L1X Glossary

A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Y   Z   #


Agregated Cluster checkpoint
A mechanism in the L1X network that ensures the consistency and integrity of data across different clusters by creating aggregated checkpoints. These checkpoints serve as reference points to validate the state of each cluster, allowing for efficient synchronization and verification of data across the network.

This is a list of all the validator nodes that have validated the transaction in their respective group. It contains validator identification details along with proof of transaction validation.


Block Proposer Selection
A process within the L1X network's consensus mechanism that randomly selects a node to propose a new block, enhancing decentralization and security. By randomizing the selection, the L1X network prevents any single entity from having excessive control over block proposal, ensuring a fair and distributed system.

Block Size
The amount of data that can be stored in a single block in the L1X network's blockchain, which is set to be manageable at 5MB. This size limitation helps maintain optimal network performance by balancing the storage requirements of the blockchain while ensuring efficient block propagation and validation.

Block Time
The time it takes to create a new block in the L1X network's blockchain, set to be short at 500 milliseconds. The fast block time ensures quick transaction confirmation and improves the overall responsiveness of the network, enabling faster processing of transactions.

Blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network.


A 20-second time interval consisting of 40 slots in the L1X blockchain, organizing blocks for efficient management and synchronization.

Cluster Assignment Randomizer
A component of the L1X network that randomly assigns nodes to different clusters to ensure decentralization and security. This randomization mechanism distributes nodes across multiple clusters, preventing concentration of power and enhancing network resilience against attacks or failures in specific clusters.

Clustered Databases
Databases within the L1X network's architecture designed to distribute data consistently across different nodes. By employing clustering techniques, the L1X network ensures that data is replicated and accessible across multiple nodes, improving data availability, fault tolerance, and load balancing.

Cluster Registry
A registry in the L1X network that keeps track of all clusters present in the network. The cluster registry maintains an up-to-date record of active clusters, their configurations, and the nodes associated with each cluster, facilitating efficient cluster management and coordination within the network.

Cluster Register Management
A system in the L1X network that manages the registry of clusters, ensuring proper assignment and functioning of nodes. This management system handles tasks such as cluster registration, deregistration, updating cluster information, and maintaining the overall consistency of the cluster registry.

Individual elements that form the L1X network, including the Virtual Machine, X-Talk, Full Nodes, Validator Nodes, and various databases and registries. These components work together to provide the necessary infrastructure, consensus mechanisms, and functionality required for the operation and performance of the L1X network.

Consensus Mechanism
The method used in the L1X network to reach agreement, named Proof of X (PoX), which involves Full Nodes and Mobile Nodes acting as Validators. PoX ensures that participating nodes in the network validate transactions, propose new blocks, and collectively agree on the state of the blockchain, ensuring consensus and immutability of the network.

Block creation and synchronization of global state is the responsibility of the constructor nodes.

Cross Cluster Messaging
A feature in the L1X network that enables communication between different clusters. This messaging capability allows clusters to exchange information, share data, and coordinate activities, facilitating interoperability and collaborative execution of transactions or smart contracts across the network.

A unit of time in the L1X blockchain that encompasses multiple epochs, typically lasting for three minutes, incorporating cluster shuffling and providing milestones for network analysis and planning.


The distribution of functions, power, people, or things away from a central authority. In the context of the L1X network, decentralization refers to the distribution of nodes across the network, where no single entity or group has complete control over the network. Decentralization enhances security, resiliency, and censorship resistance by preventing any single point of failure or control within the system.

Decentralized Finance (DeFi)
Decentralized Finance provides financial instruments without relying on intermediaries such as brokerages, exchanges, or banks by using smart contracts on a blockchain. DeFi platforms allow people to lend or borrow funds from others, speculate on price movements on assets using derivatives, trade cryptocurrencies, insure against risks, and earn interest in savings-like accounts. DeFi uses a layered architecture with highly composable building blocks. L1DEX is the prime DEX running on the L1X network.

Design Principles
The fundamental ideas and concepts that guide the design of the L1X network, including decentralization, security, scalability, and interoperability. These design principles shape the architectural decisions, protocol specifications, and development processes of the L1X network, aiming to create a robust and efficient blockchain platform.

Individuals or entities that build applications or systems on the L1X network. Developers leverage the L1X network's capabilities, such as its smart contract functionality, interoperability features, and secure infrastructure, to create decentralized applications (dApps) and innovative solutions for various use cases.

