🚨 Get Your Free NFT Certificate Mint by Completing the Web3 Exam! START NOW
Learn to gain real rewards

Learn to gain real rewards

Collect Bits, boost your Degree and gain actual rewards!

New
Video Courses
Video Courses
Deprecated
Scale your career with online video courses. Dive into your learning adventure!
Crypto Terms:  Letter D

What is Design Flaw Attack?

Meaning:
Design Flaw Attack - a sort of attack that uses the flaws of software design.
medium
2 minutes

Let's find out Design Flaw Attack meaning, definition in crypto, what is Design Flaw Attack, and all other detailed facts.

A design flaw attack is a type of malicious attack with the goal to gain access to someone’s crypto funds. It takes place by an attacker creating some kind of flawed software (a smart contract, a marketplace, a DEX). This is done so that users would take action within the permissionless, decentralized software also being unaware of the errors.

As an example, let's take the decentralized prediction market platform based on the Ethereum blockchain - Augur. Some theories state that the prediction markets that are on the platform are subjects of the design flaw attacks. This is because the markets supposedly can trick people into betting their funds on a flawed contract, since they have unclear descriptions. This could result in lost funds for the investor.

Also, these types of attacks could potentially target price feeds and other similar sources of information. The malicious actor can exploit and manipulate any smart contract that depends on the particular data source. This can be achieved due to the protocol or a marketplace having only one price source API.

It can be discontinued even before the expiration date which offers the attacker an opportunity to complete his plan.

Usually, a design flaw attack creates fake opportunities that are very visible to consumers, so that they would lock their cash within a smart contract. An unfair settlement and a release of capital is an outcome of a faulty, and believable description of some contract terms or the protocol upon which they are based. The description usually illustrates a lot of benefits for the user.

Moreover, another way a malicious actor could carry on with his design flaw attack is to discover an already existing contract that, indeed, has flaws. Usually, it was created by another person that didn’t have any bad intentions.

This way, the attack would concentrate on the knowledge imbalance between the attacker and any possible accessible network member.

software wallet<\/strong><\/a> that is typically <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-non-custodial/">non-custodial. The <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-cryptocurrency/">cryptocurrencies belonging to a specific wallet aren&rsquo;t obtained by any central platform or third party. Rather, the end-user is the only one that is able to send or receive funds using <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-private-key-secret-key/">private keys<\/strong><\/a>.<\/p>\n<p><strong>A few of the most well-known examples of desktop wallets are:<\/strong><\/p>\n<ul>\n<li>Guarda;<\/li>\n<li>Electrum;<\/li>\n<li>Exodus;<\/li>\n<li><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-atomicdex/">AtomicDEX./n/n

