🚨 Get Your Free NFT Certificate Mint by Completing the Web3 Exam! START NOW
Learn to gain real rewards

Learn to gain real rewards

Collect Bits, boost your Degree and gain actual rewards!

New
Video Courses
Video Courses
Deprecated
Scale your career with online video courses. Dive into your learning adventure!
Crypto Terms:  Letter C

What is Cryptology?

Meaning:
Cryptology - The scientific research of cryptography and cryptanalysis is known as cryptology.
easy
2 minutes

Let's find out Cryptology meaning, definition in crypto, what is Cryptology, and all other detailed facts.

Cryptoanalysis and cryptography are accomplished by various mathematical formulas and algorithms.

Cryptology is sometimes confused with cryptography or cryptoanalysis, but experts in the area have long held that cryptology is the more complete word, embracing both.

Initially, cryptology was the study of the ideas and methods for masking data in ciphers and later revealing it to authorized individuals using the secret key. Now, it surrounds the whole area of key-controlled modifications of data into forms that are either unattainable or computationally unworkable for unauthorized users to copy or reverse.

The information must be changed in such a way that an unauthorized individual cannot perceive the actual essence behind it. As a result, the information is safe for transmission and storage.

It is carried out using certain mathematical equations that are extremely difficult to solve unless certain requirements are satisfied. Intractability refers to the degree of complexity. These mathematical equations are used to construct the fundamentals of cryptography.

A few of the most essential equations are:

  • The integer factorization problem
  • The discrete logarithm problem
  • The elliptic curve discrete logarithm problem

Only those who have the key have access to the disguised data. Encryption is the transformation of plaintext into cipher or ciphertext under the management of the key. Decryption is the opposite procedure, in which a legitimate receiver extracts the hidden information from the cipher using the key.

Moreover, during the period of World War II, cryptography was utilized to ensure the confidentiality of written messages. It can also safeguard computer data by encrypting facsimile and television signals, validating the identities of electronic commerce participants, and producing legally permissible records of those transactions.

The subject of cryptanalysis has grown as a result of this expanded perception of cryptography.

non-fungible tokens (NFTs)<\/strong><\/strong><\/a> has been rapidly growing in popularity over the past few years. The growth&nbsp;was influenced by selling and buying NFTs on Ethereum, which began in December of 2017, with CryptoKittens. Since then, there are millions of tokens that are currently existing on the network. CryptoPunks are one of the most well-known Ethereum-based NFT&nbsp;collectibles.&nbsp;<\/p>\n<p>Every image showcases a different punk that can be an ape, a <strong>robot<\/strong>, an alien, and so on. Every punk is unique and can even look similar to particular celebrities. The collection was created back in 2017 by John Watkinson, Andy Milenius, and Matt Hall. It consists of <strong>10,000 24x24 pixel images<\/strong>.<\/p>\n<p>Initially, it was an experiment performed by Larva Labs (the creator of CryptoPunks). Therefore, the collection was completely free. At that time, the standard for NFTs (<a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-erc-721/">ERC-721)&nbsp;didn't exist yet.<\/p>\n<p>The team behind CryptoPunks had no clue that their collection would become the most well-known name in the NFT industry. When Larva Labs produced CryptoPunks, <strong>9,000<\/strong> of them were taken by Ethereum wallet owners, whereas the rest were kept by Larva Labs itself.<\/p>\n<p>CryptoPunks were developed with a similar purpose as CryptoKitties. This means that they anticipated revealing the possibilities of non-fungible tokens on Ethereum <strong>using ERC-721<\/strong>. CryptoKitties, on the other hand, showcased the possibilities with <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-erc-20/">ERC-20 and <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-erc-223/">ERC-223&nbsp;tokens./n