Directed Acyclic Graph (DAG)
Matematical structure used in distributed ledger systems, where circles (vertices) represent activities or transactions, and lines (edges) show the order in which transactions are approved. DAGs are acyclic, meaning there are no loops, and transactions can be validaed simultaneously without the need for mining, resulting in increased scalability and reduced transaction fees and environment impact. In Layer One X, the X-Talk architecture employs a DAG through its Execution Register to facilitate transaction execution, ensuring appropriate order and conflict avoidance, making it a powerful tool for achieving multichain connectivity.


ELF File
Also known as Executable and Linkable Format, is generated by the LLVM, the ELF File contains all necessary information for eBPF loaders to prepare and load programs into the kernel. ELF Files play a crucial role in the compilation, linking and execution of programs.

Event Validation
In this validation, the event details are validated. The authenticity of the transaction hash of the transaction depositing assets in the random Ethereum address is validated from the source blockchain.

EVM Compatible
Ethereum, Binance, Avax, Matic, Arbitrum, Fantom and Optimism. L1X Interoperable Contract (IC) is deployed across all EVM-compatible blockchain networks to facilitate token transfer. The L1X IC facilitates the process of token deposit and dispersion. L1X makes it feasible for any user on an EVM-compatible source blockchain to initiate a cross-blockchain token transfer transaction by depositing the amount in Source IC (SIC). L1X enhances the security of the interoperable transaction by privileging only L1X relayers for dispersal of the deposited tokens on the destination blockchain.

A period in the L1X blockchain comprising consecutive 3 chunks, typically lasting for one minute, during which clusters propose blocks and facilitate network consensus.


Final Integrity
Final integrity can be defined as the proof of transaction validation from the entire group. It is the combination of partial integrity with the proof of transaction validation from validators in the group. Full nodes can easily validate the transaction based on Final Integrity.

Flash Code/FC
A component in the L1X network that provides security in a Decentralized Ledger and Smart Contract Platform. Flash Code (FC) incorporates cryptographic algorithms and secure coding practices to prevent vulnerabilities, mitigate attacks, and ensure the integrity of the L1X network's smart contracts and transaction processing.

Fear Of Missing Out (FOMO)
Refers to the feeling of apprehension for missing out on a potentially profitable investment opportunity and regretting it later. Generally an expression describing investors' fear of missing out the good timing of buying cryptocurrencies that could eventually be profitable.

Friction on the Network
Any factors that may slow down or hinder the operation of the L1X network. Friction can arise from network congestion, resource limitations, high transaction fees, or inefficient protocols. The L1X network aims to minimize friction by optimizing its architecture, consensus mechanisms, and scalability solutions to provide a seamless and efficient user experience.

Full Nodes
Nodes in the L1X network that maintain a complete copy of the blockchain and validate all transactions and blocks. Full nodes play a crucial role in ensuring the integrity and security of the network by independently verifying transactions and participating in the consensus process, contributing to the decentralization and resilience of the L1X network.


Genesis block
The very first block created in a new blockchain, from which all other blocks are created.

Group Formation
The L1X network creates groups of active nodes for fast and secure transaction validation. A minimum of 4 groups are created for any transaction validation. This count is directly proportional to the number of active nodes in the network. A lower limit and upper limit on group size is set to maintain security and lower latency in respective scenarios.

This is the identifier of the group that has validated the transaction.


Hierarchical Temporal Memory
A technology used in the L1X network to detect malicious nodes. Hierarchical Temporal Memory (HTM) employs machine learning algorithms and pattern recognition techniques to identify anomalous behavior or malicious activities within the network. By detecting and flagging potentially harmful nodes, HTM enhances the security and trustworthiness of the L1X network.

Hybrid Consensus Mechanism
L1X uses Proof-of-Stake for full node selection and Proof-of-Participation for node validators to provide security and decentralization.

An intentional typo for the word "hold" originally posted by an anonymous user on the Bitcointalk forum, which the crypto community later turned into slang for holding a cryptocurrency long term despite market volatility.

Homomorphic Encryption
A form of encryption that allows calculations to be performed on encrypted data without decrypting it first. In the L1X network, homomorphic encryption is utilized in the block proposer selection process to ensure fairness and randomness. It enables secure and privacy-preserving selection of nodes for proposing new blocks without revealing sensitive information.


These nodes introduce the transactions into the L1X network. They perform the basic validation for mandatory details before submitting the transaction for validation.

