🚨 Get Your Free NFT Certificate Mint by Completing the Web3 Exam! START NOW
Learn to gain real rewards

Learn to gain real rewards

Collect Bits, boost your Degree and gain actual rewards!

New
Video Courses
Video Courses
Deprecated
Scale your career with online video courses. Dive into your learning adventure!
Crypto Terms:  Letter F

What is Fraud Proof?

Meaning:
Fraud Proof - is a technique that operates as a bond in a decentralized environment where Optimistic Rollups (ORs) are used.
medium
3 minutes

Let's find out Fraud Proof meaning, definition in crypto, what is Fraud Proof, and all other detailed facts.

Fraud can be explained as unlawful actions where the perpetrator benefits themselves by stripping the victim’s rights. It includes tax fraud, credit card fraud, wire fraud, and many more different types of fraud. 

Anyone can commit fraud. Whether it’s one person, a group, or an entire company.

When it comes to fraud in blockchain, there is a specific term called fraud proof. It stands for a technical method of enabling on-chain scalability of blockchains, whether it’s through sharding or larger blocks. At the same time, this technical method confirms that all available on-chain data is correct.

A key fragment of any fraud proof is Optimistic Rollups (ORs). They minimize costs and maintain low latency levels for decentralized applications on a blockchain network.

ORs are processed by sequencers. These employees receive a monetary penalty if they break the consensus rules by forfeiting their fraud proof. On the flip side, they receive monetary compensation for executing rollups without breaking the said rules.

Often, not all of the block data is available, therefore state transition fraud proofs are rendered useless. That’s because they depend on the assumption that all information is accessible.

It’s crucial to know that it’s not possible to confirm whether a block miner is incorrect just by publishing the block header without the correct contents.

Block validation is extremely thorough since 100% of the data must be available to establish the validity of a block. 

Data can be made unavailable not just due to malicious nodes, but because of a lot of different reasons. So the most appropriate solution is to make the data unavailability difficult for a rogue node. 

In order to scale public blockchains, fraud proofs and erasure codes are required. With these elements in place, light nodes will be able to choose which blocks to reject on their own (without trustworthy full nodes).

Zero-knowledge proofs can’t be used to confirm the correctness. Yet even if they could be, a huge issue remains - the scammers are still able to make inaccessible blocks public and include them in the chain. Therefore, legitimate validators are not able to fully compute the state. They are also prevented from making blocks that communicate with the part of the state that is not accessible anymore. 

Essentially, fraud proofs confirm that an error was made during a state transition. 

Fraud Proof Pros and Cons:

