fit tops on casual occasions, while people with a larger build are always dressed appropriately with regular fit shirts of the right size.

Ribbed cuffs and hem

Anything with ribbed cuffs and hems signifies sportswear of some sort because it helps to keep the fabric close to the skin so it's not in the way of jogging or training.

Ring-spun cotton

“Ringspun” refers to the process of continuously spinning, twisting, and thinning the cotton strands is what yields long, soft threads. This process also yields stronger, longer strands that are soft, extremely durable, and free from the rough texture of standard raw cotton.

Self-fabric neck tape

A self-fabric tape covers the neck seam to stabilize the back of the garment for a more comfortable feel and prevent stretching.

Set-in sleeves

A 'Set-In' sleeve has a seam at the shoulder which continues around the complete construction of the arm. It is also quite well known as a "Drop Sleeve" style - both terms are interchangeable.

Single Jersey

Single jersey uses alternating knit and purl stitches, making the fabric very stretchy and has a purl and a knit side.

Slim Fit

Body-hugging, Tight-fitting cut.

The cut "Slim Fit" sometimes goes under "Body Fit" and means: close to the body, emphasizing the body shape. Slim fit blouses, shirts and T-shirts are not only tailored for women, which is achieved by darts on the back or side seams or by a corresponding shape of the pattern. Slim fit tops are often shorter than regular fit models and only reach around the waistband. Depending on the type of garment and provided the body shape is suitable, slim-fit tops should be worn for upscale occasions and in the business area.

Bitcoin A - E

51% Attack

If more than half the computer power or mining hash rate on a network is run by a single person or a single group of people, then a 51% attack is in operation.

80/20 Rule (Pareto Principle)

The 80/20 rule, commonly known as Pareto Principle, states that 20% of your actions account for 80% of results.

Adam Back

Adam Back is a world-renowned British cryptographer, cypherpunk and crypto industry figure from the United Kingdom.

All-Time-High (ATH)

The highest point (in price, in market capitalization) that a cryptocurrency has been in history. *see All-Time-Low (ATL).

All-Time-Low (ATL)

An all-time low (ATL) refers to the lowest price a cryptocurrency has hit during its trading history.


As Bitcoin is the first cryptocurrency that captured the world’s imagination, all other coins were subsequently termed “altcoins,” as in “alternative coins.”

Bitcoin ATM (BTM)

An automated teller machine (ATM or cashpoint) that allows the user to buy and sell Bitcoin.

Bitcoin Dominance (BTCD)

Bitcoin Dominance is a metric that determines how much share of the overall crypto market share is owned by Bitcoin.

Bitcoin Halving

Bitcoin halving is an event in which the total rewards per confirmed block halves.

Bitcoin Pizza

Bitcoin Pizza refers to the infamous transaction where a guy, named Laszlo Hanyecz, paid 10,000 Bitcoins for two pizzas making it the first business transaction of Bitcoin in the real world.


A person who is bullish on Bitcoin.


A file containing information on transactions completed during a given time period. Blocks are the constituent parts of a blockchain.

Block Explorer

An application enabling a user to view details of blocks on a given blockchain. Also known as a blockchain explorer.

Block Header

A block header is a unique identifier for a block on a blockchain that is hashed on a continuous basis to supply proof-of-work for mining incentives.

Block Height

A value describing the number of blocks preceding a given block in the blockchain.

Block Reward

The coins awarded to a miner or group of miners for solving the cryptographic problem required to create a new block on a given blockchain.

Block Size

In blockchain technology, block size refers to the amount of data about transactions a single block in the chain can carry.

Block Time

Block time refers to the approximate time it takes for a blockchain-based system to produce a new block.


A distributed ledger system. A sequence of blocks, or units of digital information, stored consecutively in a public database. The basis for cryptocurrencies.

Blockchain Trilemma

The blockchain trilemma is the set of three issues that plague blockchains: decentralization, security and scalability.

Bull Market

A bull market in crypto and stock markets refers to a time during which the prices of assets grow dramatically. These markets act as a source of motivation for both investors and purchasers.

