🚨 Get Your Free NFT Certificate Mint by Completing the Web3 Exam! START NOW
Learn to gain real rewards

Learn to gain real rewards

Collect Bits, boost your Degree and gain actual rewards!

New
Video Courses
Video Courses
Deprecated
Scale your career with online video courses. Dive into your learning adventure!
Crypto Terms:  Letter D

What is Denial-of-Service (DoS) Attack?

Meaning:
Denial-of-Service (DoS) Attack - When a computer or network service becomes unavailable to its user, this is referred to as a denial-of-service attack.
medium
3 minutes

Let's find out Denial-of-Service (DoS) Attack meaning, definition in crypto, what is Denial-of-Service (DoS) Attack, and all other detailed facts.

A denial-of-service attack happens when a computer or network service becomes temporarily inaccessible to its users. These attacks are widely used by hackers to intrude upon the regular processing of computer systems and services.

The act is carried out by overloading the targeted host or network with data until it crashes. This might last anywhere from a few hours to several months and can be especially time and money consuming.

There can be different denial-of-service attacks depending on their business and type:

  • Volumetric attacks take place by absorbing the whole bandwidth capacity of a network and overloading it with echo requests.
  • Fragmentation attacks are looking for ways to infiltrate the target network's built-in reassembling capabilities.
  • Syn flooding attacks are not far from volumetric attacks, nevertheless, the attacker quickly establishes a link to a server without finalizing it.
  • Phasing attacks focus on irreversibly damaging the target network by sending a fake update request and adding malware throughout the network.
  • Application layer attack carries out by bombarding the victim with inquiries and targeting undiscovered programming faults in an application or network.
  • A distributed denial-of-service attack is the most prevalent type of attack, which is categorized as a malware attack. Hackers distribute malware to networks of linked devices and begin blasting them with massive amounts of requests in order to overflow the network.

At the same time blockchain technology applications appeared, a new kind of DoS, a blockchain denial-of-service (BDoS) attack arose. These types of attacks are aimed at blockchains that function under the proof-of-work consensus algorithm.

It operates by targeting the reward system for miners. The PoW consensus algorithm depends on miners to manually validate new blocks. If the attack takes place, miners do not gain their rewards, and the block validation process is disrupted. 

Nevertheless, it is way more complicated to carry out a DoS attack on a decentralized network.

Typically, DoS attacks depend on the centralized characteristic of traditional networks, but this approach does not work with blockchain-based networks. Attackers transmit fraudulent proofs to the blockchain claiming they have a mining lead in order to successfully disrupt the mining activity.

This discourages other miners from performing operations necessary for transaction validation, which essentially slows down the processing power of the blockchain significantly. Even so, BDoS attacks have been extremely rare and unsuccessful so far.

Sadly, as cryptocurrency exchanges become more popular, they are subjected to a growing number of DDoS attacks. Since 2020, many distinct DDoS attacks have been attempted against some of the most prominent cryptocurrency exchanges.

This causes the exchange's services to be unreachable for an extended length of time.