  • The main advantage of fraud proofs is that they’re not necessary for each state transition which means fewer computing resources. Additionally, they’re great for scalability-constrained settings.
  • The main disadvantage is that fraud proofs cause interactions between different parties. Thus creating a space for these parties to commit fraud or other illegal activities.
miner with access to information on pending transactions places an order that will <strong>profit him<\/strong> from a pending trade. On the <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-ethereum-eth/">Ethereum blockchain<\/strong><\/a>, for example, when <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-are-bots/">bots have the ability to <strong>quote a higher<\/strong> <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-gas-price/">gas price<\/strong><\/a> than a pending rate, front running might occur.<\/p>\n<p>There are also other parties that are capable of front running like, for example, <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-full-node/">full node<\/strong><\/a> operators that gain knowledge of uninformed transactions by <strong>monitoring network activities<\/strong>. <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-centralized-exchange-cex/">Centralized exchanges (CEXs)<\/strong><\/a> can also perform front running but it's not in their best interest to cheat on their clients. Overall, there is a variety of methods that can be used to arrange front running. &nbsp;<\/p>\n<p>Since front running is an illegal practice, it is also referred to as an attack when there is <strong>malicious intent<\/strong> included. There are three main types of malicious attacks using front running:<\/p>\n<ul>\n<li>A displacement attack which happens when a genuine transaction is replaced with the transaction of the malicious actor.<\/li>\n<li>An insertion attack which happens when a genuine transaction is \"sandwiched\" between two transactions aiming for profit without holding an asset.<\/li>\n<li>A suppression <strong>attack<\/strong> which delays the execution of a genuine transaction.<\/li>\n<\/ul>\n<p>Front running can be prevented by improving transaction confidentiality and sequencing transactions. Confidentiality can be applied to many different parts of a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-are-decentralized-applications-dapps/">decentralized application (DApp)<\/strong><\/a>. <strong>Transaction sequencing<\/strong>, on the other hand, can be achieved using implementations like the canonical transaction ordering rule used by <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-bitcoin-btc/">Bitcoin (BCH)<\/strong><\/a>.<\/p>","definition":"an illegal practice of putting a transaction in a queue after gaining advantageous knowledge about future transactions.","status":"published","meta_title":"What is Front Running? Definition & Meaning | Crypto Wiki","meta_description":"Front Running meaning: Front Running - an illegal practice of putting a transaction in a queue after gaining advantageous knowledge about future transactions.","meta_keywords":null}" :prev-section="{"id":365,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Stablecoin","level":"medium","author_id":1,"created_at":"2023-06-19T06:58:59.000000Z","updated_at":"2023-12-06T04:29:16.000000Z","slug":"what-is-fractional-stablecoin","title":"What is Fractional Stablecoin?","section":"F","keyword":"Fractional Stablecoin","content":"<p><strong>Fractional stablecoin<\/strong> is a type of <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-cryptocurrency/">cryptocurrency that is collaterally backed and algorithmically stabilized. Fractional stablecoin protocols may vary in their options for collateral backing, with some using <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-liquidity/">liquidity or partially allowing redemptions. However, the main principle is that the protocol never has more value to redeem than all the <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-stablecoin/">stablecoins that it mints.<\/p>\n<p>Stablecoins are blockchain-based digital assets that have their price value <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-pegged-currency/">pegged to a tangible asset, such as <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-fiat/">fiat currency<\/strong><\/a> or gold. Some stablecoins, like Tether (USDT), have the value of one coin pegged to $1.<\/p>\n<p>Stablecoins must have a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-collateral/">collateral, which means they have to be backed by fiat cash, other cryptocurrencies, or blockchain-based tokens to ensure their legitimacy.<\/p>\n<p>Fractional stablecoins are <strong>backed in two ways<\/strong>. They are collaterally backed and algorithmically stabilized or modified. The collateralization ratio of fractional stablecoins is less than or equal to 100%. &nbsp;This means that <strong>the stablecoin is backed by a fraction of collateral <\/strong>compared to its overall worth.<\/p>\n<p>The use of fractional stablecoins can improve capital efficiency since they do not require as many dollars as collateral. The overall supply of fractional stablecoins is <strong>greater than their liquidity or collateral backing<\/strong>. Fractional stablecoins are developed to include algorithmic mechanisms that stop bank runs via various economic incentives.<\/p>\n<p>If the price of a fractional stablecoin goes above $1, algorithmic systems automatically create as many new stablecoins as needed until the price <strong>falls back down to $1<\/strong>. On the other end of the scale, if the price falls below $1 and the stablecoin is considered overcollateralized, the algorithm <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-burning/">burns the excess coins.