Crypto Terms:
Letter H
What does Haha Money Printer Go Brrrrr mean?
Meaning:
Haha Money Printer Go Brrrrr -
a “wojak” meme that talks about the problem of “printing more money”.
Let's find out Haha Money Printer Go Brrrrr meaning, definition in crypto, what does Haha Money Printer Go Brrrrr mean, and all other detailed facts.
Haha Money Printer Go Brrrrr is a “wojak” meme that was popular back in 2020. It shows a person that is shouting at a Federal Reserve executive when he is printing dollars:
“Nooooooooo! You can’t artificially inflate the economy by creating money to fight an economic downturn! You can’t just change market signals by using monetary policy! You are distorting the natural rate of interestino nooooooooooo.”
The Federal Reserve executive replies:
“Haha money printer go brrrrr.”
The meme has a lot of different replicas representing various problems.
To specify, this meme is talking about the government having a method of “printing more money” to fight against economic crises. Citizens are concerned about this way of managing economic downturns. Such arguments often target government intervention in the economy, particularly the potential of the government to generate money.
The Federal Reserve had an announcement back then about their plans to increase the stock market’s liquidity. The meme came out not long after, as a response. To put things into perspective, in a short-term loan model, the government attempted to add $1.5 trillion into the economy as a reaction to the COVID-19 epidemic.
The concept can also be referred to as quantitative easing (QE). It is more complicated than just creating more money “out of thin air”, but the outcome is the same.
Critiques refer to dangers such as hyperinflation when government printing becomes excessive as it has before. In a less desperate situation, skeptics appeal to the fact that a rise in the money supply devalues their own assets.
Bitcoin (BTC)<\/strong><\/a> transaction received from <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//who-is-satoshi-nakamoto/">Satoshi Nakamoto<\/strong><\/strong><\/a> in 2009. Finney was also the first developer, aside from Satoshi Nakamoto, to use and improve the Bitcoin protocol. Besides that, Hal Finney contributed to <a href=https://www.bitdegree.org/"https:////en.wikipedia.org//wiki//Pretty_Good_Privacy/" target=\"_blank\" rel=\"nofollow noindex noopener\"><strong><strong>PGP Corporation's encryption software<\/strong><\/strong><\/a> and <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-tor/" target=\"_blank\" rel=\"nofollow noindex noopener\"><strong>Tor's<\/strong><\/a> first <a href=https://www.bitdegree.org/"https:////en.wikipedia.org//wiki//Anonymous_remailer/" target=\"_blank\" rel=\"nofollow noindex noopener\"><strong>anonymous remailer<\/strong><\/a> development.<\/p>\n<p>There were rumors that Hal Finney is the real Satoshi Nakamoto because he had a neighbor named <strong>Dorian Nakamoto<\/strong> who could have been the inspiration for the nickname. Besides, according to analyst firm Juola & Associates, Finney’s handwriting <strong>had a very close resemblance to Satoshi’s<\/strong>. However, after Finney revealed emails between him and Satoshi, as well as his BTC wallet, these rumors were denied.<\/p>\n<p>Finney's work is still being <strong>praised to this day<\/strong>, despite his death from ALS in 2014, since he remains one of the most prominent and important innovators in the tech industry.<\/p>","definition":"a programmer and cryptographer who was involved in the invention of Bitcoin.","status":"published","meta_title":"Who is Hal Finney? Definition & Meaning | Crypto Wiki","meta_description":"Hal Finney meaning: Hal Finney - a programmer and cryptographer who was involved in the invention of Bitcoin.","meta_keywords":null}"
:prev-section="{"id":394,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Hacker","level":"hard","author_id":1,"created_at":"2023-06-19T06:58:59.000000Z","updated_at":"2023-12-08T04:53:19.000000Z","slug":"what-is-hacking","title":"What is Hacking?","section":"H","keyword":"Hacking","content":"<p><strong>Hacking<\/strong> is a process during which computational devices are manipulated or compromised to exploit the gaps in their systems.<\/p>\n<h2>Hacking Types<\/h2>\n<p>There are many different types of hacking done with malicious intent. It can be grounded for ideological reasons or personal gain. Hackers may use different strategies and technologies to achieve their goals.<\/p>\n<h3>Brute Force Attack<\/h3>\n<p>A <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-brute-force-attack-bfa/">brute force attack<\/strong><\/a> is a method of trying to crack a password or any encrypted information via automated guessing. Hackers employ <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-are-bots/">bots/strong>/strong>/a> that attempt to guess as many combinations of passwords as possible.