🚨 Get Your Free NFT Certificate Mint by Completing the Web3 Exam! START NOW
Learn to gain real rewards

Learn to gain real rewards

Collect Bits, boost your Degree and gain actual rewards!

New
Video Courses
Video Courses
Deprecated
Scale your career with online video courses. Dive into your learning adventure!
Crypto Terms:  Letter H

What is Hacking?

Meaning:
Hacking - a malicious process of manipulating another computing device to exploit it.
hard
4 minutes

Let's find out Hacking meaning, definition in crypto, what is Hacking, and all other detailed facts.

Hacking is a process during which computational devices are manipulated or compromised to exploit the gaps in their systems.

Hacking Types

There are many different types of hacking done with malicious intent. It can be grounded for ideological reasons or personal gain. Hackers may use different strategies and technologies to achieve their goals.

Brute Force Attack

A brute force attack is a method of trying to crack a password or any encrypted information via automated guessing. Hackers employ bots that attempt to guess as many combinations of passwords as possible.

The simpler the password is, the shorter the brute force attack lasts. Short passwords that contain only letters are considered weak, and it is recommended to add more characters to reinforce their security. Long passwords containing both alphanumerics and special symbols are much more robust and sometimes may take millions of years to crack.

Cryptomining malware

Cryptomining malware is a relatively new method of hacking. If a user’s computer is infected with this type of malware, it unwillingly becomes part of a crypto mining network. This can disrupt processes, cause internet speeds to slow down, and may lead to the hardware deteriorating faster.

Cryptomining malware can be caught by downloading infected files or visiting suspicious websites. The process is also known as cryptojacking.

Distributed Denial of Service (DDoS)

Distributed denial of service (DDoS) attacks are used to prevent users from accessing certain websites. Unlike some of the other methods listed here, DDoS attacks have to be coordinated and performed by a large number of participants.

DDoS attacks are often done on a political basis. They may be used to cover information or prevent users from accessing websites of high importance. DDoS attacks are often coordinated against cryptocurrency platforms to destabilize them.

Keylogging

Keylogging is a spyware method. If a user’s computer is infected with keylogging software, the hacker is able to see every character that the user types on their keyboard. This can reveal passwords, private messages, and other sensitive information.

Keylogging can also affect mobile devices. Some apps that provide additional emojis or keyboard themes for the device have been proven to be keylogging spyware. Third-party text editing apps sometimes may also log the keyboard presses for unclear intents.

Phishing

Phishing involves a hacker setting up a fraudulent malware-infected website that appears legitimate. A user is tricked into clicking the link as logging into the website, which leads to the computer getting infected. The hacker can then access the files on the victim’s computer, including login details and any other sensitive information.

Phishing attacks are commonly used in the crypto world. In January 2022, the online platform Crypto.com admitted that $30 million worth of cryptocurrency was lost in a phishing attack.

Ransomware

As the name implies, ransomware involves extortion and is used for financial gains. The files on an infected computer are encrypted. Hackers demand victims to pay a ransom for the files to be decrypted and accessible.

Ransomware can be caught by downloading suspicious files or software. However, this method of hacking is on the decline as many hackers have moved onto using cryptomining malware.

Black Hat vs White Hat Hacking

Hacking is most commonly done with malicious intent, such as terrorism, money laundering, or means to illegally sell data. However, in some cases, hacking may be done for a good cause. This disparity has led to the concept of black hat and white hat hackers.

Black hat hackers attack systems maliciously. Their goal is to disrupt the network for personal, usually financial gain. They are known as highly skilled computer experts that can cause severe damage to computer systems.

White hat hackers are also known for their excellent skillset. However, they perform hacks with good intentions. They are often hired by companies to find if there are any exploits in their systems. They work on discovering bugs or any entrance points that black hat hackers may find and patch them before the systems are breached.

Hacking in the Crypto Industry

Hacking is an ever-growing issue in the crypto industry. Hackers target blockchain-based systems due to the possibilities of exploitation. Some cryptocurrencies, like Bitcoin (BTC) or Ethereum (ETH), are valued at thousands of dollars for a single coin, making them a lucrative catch for malicious actors.

Hot wallets are a particularly common target. Since hot wallets require an internet connection to access the crypto assets, hackers may employ methods such as keylogging or phishing to gain access to users’ wallet addresses and claim the funds for themselves.