NFT market and <strong>CryptoPunks<\/strong> faced a huge growth in their value&nbsp;in 2021. In the first six months, the estimated volume for 2021 was $2.5 billion. Multiple NFTs were sold for $1 million each.<\/p>\n<p>Currently, CryptoPunks is <strong>the most desired NFT collection<\/strong>. Multiple NFTs are sold for millions of dollars. After all, CryptoPunks is one of the first NFT collections.<\/p>","definition":"is a popular Ethereum-based non-fungible token (NFT) collection.","status":"published","meta_title":"What is CryptoPunks? Definition & Meaning | Crypto Wiki","meta_description":"CryptoPunks meaning: CryptoPunks - is a popular Ethereum-based non-fungible token (NFT) collection.","meta_keywords":null}" :prev-section="{"id":219,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Cryptojacking","level":"medium","author_id":1,"created_at":"2023-06-19T06:58:59.000000Z","updated_at":"2024-01-06T16:13:39.000000Z","slug":"what-is-cryptojacking","title":"What is Cryptojacking?","section":"C","keyword":"Cryptojacking","content":"<p>Cryptojacking can also be seen as a type of <strong>cyberattack.<\/strong><\/p>\n<p>The targets of cryptojacking can be anyone from individual people to large organizations.<\/p>\n<p>Furthermore, cryptocurrencies can be mined, so individuals are able to employ their computational resources to provide protection for the operation of the blockchain and gain newly issued coins. These coins can be traded on crypto exchanges for <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-fiat/">fiat currencies.<\/p>\n<p>To do so, users must acquire, set up, and manage specialized equipment, as well as incur large electrical power costs, all of which cut into the profit generated from selling the mined coins. So, a hacker might choose to <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-mining/">mine cryptocurrency by hijacking the computational resources of other people, instead of participating in a fair competition.<\/p>\n<p>The two most popular types of cryptojacking:<\/p>\n<ul>\n<li><strong>File-based<\/strong><\/li>\n<li>Browser-based<\/li>\n<\/ul>\n<p>File-based cryptojacking occurs when hackers send perfectly authentic emails to their targets. When the user opens the attachment, the software runs, and the crypto mining script is installed on their machine. It can also be referred to as the &ldquo;drive-by&rdquo; cryptojacking.<\/p>\n<p>Browser-based cryptojacking happens when hackers inject harmful code into different websites. The crypto mining script is activated on the targeted computer as soon as he or she visits the infected websites. In other words, by using a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-trojan/">trojan. The program keeps running on the host computer, consuming its resources.<\/p>\n<p>These cryptojacking tactics can go undetected for a long time, allowing hackers to mine with carelessness from unwary users' devices. Mining operations have expensive power charges, which hackers <strong>transfer to their victims in order for them to obtain token payouts without incurring financial hardship.<\/strong><\/p>\n<p>Cryptojacking scripts might lead to devices breaking due to wear and tear. Besides, a specific class of cryptojacking scripts has a worming ability that allows it to replicate fast, infecting multiple devices and servers within a network.<\/p>\n<p>Tesla Inc. was a subject of cryptojacking in February of 2018. Mining malware was operating on the company's Amazon Web Services cloud infrastructure. Although the data exposure was revealed to be minor in this example, cryptojacking offers a broad security danger to a firm in general.<\/p>\n<p>Furthermore, the distinctions between cryptojacking and \"genuine\" browser mining are often not evident.<\/p>","definition":"The utilization of another side's computer to mine cryptocurrency without their permission is referred to as cryptojacking.","status":"published","meta_title":"What is Cryptojacking? Definition & Meaning | Crypto Wiki","meta_description":"Cryptojacking meaning: Cryptojacking - The utilization of another side's computer to mine cryptocurrency without their permission is referred to as cryptojacking.","meta_keywords":null}" :model="{"id":220,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Cryptology","level":"easy","author_id":1,"created_at":"2023-06-19T06:58:59.000000Z","updated_at":"2024-01-06T16:13:47.000000Z","slug":"what-is-cryptology","title":"What is Cryptology?","section":"C","keyword":"Cryptology","content":"<p><strong>Cryptoanalysis and cryptography are accomplished by various mathematical formulas and algorithms<\/strong>.<\/p>\n<p>Cryptology is sometimes confused with cryptography or cryptoanalysis, but experts in the area have long held that cryptology is the more complete word, embracing both.<\/p>\n<p>Initially, cryptology was the study of the ideas and methods for masking data in ciphers and later revealing it to authorized individuals using the <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-private-key-secret-key/">secret key<\/strong><\/a>. Now, it surrounds the whole area of key-controlled modifications of data into forms that are either unattainable or computationally unworkable for unauthorized users to copy or reverse.<\/p>\n<p>The information must be changed in such a way that an unauthorized individual cannot perceive the actual essence behind it. As a result, the information is safe for transmission and storage.<\/p>\n<p>It is carried out using certain mathematical equations that are <strong>extremely difficult to solve<\/strong> unless certain requirements are satisfied. Intractability refers to the degree of complexity. These mathematical equations are used to construct the fundamentals of cryptography.<\/p>\n<p>A few of the most essential equations are:<\/p>\n<ul>\n<li>The integer factorization problem<\/li>\n<li>The discrete logarithm problem<\/li>\n<li>The elliptic curve discrete logarithm problem<\/li>\n<\/ul>\n<p>Only those who have the key have access to the disguised data. <strong>Encryption<\/strong> is the transformation of plaintext into cipher or ciphertext under the management of the key. Decryption is the opposite procedure, in which a legitimate receiver extracts the hidden information from the cipher using the key.<\/p>\n<p>Moreover, during the period of World War II, cryptography was utilized to ensure the confidentiality of written messages. It can also safeguard computer data by encrypting facsimile and television signals, validating the identities of electronic commerce participants, and producing legally permissible records of those transactions.<\/p>\n<p><em>The subject of cryptanalysis has grown as a result of this expanded perception of cryptography.<\/em><\/p>","definition":"The scientific research of cryptography and cryptanalysis is known as cryptology.","status":"published","meta_title":"What is Cryptology? Definition & Meaning | Crypto Wiki","meta_description":"Cryptology meaning: Cryptology - The scientific research of cryptography and cryptanalysis is known as cryptology.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master&rsquo;s degree on Economics, Politics &amp; Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US&rsquo; Western and Japan&rsquo;s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He&rsquo;s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain &amp; Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}" :chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]" current-chapter="C" current-section="what-is-cryptology">