Origin in 1968 in telecommunications, a back-formation from encryption (1964), or from en- (1) + crypt (n.) on the notion of "hidden place." Crypto origin is in early 15c., cripte, "grotto, cavern," from Latin crypta "vault, cavern," from Greek krypte "a vault, crypt" (short for krypte kamara "hidden vault"), fem. of kryptos "hidden," verbal adjective from kryptein "to hide," which is of uncertain origin. Comparison has been made to Old Church Slavonic kryjo, kryti "to hide," Lithuanian kráuti "to pile up." Blockchain works by enabling a secure, private, and indelible chain to fend off fraudulent activity. Throughout the chain, permissions and cryptography prevent unauthorized access to the network and ensure that participants are who you expect them to be when you buy its/their product/service. Confidentiality is maintained through cryptographic techniques and/or data partitioning techniques to give participants selective visibility into the ledger; both transactions and the identity of transacting parties can be masked. After conditions are agreed to, participants can’t tamper with a record of the transaction; errors can be reversed only with new transactions. All parties in the transaction can be "hidden" and "trusted." Advanced encryption, along with permissions, ensures privacy on the network, preventing unauthorized access to transaction details, and deterring fraudulent activity. Blockchain can be your friend.
Hidden in the deep, safe crypts of information, frictionless actions