Ether (ETH)<\/strong><\/a> cryptocurrency in <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-ethereum-eth/">the Ethereum network<\/strong><\/a> that is often used as a denomination to calculate <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-gas-price/">gas prices<\/strong><\/a> that are paid to miners for transaction processing. <strong>A gwei<\/strong> (also known as gigawei) is equal to 1,000,000,000 <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-wei/">wei, which is the smallest unit of Ether. 1 gwei equals 0.000000001 Ether which means that <strong>1 Ether<\/strong> equals 1 billion gwei.<\/p>\n<p>Gwei is also named \"shannon\"&nbsp;after Claude Shannon, a cryptographer, and mathematician who is known as <strong>the father of information theory<\/strong>. Besides gwei, there are other units of Ether that are named after important people who contributed to the Ethereum project.<\/p>\n<p>Here are some of these units:<\/p>\n<ul>\n<li><strong>wei <\/strong><em>(named after Wei Dai, the &ldquo;godfather&rdquo; of the crypto movement)<\/em>.<\/li>\n<li>kwei which is equal to 10&rsquo;3 wei <em>(also named \"babbage&rdquo; after Charles Babbage)<\/em>.&nbsp;<\/li>\n<li>mwei which is equal to 10&rsquo;6 wei <em>(also named &ldquo;lovelace&rdquo; after Ada Lovelace)<\/em>.&nbsp;<\/li>\n<li><strong>twei<\/strong> which is equal to 10&rsquo;12 wei <em>(also named &ldquo;szabo&rdquo; after Nick Szabo)<\/em>.&nbsp;<\/li>\n<li>pwei which is equal to 10&rsquo;15 wei <em>(also named &ldquo;finney&rdquo; after Hal Finney)<\/em>.<\/li>\n<\/ul>","definition":"a smaller unit of Ether (ETH) cryptocurrency that is used as a denomination to calculate gas fees.","status":"published","meta_title":"What is Gwei? Definition & Meaning | Crypto Wiki","meta_description":"Gwei meaning: Gwei - a smaller unit of Ether (ETH) cryptocurrency that is used as a denomination to calculate gas fees.","meta_keywords":null}" :model="{"id":394,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Hacker","level":"hard","author_id":1,"created_at":"2023-06-19T06:58:59.000000Z","updated_at":"2023-12-08T04:53:19.000000Z","slug":"what-is-hacking","title":"What is Hacking?","section":"H","keyword":"Hacking","content":"<p><strong>Hacking<\/strong> is a process during which computational devices are manipulated or compromised to exploit the gaps in their systems.<\/p>\n<h2>Hacking Types<\/h2>\n<p>There are many different types of hacking done with malicious intent. It can be grounded for ideological reasons or personal gain. Hackers may use different strategies and technologies to achieve their goals.<\/p>\n<h3>Brute Force Attack<\/h3>\n<p>A <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-brute-force-attack-bfa/">brute force attack<\/strong><\/a> is a method of trying to crack a password or any encrypted information via automated guessing. Hackers employ <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-are-bots/">bots that attempt to guess as many combinations of passwords as possible.<\/p>\n<p>The simpler the password is, the shorter the brute force attack lasts. Short passwords that contain only letters are considered weak, and it is recommended to add more characters to reinforce their security. Long passwords containing both <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-does-alphanumeric-mean/">alphanumerics and special symbols are much more robust and sometimes may take millions of years to crack.<\/p>\n<h3>Cryptomining malware<\/h3>\n<p>Cryptomining malware is a relatively new method of hacking. If a user&rsquo;s computer is infected with this type of <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-malware/">malware, it unwillingly becomes part of a crypto mining network. This can disrupt processes, cause internet speeds to slow down, and may lead to the hardware deteriorating faster.<\/p>\n<p>Cryptomining malware can be caught by downloading infected files or visiting suspicious websites. The process is also known as <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-cryptojacking/">cryptojacking./n