<\/p>\n<p>Fractional stablecoins are preferred over <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-algorithmic-stablecoin/">algorithmic stablecoins<\/strong><\/strong><\/a> because the latter can be hard to bootstrap, don&rsquo;t grow as quickly, and are significantly more volatile. The <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-volatility/">volatility is a <strong>particularly significant downside<\/strong> as stablecoins aim to have low volatility by default.<\/p>\n<p>Instead, fractional stablecoins only rely on algorithms that adjust the collateral and maintain the pegged value by either creating or burning the coins or tokens as necessary.<\/p>","definition":"a stablecoin that is collaterally-backed and partially algorithmically stabilized.","status":"published","meta_title":"What is Fractional Stablecoin? Definition & Meaning | Crypto Wiki","meta_description":"Fractional Stablecoin meaning: Fractional Stablecoin - a stablecoin that is collaterally-backed and partially algorithmically stabilized.","meta_keywords":null}" :model="{"id":456,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Fraud","level":"medium","author_id":1,"created_at":"2023-06-19T06:59:00.000000Z","updated_at":"2023-12-06T04:55:10.000000Z","slug":"what-is-fraud-proof","title":"What is Fraud Proof?","section":"F","keyword":"Fraud Proof","content":"<p>Fraud can be explained as unlawful actions where the perpetrator benefits themselves by stripping the victim&rsquo;s rights. It includes tax fraud, credit card fraud, wire fraud, and many more different types of fraud.&nbsp;<\/p>\n<p>Anyone can commit fraud. Whether it&rsquo;s one person, a group, or an entire company.<\/p>\n<p>When it comes to fraud in blockchain, there is a specific term called <strong>fraud proof<\/strong>. It stands for a technical method of enabling <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-on-chain/">on-chain scalability of blockchains, whether it&rsquo;s through <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-sharding/">sharding or larger blocks. At the same time, this technical method confirms that all available on-chain data is correct.<\/p>\n<p>A key fragment of any fraud proof is <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-optimistic-rollup/">Optimistic Rollups (ORs)<\/strong><\/a>. They minimize costs and maintain low latency levels for <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-are-decentralized-applications-dapps/">decentralized applications<\/strong><\/a> on a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-blockchain/">blockchain network.<\/p>\n<p>ORs are processed by sequencers. These employees receive a monetary penalty if they break the consensus rules by forfeiting their fraud proof. On the flip side, they receive monetary compensation for executing rollups without breaking the said rules.<\/p>\n<p>Often, not all of the block data is available, therefore state transition fraud proofs are rendered useless. That&rsquo;s because they depend on the assumption that all information is accessible.<\/p>\n<p>It&rsquo;s crucial to know that it&rsquo;s not possible to confirm whether a block <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-miner/">miner is incorrect just by publishing the block header without the correct contents.<\/p>\n<p>Block validation is extremely thorough since 100% of the data must be available to establish the validity of a block.&nbsp;<\/p>\n<p>Data can be made unavailable not just due to malicious nodes, but because of a lot of different reasons. So the most appropriate solution is to make the data unavailability difficult for a rogue node.&nbsp;<\/p>\n<p>In order to scale public blockchains, fraud proofs and erasure codes are required. With these elements in place, light nodes will be able to choose which blocks to reject on their own (without trustworthy full nodes).<\/p>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-zero-knowledge-proof/">Zero-knowledge proofs<\/strong><\/a> can&rsquo;t be used to confirm the correctness. Yet even if they could be, a huge issue remains - the scammers are still able to make inaccessible blocks public and include them in the chain. Therefore, legitimate validators are not able to fully compute the state. They are also prevented from making blocks that communicate with the part of the state that is not accessible anymore.&nbsp;<\/p>\n<p>Essentially, fraud proofs confirm that an error was made during a state transition.&nbsp;<\/p>\n<p>Fraud Proof Pros and Cons:<\/p>\n<ul>\n<li>The main <strong>advantage<\/strong> of fraud proofs is that they&rsquo;re not necessary for each state transition which means fewer computing resources. Additionally, they&rsquo;re great for scalability-constrained settings.<\/li>\n<li>The main disadvantage is that <strong>fraud proofs cause interactions between different parties<\/strong>. Thus creating a space for these parties to commit fraud or other illegal activities.<\/li>\n<\/ul>","definition":"is a technique that operates as a bond in a decentralized environment where Optimistic Rollups (ORs) are used.","status":"published","meta_title":"What is Fraud Proof? Definition & Meaning | Crypto Wiki","meta_description":"Fraud Proof meaning: Fraud Proof - is a technique that operates as a bond in a decentralized environment where Optimistic Rollups (ORs) are used.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master&rsquo;s degree on Economics, Politics &amp; Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US&rsquo; Western and Japan&rsquo;s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He&rsquo;s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain &amp; Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}" :chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]" current-chapter="F" current-section="what-is-fraud-proof">