Crypto Glossary
Mastering the Language of On-Chain Truth

Forensic Precision
Clinical definitions designed for legal and regulatory documentation.

Threat Vector Identification
Clear explanations of the obfuscation tactics used by illicit actors.

Institutional Alignment
Terminology synchronized with FATF, MiCA, and global AML/CFT standards.
Deconstructing the Mechanics of the Ledger
I. Attribution & Behavioral Identity Mechanics
Heuristic Fingerprinting: The process of identifying a single controlling entity across thousands of seemingly anonymous wallets. We move beyond static addresses to analyze non-static behavioral traits, such as the micro-timing of gas-fee adjustments, specific smart-contract interaction sequences, and “Dusting” patterns used to test liquidity gateways. This allows Bholder to maintain a persistent watch on high-risk actors even as they rotate their infrastructure.
UBO (Ultimate Beneficial Owner) Extraction: The identification of the physical person or legal entity that ultimately exercises control over a digital asset cluster. In a forensic context, the UBO is often hidden behind layers of offshore shell companies or automated “Transit Wallets.” Our engine pierces these layers by correlating on-chain movements with global business registries and adverse media.
Entity Relational Mapping: A forensic visualization technique that links anonymous on-chain addresses to verified off-chain metadata. This includes cross-referencing ledger data with IP addresses, exchange login logs, leaked database repositories, and domain registration histories to create a “360-Degree Profile” of a target actor.
II. Obfuscation Tactics & Criminal Methodology
Peeling Chain Dynamics: A sophisticated money-laundering technique where a large sum of stolen capital is “peeled” into hundreds of micro-transactions through a series of transit wallets. The goal is to overwhelm standard block explorers and dilute the “Taint” of the funds. Bholder’s engine “collapses” these chains, proving they all lead back to a single consolidation hub.
Chain-Hopping & Atomic Swap Tracking: The act of moving illicit liquidity across different blockchains (e.g., Ethereum to Solana or Monero) via decentralized bridges to intentionally break the deterministic forensic trail. We monitor the “Liquidity Echo” on both sides of the bridge to maintain a continuous, unbroken chain of custody across fragmented ecosystems.
Mixer / Tumbler Architecture: Privacy-enhancing protocols (such as Tornado Cash or Railgun) that pool funds from multiple users and redistribute them to break the link between the depositor and the withdrawer. We analyze the “Entrance and Exit” telemetry to calculate the probability of a specific asset’s origin, even within shielded pools.
III. Risk, Compliance, and Legal Parameters
Taint Propagation & Atomic Contagion: A metric quantifying the percentage of “compromised” liquidity within a specific wallet or pool. This is based on its historical and mathematical proximity to sanctioned entities or stolen asset clusters. We measure how much of a pool is “infected” by illicit funds before it reaches a primary institutional gateway.
Sanction Echo & Recursive Path Analysis: A secondary exposure risk where a wallet is not directly blacklisted but is linked through a “Recursive Path” to a primary sanctioned entity (e.g., the Lazarus Group). Most tools miss this “Second-Degree” risk; Bholder identifies it by analyzing every transaction in the asset’s history up to 50 “hops” back.
VASP (Virtual Asset Service Provider) Topology: The mapping of the global network of exchanges, OTC desks, and custodial services. We focus on the Institutional Pedigree—the regulatory standing, jurisdiction, and historical compliance delta of these providers—to determine if assets originating from them are safe for institutional integration.
Zero-Knowledge Proof (ZKP) Validation: A cryptographic method that allows a party to prove a statement is true (e.g., “This user is not on a sanctions list”) without revealing the underlying sensitive data. We utilize ZKPs to provide “Proofs of Compliance” that satisfy global regulators while maintaining user privacy.
From Terminology to Legal Finality
Understanding the terminology is the first step toward effective litigation. Bholder’s glossary bridges the gap between raw blockchain telemetry and the structured requirements of a global courtroom. When our forensic leads identify “Taint Propagation” or execute “Entity Relational Mapping,” these aren’t just terms—they are the technical pillars of a court-admissible Expert Forensic Report.
By establishing a shared technical language, we empower our partners to transform fragmented data into Actionable Truth, ensuring that every term used in an investigation carries the full weight of forensic authority.