The ability of different systems, networks, or applications to work together and share information. In the context of the L1X network, interoperability refers to the network's ability to interact with other blockchain networks, enabling seamless exchange of assets, data, and smart contract invocations across different blockchains. Interoperability fosters collaboration, expands use cases, and enhances the overall utility of the L1X network.

Interoperability Libraries
Libraries in the L1X Virtual Machine that enable it to interact with other blockchain networks. These libraries provide standardized protocols, interfaces, and tools for seamless integration and communication with external blockchains or protocols, facilitating cross-chain transactions, data transfers, and smart contract interoperability.

Interoperability System Calls
System calls in the L1X Virtual Machine that facilitate interoperability with other systems. These system calls provide a standardized interface for the L1X network to interact with external systems, such as retrieving data or invoking functions from external smart contracts or decentralized applications. They enable efficient communication and integration between the L1X network and external ecosystems.

Interoperable Contract Validation
The authenticity of the contract that has generated the event is validated. This validation ensures that the event generated is for a genuine Interoperable transaction. Malicious users may generate fake events for the Interoperable transactions to gain the asset in a specified destination address.

All transactions / records are immutable – i.e. cannot be changed by anyone.


Java is a widely-used programming language for coding web applications. It has been a popular choice among developers for over two decades, with millions of Java applications in use today. Java is a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.


A public key allows you to receive cryptocurrency transactions. It's a cryptographic code that's paired to a private key. While anyone can send transactions to the public key, you need the private key to “unlock” them and prove that you are the owner of the cryptocurrency received in the transaction.

Know Your Customer (KYC)
It refers to the process of obtaining and verifying personal identification information from contributors as a legal requirement to help identify if the contributor is a Politically Exposed Person (PEP) or on a sanctions list, before allowing them access to contribute.


L1X Applications
Applications built on the L1X network, leveraging its scalability, interoperability, security, and decentralization. These applications utilize the capabilities of the L1X network to provide decentralized solutions, such as decentralized finance (DeFi), supply chain management, identity verification, and more. L1X applications benefit from the network's robust infrastructure, smart contract functionality, and high-performance consensus mechanisms.

L1X Architecture
The structure and design of the L1X network, including its components such as the Virtual Machine, X-Talk, Full Nodes, Validator Nodes, and various databases and registries. The L1X architecture defines the interactions, protocols, and mechanisms that enable the seamless functioning of the network, ensuring scalability, security, and interoperability while accommodating future growth and innovation.

L1X Benefits
The advantages offered by the L1X network, including scalability, interoperability, security, and decentralization. These benefits empower developers, businesses, and users by providing a high-performance blockchain platform that can handle a large number of transactions, facilitate seamless integration with other networks, ensure robust security measures, and promote a decentralized and transparent ecosystem.

L1X Coins
The native cryptocurrency of the L1X network used for transactions within the network. L1X coins serve as a medium of exchange, store of value, and unit of account within the L1X ecosystem. They can be used for various purposes, such as paying for transaction fees, participating in network governance, and accessing network services or dApps. Coins are digital assets that have their own blockchain. Tokens, on the other hand, are digital assets that rely on another blockchain, therefore as L1X has it's own blockchain, we refer to L1X as a Coin.

L1X Consensus Mechanism Working
The operation of the consensus mechanism in the L1X network, which involves the selection of block proposers and the validation of transactions and blocks. In the L1X network, the Proof of X (PoX) consensus mechanism engages Full Nodes and Mobile Nodes as Validators to collectively agree on the state of the blockchain. Validators participate in block proposal, transaction validation, and voting processes, ensuring consensus, security, and decentralization in the network.

L1X Network
An interoperable, decentralized, secure, and scalable Layer One Smart Contract Protocol. The L1X network provides a robust infrastructure for executing smart contracts, processing transactions, and enabling decentralized applications. It incorporates innovative features and protocols to address the scalability and interoperability challenges of blockchain technology while ensuring high levels of security and decentralization.

L1X Reward Mechanism
The mechanism in the L1X network that rewards nodes for their participation in the network, such as validating transactions and blocks. This reward mechanism incentivizes nodes to contribute their computational resources, maintain network integrity, and actively participate in consensus activities. By providing rewards in the form of L1X coins, the network encourages node engagement, secures the network, and ensures a fair and sustainable ecosystem.