<\/p>\n<p>The simpler the password is, the shorter the brute force attack lasts. Short passwords that contain only letters are considered weak, and it is recommended to add more characters to reinforce their security. Long passwords containing both <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-does-alphanumeric-mean/">alphanumerics/strong>/a> and special symbols are much more robust and sometimes may take millions of years to crack.<\/p>\n<h3>Cryptomining malware<\/h3>\n<p>Cryptomining malware is a relatively new method of hacking. If a user’s computer is infected with this type of <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-malware/">malware/strong>/a>, it unwillingly becomes part of a crypto mining network. This can disrupt processes, cause internet speeds to slow down, and may lead to the hardware deteriorating faster.<\/p>\n<p>Cryptomining malware can be caught by downloading infected files or visiting suspicious websites. The process is also known as <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-cryptojacking/">cryptojacking/strong>/strong>/a>./p>/nDistributed Denial of Service (DDoS)<\/h3>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-distributed-denial-of-service-ddos-attack/">Distributed denial of service (DDoS)<\/strong><\/a> attacks are used to prevent users from accessing certain websites. Unlike some of the other methods listed here, DDoS attacks have to be coordinated and performed <strong>by a large number of participants<\/strong>.<\/p>\n<p>DDoS attacks are often done on a political basis. They may be used to cover information or prevent users from accessing websites of high importance. DDoS attacks are often coordinated against cryptocurrency platforms to destabilize them.<\/p>\n<h3>Keylogging<\/h3>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-keylogger/">Keylogging/strong>/a> is a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-spyware/">spyware/strong>/a> method. If a user’s computer is infected with keylogging software, the hacker is able to see every character that the <strong>user types on their keyboard<\/strong>. This can reveal passwords, private messages, and other sensitive information.<\/p>\n<p>Keylogging can also affect mobile devices. Some apps that provide additional emojis or keyboard themes for the device have been proven to be keylogging spyware. Third-party text editing apps sometimes may also log the keyboard presses for unclear intents.<\/p>\n<h3>Phishing<\/h3>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-phishing/">Phishing/strong>/a> involves a hacker setting up a fraudulent malware-infected website that appears legitimate. A user is tricked into clicking the link as logging into the website, which leads to the computer getting infected. The hacker can then access the files on the victim’s computer, including login details and any other sensitive information.<\/p>\n<p>Phishing attacks are commonly used in the crypto world. In January 2022, the online platform Crypto.com admitted that <a href=https://www.bitdegree.org/"https:////www.vice.com//en//article//g5qj9j//cryptocom-says-incident-was-actually-dollar30-million-hack/" target=\"_blank\" rel=\"nofollow noindex noopener\"><strong>$30 million worth of cryptocurrency was lost in a phishing attack<\/strong><\/a>.<\/p>\n<h3>Ransomware<\/h3>\n<p>As the name implies, <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-ransomware/">ransomware/strong>/a> involves <strong>extortion<\/strong> and is used for financial gains. The files on an infected computer are <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-encryption/">encrypted/strong>/a>. Hackers demand victims to pay a ransom for the files to be <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-decryption/">decrypted/strong>/a> and accessible.<\/p>\n<p>Ransomware can be caught by downloading suspicious files or software. However, this method of hacking is on the decline as many hackers have moved onto using cryptomining malware.<\/p>\n<h2>Black Hat vs White Hat Hacking<\/h2>\n<p>Hacking is most commonly done with malicious intent, such as terrorism, money laundering, or means to illegally sell data. However, in some cases, hacking may be done for a good cause. This disparity has led to the concept of black hat and white hat hackers.<\/p>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-black-hat-hacker/">Black hat hackers<\/strong><\/a> attack systems maliciously. Their goal is to disrupt the network for personal, usually financial gain. They are known as highly skilled computer experts that can cause severe damage to computer systems.