The NordBastion polar-bear mascot in a Nordic library at night, leaning over a long oak reading table strewn with open dictionaries and PGP-signed papers under aurora-blue lamplight
Glossary · Plain-English definitions

Glossary.
The terms that show up everywhere, defined here.

Five words do a lot of heavy lifting on this site: KYC, no-KYC, Monero, warrant canary, DDoS mitigation. Each gets one short page that says what it means, why we care, and where on this site it actually matters.

Editorial rules · How we write these

Three rules. Same every entry.

01 Plain English first

Definitions a stranger can read once.

No jargon for jargon's sake. Every entry opens with a one or two sentence definition that any technically literate adult should be able to read once and understand. The longer prose comes after, for context.

02 Worth checking your assumptions

We say what the term does not mean, too.

Most of these words are abused in marketing. "No-KYC" is not the same as "anonymous"; "Monero" is not the same as "untraceable"; "DDoS mitigation" is not the same as "DDoS proof". Each entry draws the line.

03 Cross-linked to where it matters

Every entry points back into the site.

A definition in a vacuum is trivia. Each entry closes with "where it shows up on this site" — the doctrine, the jurisdiction page, the VPS catalogue, the guide that uses the term in anger.

Entries

Five terms, one short page each.

More entries get added as new words become load-bearing on the site. If a definition is missing, it is because we have not earned the right to use the word yet.

01 · term

KYC

Know Your Customer — the identity check most hosts run on you, by law or by choice.

Read the entry
02 · term

No-KYC

Refusing to collect customer identity — the floor of a privacy host.

Read the entry
03 · term

Monero (XMR)

Default-private cryptocurrency with no public chain to walk.

Read the entry
04 · term

Warrant canary

A periodic statement whose silence is itself a signal.

Read the entry
05 · term

DDoS mitigation

Filtering volumetric attack traffic before it reaches the server.

Read the entry
06 · term

Tor

The anonymous overlay network with three-hop circuits.

Read the entry
07 · term

Bitcoin (BTC)

Pseudonymous public-ledger cryptocurrency — chain-traceable, not anonymous.

Read the entry
08 · term

Lightning Network

Bitcoin Layer-2 channels for instant, low-fee micropayments.

Read the entry
09 · term

WireGuard

Kernel-fast modern VPN protocol — ~4,000 lines of code.

Read the entry
10 · term

VPN

Encrypted tunnel between a client and a server you trust.

Read the entry
11 · term

VPS

Virtual Private Server — a KVM-virtualised slice with root SSH.

Read the entry
12 · term

NVMe

PCIe-attached SSD storage protocol — the default on every NordBastion tier.

Read the entry
13 · term

IPv4

32-bit Internet Protocol address space — dedicated public v4 on every plan.

Read the entry
14 · term

IPv6

128-bit Internet Protocol address space — /64 routed on every VPS.

Read the entry
15 · term

SSH

Encrypted remote-shell protocol — the control plane of every VPS.

Read the entry
16 · term

TLS

Transport Layer Security — the encryption beneath every HTTPS connection.

Read the entry
17 · term

PGP / OpenPGP

Public-key cryptography for signing and encrypting messages and files.

Read the entry
18 · term

End-to-end encryption

Encryption where only the communicating endpoints hold the keys.

Read the entry
Last reviewed · 2026-05-20 Voice · plain English, no marketing fog Cadence · updated when usage on the site shifts
Or read the underlying doctrine