Bull Run

A bull run (also known as a bull trend) is a period of time in the financial market during which the values of certain assets are constantly rising.

Buy The (Fu**ing) Dip (BTD/BTFD)

An enthusiastic exclamation by supporters of a cryptocurrency to buy while prices are at a low point.

Byzantine Fault Tolerance (BFT)

Byzantine Fault Tolerance (BFT) is the property of a computer system that allows it to reach consensus regardless of the failure of some of its components.

Censorship Resistance

Censorship resistance refers to the idea that no party can prevent anyone from participating in a given platform or network.

Central Bank Digital Currency (CBDC)

CBDCs are digital currencies issued by a central bank whose status as legal tender depends on government regulation or law.


A centralized organizational structure is one in which a single node or a small number of them are in control of an entire network.


A cipher is any algorithm that can be used to encrypt and decrypt information.

Cold Storage

Offline storage of your bitcoin, typically involving hardware non-custodial wallets, USBs, offline computers, or paper wallets.


In cryptocurrency, a confirmation is a measure of how many blocks have actually passed since a transaction was added to a blockchain.


Consensus is achieved when all participants of the network agree on the order and content of the blocks in the blockchain.

Consensus Mechanism

A consensus mechanism is an underlying technology behind the main functionalities of all blockchain technology, which makes them an essential operating feature of all cryptocurrencies.


Currency is a medium of exchange that defines value.


Custodial cryptocurrency businesses are the ones that are in possession of their customers’ funds for the duration of the use of their services.


The cypherpunk movement promotes the use of cryptography and other privacy-focused technologies to advance social and political progress.

Dark Web

A portion of the internet existing on darknets not indexed by search engines, that can only be accessed with specific software, configurations or authorizations.

Data Privacy

Data privacy refers to the area of data protection and security that is responsible for the handling of sensitive data.

Dead Cat Bounce

A temporary recovery in prices after a prolonged decrease. (* often see on shitcoins)


Decentralization refers to the property of a system in which nodes or actors work in concert in a distributed fashion to achieve a common goal.

Deep Web

The "deep web" is the part of the internet that is hidden from regular search engines.

Diamond Hands

Diamond Hands is a popular term on social media platforms. It refers to people who hold their coins even if their portfolio drops in value by more than 20%.


A measure of how hard it is to validate a new block on a blockchain.

Digital Signature

A method for proving the authenticity of a digital communication.


A dip is when markets experience a short or protracted downturn.

Distributed Ledger

Distributed ledgers are ledgers in which data is stored across a network of decentralized nodes.

Double Spend Attack

A double-spend attack is a practice in the world of digital currencies where a user gains the ability to spend the same cryptocurrency more than once.

Double Spending

The potential for a digital currency to be spent twice.


The acronym of Do Your Own Research — encouraging investors to complete due diligence into a project before investing.

Email Spoofing

Email spoofing is a technique that is used in order to trick users into thinking that a message actually came from a different person.


Businesses that allow customers to trade cryptocurrencies for fiat money or other cryptocurrencies.



Fiat currency is “legal tender” backed by a central government, such as the Federal Reserve, with its own banking system, such as fractional reserve banking.

First In, First Out

First in, First Out (FIFO) is an inventory method used to specify your cost-basis when calculating your taxes.

First-Mover Advantage (FMA)

First-Mover Advantage (FMA) refers to a company/organization that launches a breakthrough product or service in the market to gain an advantage over its competitors.


An acronym that stands for "Fear of Missing Out."

Full Node

Nodes that download a blockchain’s entire history in order to observe and enforce its rules.

Genesis Block

The first block of data that is processed and validated to form a new blockchain, often referred to as block 0 or block 1.

GPG Encryption

GNU Privacy Guard (GPG) is a popular OpenPGP (Pretty Good Privacy) implementation. It is an open-source alternative to PGP that encrypts and signs communications and data securely.

Collapsible row
Gray Swan Event

Gray swan is a significant event whose occurrence could be predicted, but the likelihood is low.