<\/p>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-white-hat-computer-hacker/">White hat hackers<\/strong><\/strong><\/a> are also known for their excellent skillset. However, they perform hacks with good intentions. They are often hired by companies to find if there are any exploits in their systems. They work on discovering bugs or any entrance points that black hat hackers may find and patch them before the systems are breached.<\/p>\n<h2>Hacking in the Crypto Industry<\/h2>\n<p>Hacking is an ever-growing issue in the crypto industry. Hackers target blockchain-based systems due to the possibilities of exploitation. Some <strong>cryptocurrencies<\/strong>, like <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-bitcoin-btc/">Bitcoin (BTC)<\/strong><\/a> or <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-ethereum-eth/">Ethereum (ETH)<\/strong><\/a>, are valued at thousands of dollars for a single coin, making them a lucrative catch for malicious actors.<\/p>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-hot-wallet/">Hot wallets<\/strong><\/a> are a particularly common target. Since hot wallets require an internet connection to access the crypto assets, hackers may employ methods such as keylogging or phishing to gain access to users’ wallet addresses and claim the funds for themselves.<\/p>","definition":"a malicious process of manipulating another computing device to exploit it.","status":"published","meta_title":"What is Hacking? Definition & Meaning | Crypto Wiki","meta_description":"Hacking meaning: Hacking - a malicious process of manipulating another computing device to exploit it.","meta_keywords":null}"
:model="{"id":985,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Slang","level":"easy","author_id":1,"created_at":"2023-06-19T06:59:01.000000Z","updated_at":"2023-11-04T07:37:00.000000Z","slug":"what-does-haha-money-printer-go-brrrrr-mean","title":"What does Haha Money Printer Go Brrrrr mean?","section":"H","keyword":"Haha Money Printer Go Brrrrr","content":"<p>Haha Money Printer Go Brrrrr is a “wojak” meme that was popular back in 2020. It shows a person that is shouting at <strong>a Federal Reserve executive<\/strong> when he is printing dollars:<\/p>\n<p><em>“Nooooooooo! You can’t artificially inflate the economy by creating money to fight an economic downturn! You can’t just change market signals by using monetary policy! You are distorting the natural rate of interestino nooooooooooo.”<\/em><\/p>\n<p>The Federal Reserve executive replies:<\/p>\n<p><em>“Haha money printer go brrrrr.”<\/em><\/p>\n<p>The meme has a lot of different replicas representing various problems.<\/p>\n<p>To specify, this meme is talking about the government having a method of “printing more money” to fight against economic crises. Citizens are concerned about this way of <strong>managing economic downturns<\/strong>. Such arguments often target government intervention in the economy, particularly the potential of the government to generate money.<\/p>\n<p>The Federal Reserve had an announcement back then about their plans to increase the stock market’s liquidity. The meme came out not long after, as a response. To put things into perspective, in a short-term loan model, the government attempted to add $1.5 trillion into the economy as a reaction to the COVID-19 epidemic.<\/p>\n<p>The concept can also be referred to as quantitative easing <strong>(QE)<\/strong>. It is more complicated than just creating more money “out of thin air”, but the outcome is the same. <\/p>\n<p>Critiques refer to dangers such as hyperinflation when government printing becomes excessive as it has before. In a less desperate situation, skeptics appeal to the fact that a rise in the money supply devalues their own assets.<\/p>","definition":"a \u201cwojak\u201d meme that talks about the problem of \u201cprinting more money\u201d.","status":"published","meta_title":"What does Haha Money Printer Go Brrrrr mean? Definition & Meaning | Crypto Wiki","meta_description":"Haha Money Printer Go Brrrrr meaning: Haha Money Printer Go Brrrrr - a \u201cwojak\u201d meme that talks about the problem of \u201cprinting more money\u201d.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master’s degree on Economics, Politics & Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US’ Western and Japan’s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He’s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain & Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}"
:chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]"
current-chapter="H"
current-section="what-does-haha-money-printer-go-brrrrr-mean">