order book<\/a>, which is a list of existing purchase or sell orders for an asset at various price points.<\/strong><\/p>\n<p>The chart plans bids and asks on a graph, grounded on limit orders. It also shows a specific part at which the market is the most suitable to endure a transaction.<\/p>\n<p>The components of a depth chart include <strong>a bid line, an ask line, a horizontal axis, and a vertical axis.<\/strong><\/p>","definition":"is a tool for assessing cryptocurrency supply and demand at any given period and price.","status":"published","meta_title":"What is Depth Chart? Definition & Meaning | Crypto Wiki","meta_description":"Depth Chart meaning: Depth Chart - is a tool for assessing cryptocurrency supply and demand at any given period and price.","meta_keywords":null}" :prev-section="{"id":259,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Listing_(finance)#Delisting","level":"medium","author_id":1,"created_at":"2023-06-19T06:58:59.000000Z","updated_at":"2024-01-04T14:50:54.000000Z","slug":"what-is-delisting","title":"What is Delisting?","section":"D","keyword":"Delisting","content":"<p><strong>Delisting can take place in a voluntary or involuntary manner. Also, it typically ends up with the company discontinuing procedures, declaring bankruptcy, seeking to become private, or failing to meet the listing requirements.<\/strong><\/p>\n<p>There is a variety of reasons as to why projects get delisted, a few of such are the absence of protocol development, dangerous acts, no business and customer engagement, faulty network, or lack of regular trading activity.<\/p>\n<p><strong>Burger King<\/strong>, for example, voluntarily delisted from the New York Stock Exchange in 2010. A private takeover by 3G Capital triggered the delisting. Two years later, the private corporation was relisted and traded again before merging with a new firm that is now traded on the Toronto Stock Exchange.<\/p>\n<p>Additionally, prior to performing a full examination, the world's largest cryptocurrency exchange delisted RCN &amp; WPR, OST projects.<\/p>\n<p>Even though it only happens in exceptional circumstances, companies are able to ask to get their shares <strong>re-listed<\/strong> after they solve the problem and follow the listing terms. Investors usually are not sure about relisting a company, and the success during the second term might be temporary.<\/p>\n<p>Despite the fact that there are organizations that get delisted without violating the major rules, the concept safeguards markets from being submerged with poor securities from issuers who might be coming to the end of their life loop.<\/p>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-exchange/">Exchanges are working on lowering the systemic danger linked with the market and protecting investors by making sure that all issuers comply with precise regulatory terms.<\/p>\n<p>After being delisted, the asset can&rsquo;t be bought or sold on an exchange. On the other hand, if an organization becomes private or is bought, this may be a sign that it has delisted voluntarily. However, if the company doesn&rsquo;t manage to meet the listing requirements that are set out by exchanges, it is delisted involuntarily.<\/p>\n<p>Besides, listing requirements are often considered to be <strong>complex,<\/strong> and several issuers, as well as securities, might have a particular set of rules.&nbsp;<\/p>\n<p>In general, these include timely submission of financial statements, a stock value above a particular level, an acceptable number of shareholders, a minimum market capitalization barrier, or certain revenue, gains, cash flow, and trading activity requirements.<\/p>\n<p>Delisting typically has reasonable ramifications. Investors find it more difficult to assess and acquire business shares that are not listed on major exchanges. This means that the corporation will not issue fresh stock to the market to support its new business endeavors.<\/p>\n<p>Looking from a crypto perspective, <strong>if a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-coin/">coin gets delisted, all of its trading sets are deleted from the cryptocurrency exchange.<\/strong> Nevertheless, investors who have previously invested in the delisted project are given a deadline to retrieve their funds, after which the crypto project is no longer accessible in any format on that cryptocurrency exchange.<\/p>","definition":"is the process of deleting a stock, cryptocurrency, or asset from an exchange platform.","status":"published","meta_title":"What is Delisting? Definition & Meaning | Crypto Wiki","meta_description":"Delisting meaning: Delisting - is the process of deleting a stock, cryptocurrency, or asset from an exchange platform.","meta_keywords":null}" :model="{"id":260,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack#:~:text=Denial%2Dof%2Dservice%20attacks%20are,most%20serious%20attacks%20are%20distributed.","level":"medium","author_id":1,"created_at":"2023-06-19T06:58:59.000000Z","updated_at":"2024-01-04T14:52:06.000000Z","slug":"what-is-denial-of-service-dos-attack","title":"What is Denial-of-Service (DoS) Attack?","section":"D","keyword":"Denial-of-Service (DoS) Attack","content":"<p>A denial-of-service attack happens when a computer or network service becomes temporarily inaccessible to its users. <strong>These attacks are widely used by hackers to intrude upon the regular processing of computer systems and services.<\/strong><\/p>\n<p>The act is carried out by overloading the targeted host or network with data until it crashes. This might last anywhere from a few hours to several months and can be especially time and money consuming.<\/p>\n<p>There can be different denial-of-service attacks depending on their business and type:<\/p>\n<ul>\n<li>Volumetric attacks take place by absorbing the whole bandwidth capacity of a network and overloading it with echo requests.<\/li>\n<li>Fragmentation attacks are looking for ways to infiltrate the target network's built-in reassembling capabilities.<\/li>\n<li>Syn flooding attacks are not far from volumetric attacks, nevertheless, the attacker quickly establishes a link to a server without finalizing it.<\/li>\n<li>Phasing attacks focus on irreversibly damaging the target network by sending a fake update request and adding malware throughout the network.<\/li>\n<li><strong>Application layer attack<\/strong> carries out by bombarding the victim with inquiries and targeting undiscovered programming faults in an application or network.<\/li>\n<li>A distributed denial-of-service attack is the most prevalent type of attack, which is categorized as a malware attack. Hackers distribute malware to networks of linked devices and begin blasting them with massive amounts of requests in order to overflow the network.<\/li>\n<\/ul>\n<p>At the same time blockchain technology applications appeared, a new kind of DoS, a blockchain denial-of-service (BDoS) attack arose. These types of attacks are aimed at blockchains that function under the <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-proof-of-work-pow/">proof-of-work consensus algorithm.<\/p>\n<p>It operates by targeting the reward system for miners. The PoW consensus algorithm depends on miners to manually validate new blocks. If the attack takes place, miners do not gain their rewards, and the block validation process is disrupted.&nbsp;<\/p>\n<p>Nevertheless, it is way more complicated to carry out a DoS attack on a decentralized network.<\/p>\n<p>Typically, DoS attacks depend on the centralized characteristic of traditional networks, but this approach does not work with blockchain-based networks. Attackers transmit fraudulent proofs to the blockchain claiming they have a mining lead in order to successfully disrupt the mining activity.<\/p>\n<p>This discourages other miners from performing operations necessary for transaction validation, which essentially slows down the processing power of the blockchain significantly. Even so, BDoS attacks have been extremely rare and unsuccessful so far.<\/p>\n<p>Sadly, as cryptocurrency exchanges become more popular, they are subjected to a growing number of DDoS attacks. Since 2020, many distinct DDoS attacks have been attempted against some of the most prominent cryptocurrency exchanges.<\/p>\n<p><strong>This causes the exchange's services to be unreachable for an extended length of time.<\/strong><\/p>","definition":"When a computer or network service becomes unavailable to its user, this is referred to as a denial-of-service attack.","status":"published","meta_title":"What is Denial-of-Service (DoS) Attack? Definition & Meaning | Crypto Wiki","meta_description":"Denial-of-Service (DoS) Attack meaning: Denial-of-Service (DoS) Attack - When a computer or network service becomes unavailable to its user, this is referred to as a denial-of-service attack.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master&rsquo;s degree on Economics, Politics &amp; Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US&rsquo; Western and Japan&rsquo;s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He&rsquo;s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain &amp; Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}" :chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]" current-chapter="D" current-section="what-is-denial-of-service-dos-attack">