Hal Finney

Hal Finney was a cryptographer and programmer who pioneered Bitcoin’s development and worked with Satoshi Nakamoto.

Hardware Wallet

A hardware wallet is a wallet for cryptocurrencies that usually resemble a USB stick.

Hash Function

Any function used to map data of arbitrary size to data of a fixed size. *see Cryptographic Hash Function.

Hash Power / Hash Rate

A unit of measurement for the amount of computing power being consumed by the network to continuously operate.


A type of passive investment strategy where you hold an investment for a long period of time, regardless of any changes in the price or markets.

Hot Storage

The online storage of private keys allowing for quicker access to cryptocurrencies. *see Cold Storage.


Hyperinflation is defined as unrestricted growth in prices for goods and services in an economy. It happens when resources become limited, such as gas or food.


A property that defines the inability to be changed, especially over time.


A general increase in prices and fall in the purchasing value of money.

Interest Rates

A time-dependent charge or return made in proportion to the amount of money deposited, borrowed or lent.

Internet Memes

A meme is an image, a video, or a piece of text that is copied and spread rapidly by internet users. They are typically humorous but can also be critical as well.


Joy of missing out (JOMO) is the opposite of having a fear of missing out (FOMO.)


Slang for the type of car that many crypto enthusiasts aspire to buy when their digital assets “moon” — or rise in value substantially.

Laser Eyes

Laser eyes is a viral Twitter meme that is used by Bitcoiners who attempt to push the price of BTC to its new all-time highs.

Light Node

Light nodes are typically downloaded wallets and are connected to full nodes to further validate the information that is stored on the blockchain.

Lightning Network

A second-layer protocol that is designed to solve Bitcoin’s scalability problem by allowing transactions to be processed more quickly.


A situation where you buy bitcoin with the expectation of selling it at a higher price for profit later.


A mainchain is the base blockchain layer where all transactions are processed and finalized.


An independent blockchain running its own network with its own technology and protocol.

Man-in-the-Middle Attack (MITM)

a man-in-the-middle attack (MITM) attack is a general term for a cyberattack where a perpetrator positions himself in a conversation between two parties either to secretly eavesdrop.

Market Capitalization/Market Cap/MCAP

Total capitalization of a cryptocurrency’s price. It is one of the ways to rank the relative size of a cryptocurrency. *see Circulating Supply.


A mempool is the node's collection of all of the unconfirmed transactions that it has seen.

Merkle Tree

A Merkle tree is a data structure used in cryptography and computer science to verify the integrity of data stored or transmitted.

Metcalfe’s Law

Metcalfe’s Law is a way of describing the use of networks and highlights that the more users a network has, the more valuable it is to each individual user.


Contributors to a blockchain taking part in the process of mining.

Mining Pool

An arrangement where a number of miners pool their resources to increase their chances of finding the next block.


A situation where there is a continuous upward movement in the price of a cryptocurrency. Often used in communities to question when a cryptocurrency will experience such a phenomenon, saying

Moore's Law

Moore's Law states that computers' speed and capability will increase every year, even as cost goes down.


Multisignature crypto wallets require more than a single signature to sign a transaction.


A newb is someone that is new to a certain industry.


A no-coiner is someone who has no cryptocurrency in his or her investment portfolio and firmly believes that cryptocurrency in general will fail.


Usually referring to the storage of keys, in relation to wallets or exchanges, a non-custodial setup is one in which private keys are held by the user directly.


When a transaction is hashed by a miner, an arbitrary number meant to be used only once is generated, called a nonce.


A transaction that is processed outside the blockchain network with an increased speed and reduced cost.


Transactions that are recorded on the blockchain itself and shared with all of the participants are done on-chain.

Open Source

Open source is a philosophy, with participants believing in the free and open sharing of information in pursuit of the greater common good.

Paper Wallet

A physical document containing your private key or seed phrase.

Peer-to-Peer (P2P)

The decentralized interactions between parties in a distributed network, partitioning tasks or workloads between peers.