L1X Smart Contract Software Development Kit (SDK)
A set of tools provided by the L1X network for developing smart contracts. The L1X SDK offers developers a comprehensive suite of libraries, frameworks, and documentation to streamline the development process, enhance code reusability, and facilitate the deployment and execution of smart contracts on the L1X network. It provides a developer-friendly environment for building decentralized applications and interacting with the L1X Virtual Machine.

L1X System Calls
Calls made by the L1X Virtual Machine to the operating system to perform certain tasks. System calls provide the L1X Virtual Machine with access to external resources, such as storage, network connectivity, or cryptographic operations. These calls enable smart contracts to interact with the underlying infrastructure and external systems, expanding their capabilities and facilitating complex functionalities within the L1X network.

L1X Transaction Lifecycle
The process that a transaction goes through in the L1X network, from initiation to validation and addition to the blockchain. The transaction lifecycle involves multiple stages, including transaction creation, signature verification, consensus-based validation, block inclusion, and final confirmation. Each stage ensures the integrity, security, and immutability of the transaction, enabling seamless and reliable transfer of value within the L1X network.

L1X VM Core
The core component of the L1X Virtual Machine responsible for executing smart contracts and processing transactions. The L1X VM Core interprets and executes the bytecode instructions of smart contracts, manages the state of the blockchain, and facilitates the validation and execution of transactions. It provides a secure and isolated execution environment for smart contracts, ensuring deterministic and reliable outcomes while maintaining compatibility with the broader L1X network.

Layer One X
Also known as L1X, it is an interoperable, decentralized, secure, and scalable Layer One Smart Contract Protocol. Layer One X aims to overcome the limitations of traditional blockchains by providing a high-performance infrastructure that supports smart contract execution, seamless interoperability with external networks, robust security measures, and efficient scalability solutions. L1X strives to empower developers and users with a reliable and user-friendly blockchain platform for various decentralized applications and use cases.

Layer Two Tokenomics vs Layer One Tokenomics
A comparison of the token economics at the second layer (off-chain or side-chain solutions) and the first layer (the main blockchain) of a blockchain network. Layer Two Tokenomics typically involve mechanisms and incentives specific to the secondary layer, such as payment channels or state channels, while Layer One Tokenomics encompass the fundamental principles and mechanisms governing the main blockchain's native token distribution, pricing, inflation models, and governance.

Leader Node
Each group has a leader node. The leader node is randomly selected from the group of validators.This randomness ensures fairness in the leader node selection process. The probability of the same node consecutively getting selected as leader is near to zero. This minimizes the risk of compromising security by malevolent users.

Leader Validation
A leader sends an aggregated response to the constructor. The constructor validates the authenticity of the leader to mitigate malicious users submitting fake transaction details to acquire assets in the destination blockchain.

LeaderKey is the public address of the Leader node of the group that has validated the transaction.

Ledger Tokenization
The process of converting rights to an asset into a digital token on a blockchain. In the context of the L1X network, ledger tokenization enables the representation and transfer of various assets, such as financial instruments, real estate properties, or digital collectibles, as programmable tokens. By tokenizing assets on the L1X network, participants can benefit from increased liquidity, fractional ownership, automated compliance, and transparent transaction history.

Collections of pre-written code that developers can use to simplify the development of applications on the L1X network. Libraries provide reusable functions, data structures, and utilities that accelerate the development process, improve code quality, and promote code standardization. By leveraging libraries, developers can focus on higher-level logic and functionality, reducing development time and effort while benefiting from well-tested and community-vetted code.


Micropayment Transactions
Small financial transactions made possible by the low transaction fees on the L1X network. Micropayment transactions enable the cost-effective transfer of small amounts of value, such as microtransactions or payments for digital goods and services. The low transaction fees on the L1X network make micropayments economically viable, facilitating new business models, incentivizing micro-trading, and enabling innovative use cases in areas such as content monetization, gaming, and internet-of-things (IoT) ecosystems.

Micro Trading
The trading of small amounts of assets, made possible by the low transaction fees and high scalability of the L1X network. Micro trading allows participants to engage in fractional ownership, small-scale investments, or frequent trading of digital assets with reduced transaction costs. The L1X network's scalability and low fees enable efficient micro trading, opening up new opportunities for retail investors, liquidity providers, and decentralized exchanges.

L1X provides the ability to migrate using smart contracts and describe business rules. Developers can easily take advantage of L1X’s capabilities through open-source SDK. Businesses can easily reduce heavy upfront and maintenance costs without exposing how they do it.