Distributed Denial of Service (DDoS)<\/h3>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-distributed-denial-of-service-ddos-attack/">Distributed denial of service (DDoS)<\/strong><\/a> attacks are used to prevent users from accessing certain websites. Unlike some of the other methods listed here, DDoS attacks have to be coordinated and performed <strong>by a large number of participants<\/strong>.<\/p>\n<p>DDoS attacks are often done on a political basis. They may be used to cover information or prevent users from accessing websites of high importance. DDoS attacks are often coordinated against cryptocurrency platforms to destabilize them.<\/p>\n<h3>Keylogging<\/h3>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-keylogger/">Keylogging is a <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-spyware/">spyware method. If a user&rsquo;s computer is infected with keylogging software, the hacker is able to see every character that the <strong>user types on their keyboard<\/strong>. This can reveal passwords, private messages, and other sensitive information.<\/p>\n<p>Keylogging can also affect mobile devices. Some apps that provide additional emojis or keyboard themes for the device have been proven to be keylogging spyware. Third-party text editing apps sometimes may also log the keyboard presses for unclear intents.<\/p>\n<h3>Phishing<\/h3>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-phishing/">Phishing involves a hacker setting up a fraudulent malware-infected website that appears legitimate. A user is tricked into clicking the link as logging into the website, which leads to the computer getting infected. The hacker can then access the files on the victim&rsquo;s computer, including login details and any other sensitive information.<\/p>\n<p>Phishing attacks are commonly used in the crypto world. In January 2022, the online platform Crypto.com admitted that <a href=https://www.bitdegree.org/"https:////www.vice.com//en//article//g5qj9j//cryptocom-says-incident-was-actually-dollar30-million-hack/" target=\"_blank\" rel=\"nofollow noindex noopener\"><strong>$30 million worth of cryptocurrency was lost in a phishing attack<\/strong><\/a>.<\/p>\n<h3>Ransomware<\/h3>\n<p>As the name implies,&nbsp;<a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-ransomware/">ransomware involves <strong>extortion<\/strong> and is used for financial gains. The files on an infected computer are <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-encryption/">encrypted. Hackers demand victims to pay a ransom for the files to be <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-decryption/">decrypted and accessible.<\/p>\n<p>Ransomware can be caught by downloading suspicious files or software. However, this method of hacking is on the decline as many hackers have moved onto using cryptomining malware.<\/p>\n<h2>Black Hat vs White Hat Hacking<\/h2>\n<p>Hacking is most commonly done with malicious intent, such as terrorism, money laundering, or means to illegally sell data. However, in some cases, hacking may be done for a good cause. This disparity has led to the concept of black hat and white hat hackers.<\/p>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-black-hat-hacker/">Black hat hackers<\/strong><\/a> attack systems maliciously. Their goal is to disrupt the network for personal, usually financial gain. They are known as highly skilled computer experts that can cause severe damage to computer systems.<\/p>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-white-hat-computer-hacker/">White hat hackers<\/strong><\/strong><\/a> are also known for their excellent skillset. However, they perform hacks with good intentions. They are often hired by companies to find if there are any exploits in their systems. They work on discovering bugs or any entrance points that black hat hackers may find and patch them before the systems are breached.<\/p>\n<h2>Hacking in the Crypto Industry<\/h2>\n<p>Hacking is an ever-growing issue in the crypto industry. Hackers target blockchain-based systems due to the possibilities of exploitation. Some <strong>cryptocurrencies<\/strong>, like <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-bitcoin-btc/">Bitcoin (BTC)<\/strong><\/a> or <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-ethereum-eth/">Ethereum (ETH)<\/strong><\/a>, are valued at thousands of dollars for a single coin, making them a lucrative catch for malicious actors.<\/p>\n<p><a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-hot-wallet/">Hot wallets<\/strong><\/a> are a particularly common target. Since hot wallets require an internet connection to access the crypto assets, hackers may employ methods such as keylogging or phishing to gain access to users&rsquo; wallet addresses and claim the funds for themselves.<\/p>","definition":"a malicious process of manipulating another computing device to exploit it.","status":"published","meta_title":"What is Hacking? Definition & Meaning | Crypto Wiki","meta_description":"Hacking meaning: Hacking - a malicious process of manipulating another computing device to exploit it.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master&rsquo;s degree on Economics, Politics &amp; Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US&rsquo; Western and Japan&rsquo;s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He&rsquo;s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain &amp; Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}" :chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]" current-chapter="H" current-section="what-is-hacking">