Ponzi Scheme

A fraudulent investment involving the payment of purported returns to existing investors from funds contributed by new investors.

Proof-of-Work (PoW)

A blockchain consensus mechanism involving solving of computationally intensive puzzles to validate transactions and create new blocks.

Public Key

A public key refers to a series of alphanumeric characters used to encrypt plain text messages into ciphertext.

Bitcoin Q - Z

QR Code

A machine-readable label that shows information encoded into a graphical black-and-white pattern.

Quantum Computing

A computer that harnesses phenomena from quantum mechanics in order to perform much more efficient computations than older, classical computer technologies are capable of.

Recovery Seed

A recovery seed is a cryptographically derived security code composed of a list of random words, typically ranging between 12 and 14.

Renewable Energy

Renewable energy is derived from solar, wind, and other ‘indefinite’ resources or operations that are renewed on a regular basis.

Satoshi (SATS)

The smallest unit of bitcoin with a value of 0.00000001 BTC.

Satoshi Nakamoto

The individual or group of individuals that created Bitcoin.

Seed Phrase

A single starting point when deriving keys for a deterministic wallet.


A cryptographic hash function that generates a 256-bit signature for a text, used in Bitcoin proof-of-work (PoW).

Silk Road

An online black market that existed on the dark web, now shut down by the FBI.

Simplified Payment Verification (SPV)

A lightweight client to verify blockchain transactions.

Soft Fork (Blockchain)

A protocol upgrade where only previously valid transactions are made invalid, with most soft forks requiring miners to upgrade their mining software.

Stock-to-Flow Ratio

The stock-to-flow ratio is a metric used to measure the scarcity of a commodity, particularly precious metals and cryptocurrencies.

Supply and Demand

Supply and demand are the levels in an economy that determine the market's willingness to buy or sell assets or services, respectively.

Tamper-Proof Ledger

A tamper-proof ledger is essentially any system of records that has the fundamental properties of a blockchain distributed ledger.


Taproot is an instantiation of a soft fork for Bitcoin, intended to both improve privacy and improve other aspects tied to more complex transactions.

Terahashes Per Second

Terahashes per second (Th/s) is equivalent to 1 trillion (1,000,000,000,000) hashes per second, a unit that indicates the power of a computer or mining machine.

The Cantillon Effect

Developed by Richard Cantillon, The Cantillon Effect is a change in relative prices resulting from a change in the money supply.

Think Long Term (TLT)

A mindset where you have a longer-term investment horizon of months to years.

This Is Gentlemen

Originally an error in writing the full “This is it, gentlemen”. It is now used as an introduction for good news.


A form of identification for when a certain transaction occurred.


Tor is a decentralized network that anonymizes users' web traffic by encrypting it and routing it through a series of relays before it reaches its final destination.

Transaction (TX)

The act of exchanging cryptocurrencies on a blockchain.

Transaction Fee

A payment for using the blockchain to transact.

Transactions Per Second (TPS)

Transactions per second (TPS) is a measure of a computer system's (or network's) capacity to perform transactions or calculations in a second.


An environment where there is no centralized authority.


Unbanked refers to those that are either unable to access banking services, or choose not to.

UTC Time

Coordinated Universal Time.

Virtual Private Network (VPN)

A virtual private network (VPN) is a technology that creates a safe and encrypted network from a public internet connection – giving you anonymity and privacy.


A place where cryptocurrency users can store, send and receive digital assets.


A term used to describe investors who have uncommonly large amounts of crypto, especially those with enough funds to manipulate the market.

White Swan Event

A white swan is an easily predictable event that is anticipated based on current information and forecasting.


A document released by a crypto project that gives investors technical information about its concept, and a roadmap for how it plans to grow and succeed.


XBT is the lesser-known ticker symbol for Bitcoin.

Zero Knowledge Proof

Proving certain information or data is true without revealing it. In cryptography, a zero-knowledge proof enables one party to provide evidence that a transaction or event happened without revealing private details of that transaction or event.