Mobile Computing
The process of identifying nodes in the L1X network that are acting maliciously, such as attempting to double-spend or manipulate the blockchain. Malicious node detection mechanisms employ various techniques, such as anomaly detection, behavior analysis, or reputation systems, to identify and mitigate potential threats to the network's security and integrity.

Mobile Devices
The use of mobile devices like smartphones and tablets in computing. In the context of the L1X network, mobile computing refers to the involvement of mobile devices as nodes in the network. By allowing mobile devices to participate as validators or full nodes, the L1X network enhances decentralization, inclusivity, and accessibility, enabling a wider range of participants to contribute to the network's operations and consensus.

Mobile Enabled Devices
The procurement of Mobile Enabled Devices (MED) for validation, publication to the network (validation), storage, and operation of scripts, will enable an abundance of opportunities to distribute transactional capacity for true decentralization on the network. The transaction operation and validation process will be executed on the node using scripts running on a MED.

Mobile Nodes
Nodes in the L1X network that are run on mobile devices, allowing for greater decentralization and participation in the network. Mobile nodes enable users to actively engage with the L1X network, validate transactions, and contribute to consensus using their mobile devices. By utilizing mobile nodes, the L1X network extends its reach, enhances network resilience, and facilitates broader adoption among mobile-centric users.

Mobile Node Detection
The process of identifying nodes in the L1X network that are acting maliciously, such as attempting to double-spend or manipulate the blockchain. Malicious node detection mechanisms employ various techniques, such as anomaly detection, behavior analysis, or reputation systems, to identify and mitigate potential threats to the network's security and integrity.

Mobile Node Syncing
The process by which mobile nodes in the L1X network stay up-to-date with the state of the blockchain. Mobile node syncing involves downloading and verifying blockchain data, including transactions, blocks, and smart contracts, to ensure that the mobile nodes have an accurate and consistent view of the network. This synchronization process enables mobile nodes to actively participate in the consensus and transaction validation process, contributing to the overall security and trustworthiness of the L1X network.

Multi-Sig Native On-Chain Collection
Is an advanced security feature introduced by the L1X platform, enhancing security through multi-signature transactions involving multiple parties in the validation process. Each participant possesses a unique private key, and a predefined number of these keys must be collectively used to generate a combined signature for a transaction to be valid.


Native MultiSig Contract
A type of smart contract in the L1X network that requires multiple signatures to execute, enhancing security. Native MultiSig contracts facilitate multi-party agreements, escrow services, or decentralized governance by requiring multiple authorized parties to sign off on transactions or contract operations. This multi-signature mechanism reduces the risk of unauthorized actions, mitigates single points of failure, and ensures the integrity of critical transactions or operations within the L1X network.

Nodes Selection
Selection of nodes in a group is driven by a pseudo random generator algorithm. This reduces the possibility of subsequently having the same set of nodes in a group. Thus, ill intention of a group of malicious users is readily diminished through the L1X architecture.


On-Chain Collection
A feature of the L1X network that allows the collection of data directly on the blockchain. On-chain collection enables the storage and retrieval of data within the L1X network's blockchain, ensuring immutability, transparency, and auditability. This feature enables the creation of decentralized applications that rely on on-chain data for various use cases, such as digital identity management, supply chain tracking, or decentralized finance applications.

Services that connect real-world data with blockchain applications. Oracles are necessary to provide input that cannot be independently verified, such as temperature measurements. Oracles typically rely on the security of a trusted source rather than the security of trustlessness.


Partial integrity
Partial integrity can be defined as the proof of transaction validation from the leader node. Validators utilize partial integrity to recheck leader response for the respective transaction validation. This feature ensures the accountability of the leader node for transaction validation.

Pentagon Framework
Comprehensive security-oriented architecture incorporated into the L1X Platform. Designed to address key security components from the ground up, it aims to establish a secure smart contract platform. The framework focuses on varios critical aspects of security to mitigate vulnerabilities and potential attack vectors, ultimately enhancing the overall security of the network

The efficiency and speed at which the L1X network can process transactions and execute smart contracts. Performance metrics in the L1X network include transactions per second (TPS), block confirmation times, latency, throughput, and resource utilization. Optimizing performance ensures fast and reliable transaction processing, enhances user experience, and supports the scalability requirements of decentralized applications built on the L1X network.

One of the first bitcoin transactions to ever take place. In 2010, a programmer named Laszlo Hanyecz offered to pay 10,000 Bitcoins (valued at around $40 at the time) for two pizzas from Papa John's. Don’t buy a Pizza with L1X!