There are a lot of other ones out there as well.<\/p>\n<h3>Advantages of Desktop Wallets<\/h3>\n<p>An important feature for many crypto users, particularly those that are new to crypto trading, is accessibility, which desktop wallets provide. Ease of use is another feature that desktop wallets possess since they are usually linked to trading platforms.<\/p>\n<p>This gives users a simple technique to check their crypto while maintaining control of their private keys.<\/p>\n<p>AtomicDEX and a few other desktop wallets utilize atomic swaps to execute <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-peer-to-peer-p2p/">peer-to-peer (P2P)<\/strong><\/a> cryptocurrency trading. Others have unions with <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-centralized-exchange-cex/">centralized exchanges (CEXs)<\/strong><\/a>.<\/p>\n<p>Users may also get desktop wallets for free, and the bulk of them employ the <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-open-source/">open-source code.<\/p>\n<h3>Disadvantages of Desktop Wallets<\/h3>\n<p>There are certain disadvantages to using a desktop wallet. One of which is that, compared to mobile devices, there is a lack of portability. However, the vast majority of desktop wallets are compatible with a comparable <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-mobile-wallet/">mobile wallet<\/strong><\/strong><\/a>.<\/p>\n<p>This indicates that users can move their seeds from a desktop to a mobile device for better portability in a fast and effective manner.<\/p>","definition":"A software wallet that is usually non-custodial refers to a desktop wallet.","status":"published","meta_title":"What is Desktop Wallet? Definition & Meaning | Crypto Wiki","meta_description":"Desktop Wallet meaning: Desktop Wallet - A software wallet that is usually non-custodial refers to a desktop wallet.","meta_keywords":null}" :prev-section="{"id":263,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Derivatives_market","level":"easy","author_id":1,"created_at":"2023-06-19T06:58:59.000000Z","updated_at":"2024-01-05T14:14:36.000000Z","slug":"what-is-derivatives-market","title":"What is Derivatives Market?","section":"D","keyword":"Derivatives Market","content":"<p>A derivative is a financial tool that derives its own worth from the worth of the underlying asset. The asset can either be cryptocurrency, <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-fiat/">fiat currency, or commodity.<\/p>\n<p>The majority of the most prominent crypto exchange platforms are also considered to be derivatives markets. Likewise, the expansion of derivates is seen by a few as the main requirement for the mass adoption of cryptocurrencies.<\/p>\n<p>For instance, the mass <strong><a href=https://www.bitdegree.org/"//crypto//buy-bitcoin-btc/">Bitcoin futures<\/strong> launch by Chicago Board Options Exchange (CBOE) in 2017 gave the institutional investors an option to trade crypto derivatives without being obligated to have the actual <strong>asset.<\/strong><\/p>\n<p>Additionally, the crypto futures industry has been vulnerable to numerous governmental crackdowns.&nbsp;<\/p>\n<p>The Financial Services Authority of the United Kingdom declared in October of 2020 that the selling of crypto futures to ordinary investors would be prohibited in the nation, noting the volatility of the underlying assets and the potential of crimes in crypto.<\/p>\n<p><strong>Futures and options<\/strong> are the two primary forms of derivatives in a derivative market. The term \"futures\" refers to transactions that must be completed before the expiration date. Options provide users the opportunity but not the obligation to acquire or sell an underlying asset at a predetermined price.<\/p>\n<p>Another set of common derivatives types is the <strong>swaps and forwards<\/strong>. These types are not supervised or regulated, meaning that they are not traded on regulated exchanges. To specify, swap is initially a contract to exchange financial responsibilities.<\/p>\n<p><strong>Forwards,<\/strong> on the other hand, are non-standardized and uncontrolled futures contracts. There are certain, severe dangers in the derivative market that must be considered. The dangers can be systemic, as they were during the financial crisis, which triggered the collapse of derivatives.<\/p>","definition":"is a public market made for derivatives.","status":"published","meta_title":"What is Derivatives Market? Definition & Meaning | Crypto Wiki","meta_description":"Derivatives Market meaning: Derivatives Market - is a public market made for derivatives.","meta_keywords":null}" :model="{"id":972,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Hacker","level":"medium","author_id":1,"created_at":"2023-06-19T06:59:01.000000Z","updated_at":"2024-01-05T14:17:12.000000Z","slug":"what-is-design-flaw-attack","title":"What is Design Flaw Attack?","section":"D","keyword":"Design Flaw Attack","content":"<p>A design flaw attack is a type of malicious attack with the goal to <strong>gain access<\/strong> to someone&rsquo;s crypto funds. It takes place by an attacker creating some kind of flawed software (a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-smart-contract/">smart contract<\/strong><\/a>, a marketplace, a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-decentralized-exchange-dex/">DEX). This is done so that users would take action within the permissionless, decentralized software also being unaware of the errors.<\/p>\n<p>As an example, let's take the decentralized prediction market platform based on the <a href=https://www.bitdegree.org/"//crypto//buy-ethereum-eth/">Ethereum blockchain - Augur. Some theories state that the prediction markets that are on the platform are subjects of the design flaw attacks. This is because the markets supposedly can trick people into<strong> betting their funds on a flawed contract<\/strong>, since they have unclear descriptions. This could result in lost funds for the investor.<\/p>\n<p>Also, these types of attacks could potentially target price feeds and other similar sources of information. The malicious actor can exploit and manipulate any smart contract that depends on the particular data source. This can be achieved due to the protocol or a marketplace having only one price source <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-api/">API./n

It can be discontinued even before the expiration date which offers the attacker an opportunity to complete his plan.<\/p>\n<p>Usually, a design flaw attack creates fake opportunities that are very visible to consumers, so that they would <strong>lock<\/strong> their cash within a smart contract. An unfair settlement and a release of capital is an outcome of a faulty, and believable description of some contract terms or the protocol upon which they are based. The description usually illustrates a lot of benefits for the user.<\/p>\n<p>Moreover, another way a malicious actor could carry on with his design flaw attack is to discover an already existing contract that, indeed, has flaws. Usually, it was created by another person that didn&rsquo;t have any bad intentions.<\/p>\n<p>This way, the attack would concentrate on the knowledge imbalance between the attacker and any possible <strong>accessible network member<\/strong>.<\/p>","definition":"a sort of attack that uses the flaws of software design.","status":"published","meta_title":"What is Design Flaw Attack? Definition & Meaning | Crypto Wiki","meta_description":"Design Flaw Attack meaning: Design Flaw Attack - a sort of attack that uses the flaws of software design.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master&rsquo;s degree on Economics, Politics &amp; Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US&rsquo; Western and Japan&rsquo;s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He&rsquo;s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain &amp; Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}" :chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]" current-chapter="D" current-section="what-is-design-flaw-attack">