Prominent Features
Key characteristics of the L1X network that distinguish it from other blockchain networks, including scalability, interoperability, security, and decentralization. These prominent features define the value proposition of the L1X network and highlight its advantages in terms of high transaction throughput, seamless integration with external networks, robust security measures, and a decentralized governance model. Prominent features attract developers, businesses, and users to leverage the L1X network for their blockchain-based solutions.

Proof of Participation (PoP)
A consensus mechanism that rewards nodes for their participation in the network, renamed Proof of X (PoX) in the L1X network. Proof of Participation incentivizes nodes to actively contribute to the network's operations, such as validating transactions, proposing new blocks, or participating in governance activities. By rewarding participation, the L1X network fosters a decentralized and inclusive ecosystem while ensuring the network's security and integrity.

Proof of Stake (PoS)
The Proof-of-Stake (PoS) consensus mechanism is designed to prevent fraud by paying users to validate for the legitimacy of transactions. When a cryptocurrency uses Proof-of-stake, that means it relies on a method known as staking rather than mining. Staking is a way to earn passive income by helping run a blockchain network.

Proof of X (PoX)
The consensus mechanism used in the L1X network, which rewards participating nodes for their contribution to the network's operations. In Proof of X, X represents the specific mechanism employed by the L1X network, such as Proof of Stake (PoS) or Proof of Authority (PoA). PoX ensures that nodes with a stake in the network, whether through ownership of native tokens or active participation, have the opportunity to validate transactions, propose new blocks, and collectively agree on the state of the blockchain, enhancing security and decentralization.

Private Key
A cryptographic key that allows users to send cryptocurrency from their wallet, but cannot be used to receive funds. They're unique and usually consist of 64 characters which you use for decrypting your wallet or making digital signatures. NEVER share your Private Key with anyone, and never store it on your computer or phone, and keep a paper copy in a secure location - safety deposit or a safe.

Public Key
A cryptographic key that allows a user to receive cryptocurrency from another user, but cannot be used to send funds. They're unique and usually consist of 64 characters to encrypt your wallet or make digital signatures.



A node that serves as an entry point for new nodes, providing network information, cluster assignment, and maintaining thresholds for participation.

Randomized Selection of Block Proposer
A feature of the L1X network's consensus mechanism that randomly selects a node to propose a new block, enhancing decentralization and security. By randomizing the selection process, the L1X network prevents any single entity from having excessive control over block proposal, ensuring a fair and distributed system. Randomized selection enhances the resilience of the network against malicious attacks and minimizes the risk of collusion among participants.

Resource Costing Model
A model used in the L1X network to determine the cost of resources used by transactions and smart contracts. The resource costing model calculates the consumption of computational resources, storage space, or network bandwidth required to execute specific operations within the L1X network. By assigning resource costs, the network ensures fair allocation of resources, prevents abuse or spamming, and promotes efficient resource utilization.

Rust is a multi-paradigm, high-level, general-purpose programming language. Rust emphasizes performance, type safety, and concurrency. Rust has been adopted by companies including Amazon, Discord, Dropbox, Facebook (Meta), Google (Alphabet), and Microsoft.


A blockchain’s scalability can be measured with metrics such as: • Transaction Speed, • Block Creation Time, • Transaction Cost to Finality. Leveraging the benefits of validation through mobile devices, L1X offers a highly scalable network with fast confirmation and high throughput. L1X aims to achieve a transaction speed greater than 100,000 transactions per second. The L1X network creates blocks in less than 500 milliseconds and offers negligible transaction cost to finality i.e., less than $0.00001.

The measures taken to protect the L1X network from threats and attacks, including its consensus mechanism, the use of homomorphic encryption, and the detection of malicious nodes. The L1X network employs cryptographic algorithms, secure coding practices, and decentralized governance to ensure the integrity, confidentiality, and availability of data and assets. Robust security measures safeguard the network against various risks, such as double-spending, Sybil attacks, or unauthorized access, fostering trust and confidence among participants.

Seconds per Transaction (SPT)
A measure of the speed at which the L1X network can process transactions, with a focus on providing a faster timeframe for each transaction. The L1X network aims to achieve low SPT values, ensuring near-instant transaction confirmations and quick responsiveness. By reducing the time required for each transaction, the L1X network enhances user experience, enables real-time interactions, and supports high-frequency transaction scenarios.

The smallest time unit in the L1X blockchain, where one block is created every 0.5 seconds.

Smart Contracts
Self executing contracts on the blockchain without needing human executors or notary. L1X takes the concept further by introducing additional capability around Multi-Signature Smart Contracts, and also the ability to send Logic with the Smart Contract.

Software Development Kit (SDK)
A collection of software development tools in one package installation. It is designed to help application developers to not only speed up development, but provide a robust safe way of developing applications for a specific solution.

Stake Registry
A registry in the L1X network that keeps track of all the stakes made by nodes in the network. The stake registry maintains a record of the amount of native tokens staked by each node and their associated rights and privileges within the network. This registry enables transparent and auditable stake management, facilitates governance processes, and ensures the fair distribution of rewards and incentives based on the contributions and stakes of network participants.

The process of participating in a proof-of-stake (PoS) blockchain network by holding and locking up the network's cryptocurrency in a wallet to support network operations like block validation, security, and governance. Staking involves delegating or directly participating as a validator node, contributing to the consensus and security of the network. Stakers are rewarded with additional native tokens or transaction fees for their active involvement and stake in the network.

In the context of the L1X network, this refers to the current state of the blockchain, including all transactions and blocks. The state encapsulates the entire history of the network, including account balances, smart contract data, and transaction records. By maintaining a comprehensive and immutable state, the L1X network enables transparency, auditability, and the ability to verify the integrity of transactions and account balances at any point in time.


Token Distribution
The process by which L1X coins, the native cryptocurrency of the L1X network, are distributed to participants in the network. Token distribution mechanisms may include initial coin offerings (ICOs), token sales, airdrops, or rewards for network participation. The token distribution phase ensures the wide dispersal of native tokens, promotes network participation, and incentivizes early adopters, developers, and stakeholders to contribute to the growth and success of the L1X network.

Token Participant Distribution and. its Pricing
The distribution of L1X coins to participants in the network and the pricing of these coins. Token participant distribution aims to ensure fairness, inclusivity, and widespread ownership of L1X coins among network participants. Pricing strategies consider factors such as market demand, network utility, and long-term sustainability to establish a value proposition for the native token, encouraging its adoption, liquidity, and use within the L1X network.

Token Schedule
The schedule or plan for distributing L1X coins to participants in the network. The token schedule outlines the timing, quantities, and mechanisms by which native tokens are released to stakeholders, investors, and network participants. By following a predetermined schedule, the L1X network ensures a controlled and predictable token supply, preventing sudden inflation or token market disruptions while facilitating network growth, adoption, and ecosystem development.

The economics of the L1X coins, including their distribution, pricing, use within the L1X network, and overall ecosystem dynamics. Tokenomics encompasses various factors, such as token supply, inflation models, utility, governance mechanisms, and market dynamics. Effective tokenomics aligns economic incentives, promotes network participation, and fosters a thriving ecosystem by balancing the interests of token holders, developers, users, and other stakeholders within the L1X network.

Total Value Locked (TVL)
The total value of coins locked in a blockchain divided by the number of existing masternodes at that point. Since there is no way to know how many will be created or destroyed, TVL provides an estimate for this figure and can give some indication as to which projects are undervalued and overvalued.

Transaction Hash (#Hash or TX Hash)
The initiator broadcasts the transaction information to other randomly selected Full Nodes and then the Initiator validates the transaction and creates a Transaction Hash.

Transactions per Second (TPS)
A measure of the speed at which the L1X network can process transactions. TPS indicates the network's capacity to handle a certain number of transactions within a given timeframe. Higher TPS values represent higher transaction throughput and enable the L1X network to support a larger user base, accommodate growing transaction volumes, and facilitate real-time interactions and high-frequency use cases.

The quality of not requiring trust. In trustless systems, bad actors are unable to negatively impact the system without the coordination of the rest of the network. Trustless systems use verifiable information or actions to operate and validate the quality of other actors.


Universal Unique Identifier (UUID)
On the transaction submission on L1X network, the transaction is assigned a Universal Unique IDentifier (UUID) and stored in the memory pool of the full node.


Validator Node
Validators are the nodes that have the capacity to validate the transaction based on account state history. In L1X, active mobile devices with limited resources are wisely utilized to hasten the process of transaction validation. Thus, at any instant, each group has multiple validator nodes but a single leader node.

Vigilant Node
A node in a blockchain network that monitors transactions, detects and reports malicious activity to the block proposer.


An application or plug-in that contains the private keys for interacting with a Private Key Infrastructure (PKI). Typical wallet software has functionality for signing messages and transactions for the corresponding network. A wallet that requires multiple private key signatures to generate a valid transaction. Multiple actors may share a multisignature wallet, but they may not all have to participate in each transaction.

WASM to eBPF Compiler
A compiler in the L1X network that converts WebAssembly (WASM) bytecode to extended Berkeley Packet Filter (eBPF) bytecode, enabling the execution of smart contracts. This compiler allows smart contracts written in WebAssembly to be seamlessly integrated and executed within the L1X network's environment, leveraging the performance and security benefits of the eBPF virtual machine.

Someone who holds an enormous amount of cryptocurrency and has the ability to wave the market.


A feature of the L1X network that enables interoperability between different blockchain networks, allowing for cross-chain transactions and smart contract invocations. X-Talk facilitates the exchange of assets, data, and functionality between the L1X network and external blockchains, expanding the network's reach, use cases, and collaboration opportunities across multiple blockchain ecosystems.

X-Talk Architecture
The design and structure of X-Talk, including how it interacts with other components of the L1X network. The X-Talk architecture encompasses protocols, interfaces, and mechanisms that enable seamless communication and interoperability between the L1X network and external blockchains. It facilitates the secure exchange of information, verification of transactions, and coordination of cross-chain activities, enhancing the overall interoperability and functionality of the L1X network.

X-Talk Commander Contract
Part of the X-Talk Flow Contract. Main orchestrator in defining and instructing the flow of the contract. Its allows developers to build modular logic around cross-chain applications with interfaces that include Contract Storage, Flow Logic and Business Logic Entrypoints.

X-Talk Customs Contract
Part of the X-Talk Flow Contract, is responsible to provide the right signing to the payload before it broadcast it to the appropriate destination.

X-Talk Flow Contract
Includes X-Talk Contract, Event Configuration Contract and Signing-Broadcasting Contract as a subset of the flow contract. These contracts process instructions based on X-Talk messaging standard or instruction sets.

X-Talk Helm
Part of the X-Talk Flow Contract. Includes implementation to Route, get data and provide instruction to the X-Talk Customs contract to sign and broadcast payload to internal contracts or cross-chain contracts. It provides modularity that will allow routing and selecting the appropriate signing-broadcasting nodes to interact with the default or transformed payload.

X-Talk Message
The data brought into the L1X Protocol by the X-Talk Port Contract, is transformed into a standardized, serialisable format before being sent for validation.

X-Talk Port Contract
Part of the X-Talk Flow Contract. Lives on the Listener Node and is responsible to bring data into the L1X Protocol and providing it to the X-Talk Commander Contract.

X-Talk Rule Engine
Responsible for the dynamic consensus across multiple levels. The Rule Engine enforces rules specific to each event type, ensuring a seamless flow of cross-chain interactions. It not only maintains the protocol's communication integrity but also its interaction processes' reliability.

X-Talk Workflow
The process by which X-Talk enables interoperability between different blockchain networks, from the initiation of a cross-chain transaction to its validation and execution. The X-Talk workflow involves message passing, transaction verification, consensus mechanisms, and settlement processes that ensure the seamless and secure transfer of assets, data, or functionality between the L1X network and external blockchains.



Zero-Knowledge proof (ZKP)
Cryptographic method that allows a prover to demonstrate the validity of a statement without disclosing the actual details of the statement. It is a powerful tool for ensuring privacy and security in blockchain networks. In Layer One X (L1X), ZKP is applied to blocks before broadcasting them in the network. This ensures the integrity and correctness of the block by verifying adherence to predefined rules and structure, preventing the inclusion of invalid or malicious transactions. Additionally, ZPK reduces the block size, leading to improved network efficiency, faster transmission, and enhanced scalability in the L1X Blockchain, enabling a more efficient consensus process.


51% attack
A hypothetical situation where more than half of the computing power on a blockchain network is controlled by one person or group, thus allowing them to dictate which transactions are verified. This would allow them to prevent other users from completing confirmed transactions and cause havoc within the system, and double-spend coins.

You've successfully subscribed to Layer One X | Newsroom
Great! Next, complete checkout to get full access to all premium content.
Error! Could not sign up. invalid link.
Welcome back! You've successfully signed in.
Error! Could not sign in. Please try again.
Success! Your account is fully activated, you now have access to all content.
Error! Stripe checkout failed.
Success! Your billing info is updated.
Error! Billing info update failed.